Cyber intelligence comes in many forms. Some is urgent, some merely informative; some is highly technical, while some is broad and generic. But all of it seems to be coming at a faster and faster rate. The challenge is to determine how to get the right security intelligence to the right decision-maker in the right way.

Security professionals can learn a lot from the way the U.S. Department of Defense (DoD) approaches intelligence. Years ago, the agency was absolutely overwhelmed with information on adversary activities and had to establish frameworks for dealing with the data. As a result, the military now considers intelligence at three levels: strategic, operational and tactical.

Strategic intelligence informs the most senior decision-makers, operational intelligence is aimed at those making day-to-day decisions and tactical intelligence is focused on units in need of instantaneous information.

Applying the Military’s Intelligence Framework to Incident Response

Using this framework, it is easier to architect solutions and to help all parties involved understand their role in delivering information efficiently and effectively. Let’s take a look at how this approach can apply to businesses developing cyber intelligence capabilities.

Strategic Cyber Intelligence

Strategic cyber intelligence is analysis and information that can help organizations understand the type of threat they are defending against; the motivation and capability of the threat actor; and the potential impacts thereof. This information enables security teams to plan for the resources they’ll need to protect against and mitigate current and future threats.

The data at this level should be evidence-based but can also include informed projections, including what the adversaries might do once your defenses are in place. A briefing provided to a corporate board or C-suite executive is an example of strategic cyber intelligence.

Operational Cyber Intelligence

Operational cyber intelligence is data that can inform day-to-day decision-making, resource allocation and task prioritization. It includes trend analysis, showing the technical direction of threat actors; indications that an adversary has selected a particular target; and revelations of malicious tactics, techniques and procedures. It can also be useful in identifying threats against your network.

Examples of operational cyber intelligence include information feeds from an information sharing and analysis center (ISAC) and alerts from the Department of Homeland Security (DHS) about a new threat trend.

Tactical Cyber Intelligence

Tactical cyber intelligence is information from direct adversary action inside your systems or from other sources that have the potential to immediately influence your tactical decisions. This data is typically derived from real-time monitoring of systems. Examples include feeds from intelligence providers that reveal which domains have been taken over by adversaries spreading malicious code, and insights from internal monitoring devices showing that a system in the company has been infected with a virus.

Security Intelligence Drives Better Decisions

Information on the threat informs different decisions at different levels. Ensuring that you have the right information at each level can significantly improve your ability to defend your organization. The conclusions drawn by intelligence analysis vary by situation, but below are some key use cases as food for thought.

Strategic Decisions

Strategic threat intelligence can be critically important to building support for the resources you will need to construct a strong defense. Strategic intelligence often comes in the form of threat briefings tailored to your industry or organization. After receiving a threat brief, you may decide to change the way you track cyberthreats as a risk or request reprioritization of your current IT spend to enhance security. You may even build a case for new cybersecurity funding.

You can also use strategic intelligence to advocate for stronger coordination and collaboration with other organizations. Enhanced strategic cyber intelligence can help you structure your internal organization and bolster your incident response capabilities. It can also help your organization understand the degree of agility required to build defenses against fast-moving adversaries.

You should use strategic information to plan training programs for your cybersecurity and IT staff, as well as executives who will need to respond to ongoing operational situations. Strategic decisions include prioritization of system control efforts — for example, prioritizing controls based on International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST) or similar standards.

In most cases, good strategic intelligence will motivate enterprises to rethink processes — including both nontechnical processes, such as audit, and technical processes, such as configuration management — to reduce IT errors.

Operational Decisions

Operational decisions made by security professionals, IT teams and even executives are better informed with a knowledge of which tools adversaries are using, which vulnerabilities they are exploiting and what techniques other defenders are using to successfully mitigate the threat. This will enable decision-makers to better prioritize daily work schedules, build security teams and collaborate with outside departments and business leaders. Other operational decisions include the policies you put into your IT systems to automatically respond to tactical threats.

Tactical Decisions

Tactical intelligence can lead to conclusions about what adversaries want, which can help you make rapid decisions on what to block, what to allow and, at times, what to shut down. Unfortunately, lack of tactical intelligence often leads to businesses making the wrong decisions, resulting in adversaries either getting all the information they want or forcing key services to be taken offline.

Better tactical intelligence can ensure that decisions are optimized. Increasingly, organizations are putting policies in place to enable automated responses. This is a great use of tactical intelligence, but this approach is only effective when both good strategic and operational intelligence are also optimized. All three levels must come together to enable organizations to operate at network speed.

A Virtuous Cycle

By optimizing intelligence at each of these levels, organizations can improve the quality of their decisions significantly. This can become a particularly virtuous cycle, since using good intelligence will motivate more tasking, which, in turn, improves an organization’s security posture and its ability to enhance threat modeling with predictive cyber intelligence.

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today