Critical Read

Exploiting tactical cyber intelligence

Shutterstock image.

What: A report produced by the nonprofit Intelligence and National Security Alliance that advises organizations on how to set up a tactical cyber intelligence program.

Why: Cyber intelligence blends cyber know-how with intelligence analysis. This white paper homes in on "tactical" cyber intelligence -- the strengths and weaknesses of network defense -- and the tactics, techniques and procedures used by hackers.

According to INSA, if organizations can get tactical cyber intelligence right, it could help them manage risk, make better decisions during a breach and move toward a cybersecurity footing that is predictive rather than reactive.

To get to that point, organizations should focus on four activities: drawing up a clear blueprint of the organization's IT environment and adversaries' capabilities; establishing an intelligence life cycle that produces an operational picture of cyberthreats; sharing and receiving threat information from other organizations; and cultivating multiple data feeds on threats.

Verbatim: "Tactical cyber intelligence is complementary to, but does not replace, an organization's traditional cybersecurity technologies and approaches. Striking a balance between the two, and allowing the former to strengthen the latter, is the best path forward to stay ahead of adversaries targeting your organization or its sector."

Click here to read the white paper.

About the Author

Sean Lyngaas is a former FCW staff writer.

Featured

  • Workforce
    Avril Haines testifies SSCI Jan. 19, 2021

    Haines looks to restore IC workforce morale

    If confirmed, Avril Haines says that one of her top priorities as the Director of National Intelligence will be "institutional" issues, like renewing public trust in the intelligence community and improving workforce morale.

  • Defense
    laptop cloud concept (Andrey Suslov/Shutterstock.com)

    Telework, BYOD and DEOS

    Telework made the idea of bringing your own device a top priority as the Defense Information Systems Agency begins transitioning to a permanent version of the commercial virtual remote environment.

Stay Connected