ISO 27001:2022 introduced a brand-new mandatory control that most organisations are failing. Here's why — and how continuous cyber risk quantification solves it.
When ISO 27001:2022 landed, most security teams focused on the restructured Annex A controls they already knew. But buried in the update was something entirely new: Control 5.7 — Threat Intelligence.
For the first time, ISO 27001 explicitly requires organisations to establish a structured process for collecting, analysing, and acting upon cyber threat intelligence (CTI). Not as a nice-to-have. As a certifiable control.
With nearly 100,000 ISO 27001 certificates active worldwide — and 81% of organisations either certified or planning certification — this isn't a niche problem. It's an industry-wide compliance gap hiding in plain sight.
Control 5.7 demands CTI at three levels:
| Level | Audience | What's Required |
|---|---|---|
| Strategic | Board & executives | Threat landscape trends, emerging risks, geopolitical context |
| Tactical | Security teams | Attacker methodologies, TTPs, tooling evolution |
| Operational | SOC / incident response | Specific indicators, active campaigns, real-time alerts |
But here's the part most teams miss: collecting threat feeds isn't enough. Auditors expect documented evidence that your organisation:
In other words, subscribing to a MITRE ATT&CK feed and filing it in SharePoint won't pass the audit. You need to demonstrate that threat intelligence changes how you manage risk.
The uncomfortable truth? Most CTI programs look like this:
The result: organisations pay for threat intelligence platforms, tick the box on "we have CTI," and then fail the audit on the analysis, action, and integration requirements.
This happens because traditional CTI tools were built to feed SOCs, not to inform risk management. They answer "what's happening out there?" but not "what does this mean for us, in dollars?"
Control 5.7 doesn't exist in isolation. It's designed to feed into Clause 6.1 — Risk Assessment and Clause 8.2 — Information Security Risk Assessment. The intent is clear: threat intelligence should continuously inform how you assess and treat risk.
This is where most organisations hit a wall. Their CTI is technical (IOCs, CVEs, TTPs). Their risk register is qualitative (Red/Amber/Green). There's no translation layer between "a new ransomware variant is targeting our sector" and "our financial exposure just increased by $2.3M."
What if the translation happened automatically?
A platform that combines real-time threat intelligence with financial risk quantification doesn't just help you pass the audit — it makes Control 5.7 operationally valuable.
Lightweight agents deployed across your IT/OT environment continuously ingest:
This isn't generic threat feed aggregation. It's CTI contextualised to your environment — exactly what the auditor wants to see.
Using the FAIR (Factor Analysis of Information Risk) methodology and Monte Carlo simulation, threat intelligence is automatically translated into:
When a new threat emerges, it doesn't just appear as an alert. It appears as a dollar-denominated change to your risk profile, linked directly to the assets and controls it affects.
Automated feeds miss context that humans touch. A crowd forecasting engine lets pen testers, CTI analysts, engineers, and even peer organisations contribute predictions on:
These predictions are aggregated using Bayesian methods into a consensus signal that continuously updates your VaR. Participants with better predictive accuracy (measured by Brier scores) carry more weight — creating a self-improving intelligence system.
This is the "expert consensus aggregation" that auditors dream of: documented, quantified, and continuously validated.
Every intelligence input, every analysis, every risk decision is logged:
When the auditor asks "show me how threat intelligence informed a risk decision," you don't scramble for meeting minutes. You show them a living system.
Here's what makes Control 5.7 interesting from a business perspective: it's the first ISO 27001 control that explicitly bridges cybersecurity and enterprise risk management.
Organisations that treat it as a checkbox will spend money on CTI tools and still struggle at audit time. Organisations that treat it as an opportunity will build a continuous risk quantification capability that:
The same platform that passes your ISO 27001 audit also produces the financial risk disclosures your board needs and the quantified data your insurer is starting to demand.
Control 5.7 exposed a gap that's been hiding in cybersecurity for years: we're drowning in threat data but starving for risk insight.
The organisations that will thrive aren't the ones with the most threat feeds. They're the ones that can answer, in real-time and in dollars: "Given what we know about the threat landscape right now, how much could we lose — and what should we do about it?"
That's not a compliance exercise. That's a competitive advantage.
CyQuantiFi
The world's first crowd-forecasting-driven cyber risk quantification engine. We turn threat intelligence into financial signal — automatically, continuously, and in the language your board and auditors actually understand.