Cyber intelligence comes in many forms. Some is urgent, some merely informative; some is highly technical, while some is broad and generic. But all of it seems to be coming at a faster and faster rate. The challenge is to determine how to get the right security intelligence to the right decision-maker in the right way.

Security professionals can learn a lot from the way the U.S. Department of Defense (DoD) approaches intelligence. Years ago, the agency was absolutely overwhelmed with information on adversary activities and had to establish frameworks for dealing with the data. As a result, the military now considers intelligence at three levels: strategic, operational and tactical.

Strategic intelligence informs the most senior decision-makers, operational intelligence is aimed at those making day-to-day decisions and tactical intelligence is focused on units in need of instantaneous information.

Applying the Military’s Intelligence Framework to Incident Response

Using this framework, it is easier to architect solutions and to help all parties involved understand their role in delivering information efficiently and effectively. Let’s take a look at how this approach can apply to businesses developing cyber intelligence capabilities.

Strategic Cyber Intelligence

Strategic cyber intelligence is analysis and information that can help organizations understand the type of threat they are defending against; the motivation and capability of the threat actor; and the potential impacts thereof. This information enables security teams to plan for the resources they’ll need to protect against and mitigate current and future threats.

The data at this level should be evidence-based but can also include informed projections, including what the adversaries might do once your defenses are in place. A briefing provided to a corporate board or C-suite executive is an example of strategic cyber intelligence.

Operational Cyber Intelligence

Operational cyber intelligence is data that can inform day-to-day decision-making, resource allocation and task prioritization. It includes trend analysis, showing the technical direction of threat actors; indications that an adversary has selected a particular target; and revelations of malicious tactics, techniques and procedures. It can also be useful in identifying threats against your network.

Examples of operational cyber intelligence include information feeds from an information sharing and analysis center (ISAC) and alerts from the Department of Homeland Security (DHS) about a new threat trend.

Tactical Cyber Intelligence

Tactical cyber intelligence is information from direct adversary action inside your systems or from other sources that have the potential to immediately influence your tactical decisions. This data is typically derived from real-time monitoring of systems. Examples include feeds from intelligence providers that reveal which domains have been taken over by adversaries spreading malicious code, and insights from internal monitoring devices showing that a system in the company has been infected with a virus.

Security Intelligence Drives Better Decisions

Information on the threat informs different decisions at different levels. Ensuring that you have the right information at each level can significantly improve your ability to defend your organization. The conclusions drawn by intelligence analysis vary by situation, but below are some key use cases as food for thought.

Strategic Decisions

Strategic threat intelligence can be critically important to building support for the resources you will need to construct a strong defense. Strategic intelligence often comes in the form of threat briefings tailored to your industry or organization. After receiving a threat brief, you may decide to change the way you track cyberthreats as a risk or request reprioritization of your current IT spend to enhance security. You may even build a case for new cybersecurity funding.

You can also use strategic intelligence to advocate for stronger coordination and collaboration with other organizations. Enhanced strategic cyber intelligence can help you structure your internal organization and bolster your incident response capabilities. It can also help your organization understand the degree of agility required to build defenses against fast-moving adversaries.

You should use strategic information to plan training programs for your cybersecurity and IT staff, as well as executives who will need to respond to ongoing operational situations. Strategic decisions include prioritization of system control efforts — for example, prioritizing controls based on International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST) or similar standards.

In most cases, good strategic intelligence will motivate enterprises to rethink processes — including both nontechnical processes, such as audit, and technical processes, such as configuration management — to reduce IT errors.

Operational Decisions

Operational decisions made by security professionals, IT teams and even executives are better informed with a knowledge of which tools adversaries are using, which vulnerabilities they are exploiting and what techniques other defenders are using to successfully mitigate the threat. This will enable decision-makers to better prioritize daily work schedules, build security teams and collaborate with outside departments and business leaders. Other operational decisions include the policies you put into your IT systems to automatically respond to tactical threats.

Tactical Decisions

Tactical intelligence can lead to conclusions about what adversaries want, which can help you make rapid decisions on what to block, what to allow and, at times, what to shut down. Unfortunately, lack of tactical intelligence often leads to businesses making the wrong decisions, resulting in adversaries either getting all the information they want or forcing key services to be taken offline.

Better tactical intelligence can ensure that decisions are optimized. Increasingly, organizations are putting policies in place to enable automated responses. This is a great use of tactical intelligence, but this approach is only effective when both good strategic and operational intelligence are also optimized. All three levels must come together to enable organizations to operate at network speed.

A Virtuous Cycle

By optimizing intelligence at each of these levels, organizations can improve the quality of their decisions significantly. This can become a particularly virtuous cycle, since using good intelligence will motivate more tasking, which, in turn, improves an organization’s security posture and its ability to enhance threat modeling with predictive cyber intelligence.

More from Intelligence & Analytics

ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK)

7 min read - In late April 2023, IBM Security X-Force uncovered documents that are most likely part of a phishing campaign mimicking credible senders, orchestrated by a group X-Force refers to as ITG10, and aimed at delivering RokRAT malware, similar to what has been observed by others. ITG10's tactics, techniques and procedures (TTPs) overlap with APT37 and ScarCruft. The initial delivery method is conducted via a LNK file, which drops two Windows shortcut files containing obfuscated PowerShell scripts in charge of downloading a…

7 min read

SOCs Spend 32% of the Day On Incidents That Pose No Threat

4 min read - When it comes to the first line of defense for any company, its Security Operations Center (SOC) is an essential component. A SOC is a dedicated team of professionals who monitor networks and systems for potential threats, provide analysis of detected issues and take the necessary actions to remediate any risks they uncover. Unfortunately, SOC members spend nearly one-third (32%) of their day investigating incidents that don't actually pose a real threat to the business according to a new report…

4 min read

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Despite Tech Layoffs, Cybersecurity Positions are Hiring

4 min read - It’s easy to read today’s headlines and think that now isn’t the best time to look for a job in the tech industry. However, that’s not necessarily true. When you read deeper into the stories and numbers, cybersecurity positions are still very much in demand. Cybersecurity professionals are landing jobs every day, and IT professionals from other roles may be able to transfer their skills into cybersecurity relatively easily. As cybersecurity continues to remain a top business priority, organizations will…

4 min read