Time
4 hours 42 minutes
Difficulty
Advanced
CEU/CPE
5

Video Transcription

00:00
Hello and welcome to the last video from the module dissemination and feedback.
00:05
This video is dedicated to explain strategic intelligence.
00:10
In this lesson, we will focus on strategy intelligence. We will start with definition off strategic intelligence. We also to understand the strategic decisions. And we will discover the benefits off strategic intelligence and what is the most appropriate audience for this type off intelligence?
00:30
Let's discover the definition off strategy HQ Cyber Threat Intelligence
00:35
in simple terms, strategic threat Intelligence is a bird's eyes. Ooh,
00:41
off on organizations threat landscape.
00:44
Not concerned with specific actors indicators or attacks, it instead aims to help AH, high level strategist understand the border impact off business decisions.
00:58
It is the most complex form off intelligence to generate, and he's human resource intensive. It demands anyone said, understanding off the cyber threat landscape
01:10
strategy, ex cyber intelligence. He's in the license and information that can help organizations understand the type of threat that they are defending against
01:21
the motivation and capability off of the threat actor
01:25
and their potential impacts.
01:26
This information enables security teams to plan for the resource is they will need to protect a guest
01:34
and mitigate current and future threats.
01:38
The data at this level should be evidence based, but
01:44
it's can also include informant productions, including whether adversaries might do once your defenses are in place.
01:53
A briefing that can be provided toe corporate board or C suit executives is an example off strategy. Cyber intelligence.
02:04
Unlike other intelligence categories, the majority off strategies threat intelligence sources are open source, meaning they can be freely access and by anyone.
02:16
Common examples include policy documents from nation states,
02:22
local and national media
02:24
industry and subject specific publications.
02:29
Also, we can find free content produced by security organizations, for example, white papers or research reports. While the accessibility off strategies resources can be a tremendous positive, it can also be a double edged swart
02:46
as analysts. My manually process. A huge quantities off road data in orderto identify valuable insights
02:57
were still
02:59
the most valuable. Insights are often hidden in for rain language sources,
03:05
which forces the analysts to spend even more time on translations.
03:10
Strategic intelligence often comes in the form off threat briefings Tyler it to your industry or organization,
03:20
and after receiving a threat brief,
03:23
you may decide to change the way that your track cyber threats.
03:28
You may even build a case for new cybersecurity fundings. You can also use strategy intelligence, tow advocate for stronger coordination and collaboration with other organizations.
03:40
Enhance its strategy. Cyber threat Intelligence can help you structure your internal organization
03:47
on boss sir, your incident response capabilities. It can also help your organization to understand the degree required to both defenses against fast moving adversaries.
04:01
In most cases, good strategy intelligence will motivate enterprises to rethink processes, including both non technical processes such as audit and technical processes. Such a configuration. Management to reduce IittIe errors
04:20
strategy Ex cyber intelligence is built up on a huge body off knowledge and includes expert opinions and insights that are based on aggregate in both operational and tactical intelligence from known cyber attacks.
04:38
There are many uses for strategic intelligence,
04:42
including, but not limited to the following. The first is to inform your executive leadership about high risk threat actors, relevant risk scenarios on threat exposure and the public facing technologies, fear and criminal underground.
05:00
Second,
05:02
to perform a thorough risk analysis and review an entire technology supply train
05:09
third and finally to learn which commercial venture vendors, partner companies and technology products are most likely to increase or the crease risked your enterprise environment. This situational intelligence held decision makers are located
05:28
budget to investments
05:30
that best protect their enterprise,
05:32
align it to strategic business priorities
05:35
and make it long term calculations regarding how their organization and sector might be affected. But its environment both digital and otherwise, since it is used to inform specific high level decisions.
05:54
Strategic Cyber Threat intelligence is usually gathered on the man's rather than an ongoing, initiated,
06:01
and is most often presented as a report or briefing.
06:08
Given that the audience is primarily see suit and barred level Strategic Cyber Threat intelligence is almost exclusively nontechnical
06:18
is that it covers factors such as risk scores and the possible outcomes off given action or decision, such as entering a foreign market. Strategic intelligence should be polishing and complete product to be presented to executives
06:38
strategy. Ex cyber sweat intelligence can be critically important to building. Support for the resource is that you will need to construct strong. The fast
06:49
and all the delivery bubbles are written in a language for policymakers on strategists. This is all for this lesson in which we focused mainly on strategic intelligence starting from the definition off strategy cyber intelligence
07:09
to see also strategy decisions
07:12
and the benefits off using strategy intelligence to finish with the appropriate audience off strategy intelligence
07:20
Before closing this video, let's quickly recap the three pullers off dissemination, which our tactical operational as strategic intelligence
07:31
for the technical intelligence. The under licence part include security events and uses
07:40
the output off. Tactical intelligence is data feet, and this intelligence is meant for shorter when it comes to the audience. Tactical intelligence is meant for personnel directly involved in the defense, off organizations such as system architect or administrators
07:59
and security stuff.
08:01
Now the second pillar is operational Intelligence for analyzes, part operational intelligence include malware, family behavior and profiles, threat actors,
08:13
human behavior and Teepees On output. Off this form off intelligence will be mainly reports
08:22
or lists and trends. Bettors.
08:24
This four off intelligence is meant for Mr
08:28
and their audience is technical audience for example, security operations, personnel or managers.
08:37
The last form off intelligence is strategy, cyber intelligence
08:43
and and the license will be covered in cyber threats in context, off business objectives.
08:48
The output will be mainly reports, trends and methodologies,
08:54
and this form. Often delusions is meant for lachter.
08:56
When it comes to the audience
08:58
is mainly board level and see suit executives. We almost finish this course. Let's quickly have a summary off what we discover it together during each of the previous modules. And what resources helped me to build this course. So
09:18
see you in the last video.

Up Next

Advanced Cyber Threat Intelligence

Advanced Cyber Threat Intelligence will benefit security practitioners interested in preventing cyber threats. Learn how to leverage your existing data sources to extract useful information and find complementary information from external sources.

Instructed By

Instructor Profile Image
Alyssa Berriche
Instructor