Critical Read

Exploiting tactical cyber intelligence

Shutterstock image.

What: A report produced by the nonprofit Intelligence and National Security Alliance that advises organizations on how to set up a tactical cyber intelligence program.

Why: Cyber intelligence blends cyber know-how with intelligence analysis. This white paper homes in on "tactical" cyber intelligence -- the strengths and weaknesses of network defense -- and the tactics, techniques and procedures used by hackers.

According to INSA, if organizations can get tactical cyber intelligence right, it could help them manage risk, make better decisions during a breach and move toward a cybersecurity footing that is predictive rather than reactive.

To get to that point, organizations should focus on four activities: drawing up a clear blueprint of the organization's IT environment and adversaries' capabilities; establishing an intelligence life cycle that produces an operational picture of cyberthreats; sharing and receiving threat information from other organizations; and cultivating multiple data feeds on threats.

Verbatim: "Tactical cyber intelligence is complementary to, but does not replace, an organization's traditional cybersecurity technologies and approaches. Striking a balance between the two, and allowing the former to strengthen the latter, is the best path forward to stay ahead of adversaries targeting your organization or its sector."

Click here to read the white paper.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


Featured

  • FCW Perspectives
    human machine interface

    Your agency isn’t ready for AI

    To truly take advantage, government must retool both its data and its infrastructure.

  • Cybersecurity
    secure network (bluebay/Shutterstock.com)

    Federal CISO floats potential for new supply chain regs

    The federal government's top IT security chief and canvassed industry for feedback on how to shape new rules of the road for federal acquisition and procurement.

  • People
    DHS Secretary Kirstjen Nielsen, shown here at her Nov. 8, 2017, confirmation hearing. DHS Photo by Jetta Disco

    DHS chief Nielsen resigns

    Kirstjen Nielsen, the first Homeland Security secretary with a background in cybersecurity, is being replaced on an acting basis by the Customs and Border Protection chief. Her last day is April 10.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.