You need a vendor-specific systematic and multidisciplinary process with proper methodology combinations for identifying technological, economic and social areas to prioritize investments and research to realize medium or long-term future strategies by using the emergence of disruptive vendor technologies and innovations, as well as new and potential threats, that will impact the threat defense life cycle, in particular, both for the evolution of cyber security as well as the dynamic nature of exploitation.

With hundreds of cyber crime cases every day, vendor awareness and knowledge about it has become more important, well-rounded, globally-sourced data provides the most accurate picture of threat trends, similarly, you will have to analyze different attack techniques based on vendors implementation details and countermeasures.