Utilizing Intelligence to Extend the Security Perimeter

apple-touch-icon-152.pngUtilizing Intelligence to Extend the Security Perimeter>
Security Management – ASIS – Eric Velez-Villar
Forward-leaning security teams realize the importance of understanding the intentions and capabilities of threat actors long before they arrive at their doorsteps Every intelligence program is inevitably different based on an organizationâs industry, size, culture, infrastructure, operations and public-facing profile, but all programs should be capable of providing tailored, predictive and actionable information to mitigate risk.  With that backdrop in mind, several key themes should be considered when implementing an intelligence program in your organization. Intelligence programs should be: Driven by intelligence requirements that meet the needs of key decision makers An organizationâs security program should have a thorough understanding of business operations, and the team should routinely engage with others in the business. Guided by a corporate security intelligence policy It is critical to establish a policy that governs the boundaries of the intelligence program. The policy should define the necessary approvals and guardrails in conjunction with legal, human resources, employee relations, compliance and risk management partners and other stakeholders. Grounded in proven techniques and processes to gather, analyze, and disseminate intelligence A production plan is a useful tool to help determine and prioritize the intelligence questions to analyze, the type of products to produce, the appropriate methods for dissemination and required approvals. Built upon a foundation of the right people and technology Empowering your team with the proper training and investments in technology will enable them to spend less time on researching, aggregating, processing and formatting intelligence and allow them to spend more time identifying, understanding and responding to threats. Continuously improving Good metrics will inform which practices to keep and which ones to eliminate.
Link: https://www.securitymagazine.com/articles/92425-utilizing-intelligence-to-extend-the-security-perimeter


Tags: