4 hours 42 minutes
Hello and welcome to the last video from the module dissemination and feedback.
This video is dedicated to explain strategic intelligence.
In this lesson, we will focus on strategy intelligence. We will start with definition off strategic intelligence. We also to understand the strategic decisions. And we will discover the benefits off strategic intelligence and what is the most appropriate audience for this type off intelligence?
Let's discover the definition off strategy HQ Cyber Threat Intelligence
in simple terms, strategic threat Intelligence is a bird's eyes. Ooh,
off on organizations threat landscape.
Not concerned with specific actors indicators or attacks, it instead aims to help AH, high level strategist understand the border impact off business decisions.
It is the most complex form off intelligence to generate, and he's human resource intensive. It demands anyone said, understanding off the cyber threat landscape
strategy, ex cyber intelligence. He's in the license and information that can help organizations understand the type of threat that they are defending against
the motivation and capability off of the threat actor
and their potential impacts.
This information enables security teams to plan for the resource is they will need to protect a guest
and mitigate current and future threats.
The data at this level should be evidence based, but
it's can also include informant productions, including whether adversaries might do once your defenses are in place.
A briefing that can be provided toe corporate board or C suit executives is an example off strategy. Cyber intelligence.
Unlike other intelligence categories, the majority off strategies threat intelligence sources are open source, meaning they can be freely access and by anyone.
Common examples include policy documents from nation states,
local and national media
industry and subject specific publications.
Also, we can find free content produced by security organizations, for example, white papers or research reports. While the accessibility off strategies resources can be a tremendous positive, it can also be a double edged swart
as analysts. My manually process. A huge quantities off road data in orderto identify valuable insights
the most valuable. Insights are often hidden in for rain language sources,
which forces the analysts to spend even more time on translations.
Strategic intelligence often comes in the form off threat briefings Tyler it to your industry or organization,
and after receiving a threat brief,
you may decide to change the way that your track cyber threats.
You may even build a case for new cybersecurity fundings. You can also use strategy intelligence, tow advocate for stronger coordination and collaboration with other organizations.
Enhance its strategy. Cyber threat Intelligence can help you structure your internal organization
on boss sir, your incident response capabilities. It can also help your organization to understand the degree required to both defenses against fast moving adversaries.
In most cases, good strategy intelligence will motivate enterprises to rethink processes, including both non technical processes such as audit and technical processes. Such a configuration. Management to reduce IittIe errors
strategy Ex cyber intelligence is built up on a huge body off knowledge and includes expert opinions and insights that are based on aggregate in both operational and tactical intelligence from known cyber attacks.
There are many uses for strategic intelligence,
including, but not limited to the following. The first is to inform your executive leadership about high risk threat actors, relevant risk scenarios on threat exposure and the public facing technologies, fear and criminal underground.
to perform a thorough risk analysis and review an entire technology supply train
third and finally to learn which commercial venture vendors, partner companies and technology products are most likely to increase or the crease risked your enterprise environment. This situational intelligence held decision makers are located
budget to investments
that best protect their enterprise,
align it to strategic business priorities
and make it long term calculations regarding how their organization and sector might be affected. But its environment both digital and otherwise, since it is used to inform specific high level decisions.
Strategic Cyber Threat intelligence is usually gathered on the man's rather than an ongoing, initiated,
and is most often presented as a report or briefing.
Given that the audience is primarily see suit and barred level Strategic Cyber Threat intelligence is almost exclusively nontechnical
is that it covers factors such as risk scores and the possible outcomes off given action or decision, such as entering a foreign market. Strategic intelligence should be polishing and complete product to be presented to executives
strategy. Ex cyber sweat intelligence can be critically important to building. Support for the resource is that you will need to construct strong. The fast
and all the delivery bubbles are written in a language for policymakers on strategists. This is all for this lesson in which we focused mainly on strategic intelligence starting from the definition off strategy cyber intelligence
to see also strategy decisions
and the benefits off using strategy intelligence to finish with the appropriate audience off strategy intelligence
Before closing this video, let's quickly recap the three pullers off dissemination, which our tactical operational as strategic intelligence
for the technical intelligence. The under licence part include security events and uses
the output off. Tactical intelligence is data feet, and this intelligence is meant for shorter when it comes to the audience. Tactical intelligence is meant for personnel directly involved in the defense, off organizations such as system architect or administrators
and security stuff.
Now the second pillar is operational Intelligence for analyzes, part operational intelligence include malware, family behavior and profiles, threat actors,
human behavior and Teepees On output. Off this form off intelligence will be mainly reports
or lists and trends. Bettors.
This four off intelligence is meant for Mr
and their audience is technical audience for example, security operations, personnel or managers.
The last form off intelligence is strategy, cyber intelligence
and and the license will be covered in cyber threats in context, off business objectives.
The output will be mainly reports, trends and methodologies,
and this form. Often delusions is meant for lachter.
When it comes to the audience
is mainly board level and see suit executives. We almost finish this course. Let's quickly have a summary off what we discover it together during each of the previous modules. And what resources helped me to build this course. So
see you in the last video.
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training
This course prepares you for the ATT&CK® Cyber Threat Intelligence Certification, and provides hands-on instruction ...
3 CEU/CPE Hours Available
Certificate of Completion Offered