Critical Read

Exploiting tactical cyber intelligence

Shutterstock image.

What: A report produced by the nonprofit Intelligence and National Security Alliance that advises organizations on how to set up a tactical cyber intelligence program.

Why: Cyber intelligence blends cyber know-how with intelligence analysis. This white paper homes in on "tactical" cyber intelligence -- the strengths and weaknesses of network defense -- and the tactics, techniques and procedures used by hackers.

According to INSA, if organizations can get tactical cyber intelligence right, it could help them manage risk, make better decisions during a breach and move toward a cybersecurity footing that is predictive rather than reactive.

To get to that point, organizations should focus on four activities: drawing up a clear blueprint of the organization's IT environment and adversaries' capabilities; establishing an intelligence life cycle that produces an operational picture of cyberthreats; sharing and receiving threat information from other organizations; and cultivating multiple data feeds on threats.

Verbatim: "Tactical cyber intelligence is complementary to, but does not replace, an organization's traditional cybersecurity technologies and approaches. Striking a balance between the two, and allowing the former to strengthen the latter, is the best path forward to stay ahead of adversaries targeting your organization or its sector."

Click here to read the white paper.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


Featured

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

  • FCW Illustration.  Original Images: Shutterstock, Airbnb

    Should federal contracting be more like Airbnb?

    Steve Kelman believes a lighter touch and a bit more trust could transform today's compliance culture.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.