Skip to content

Security Intelligence – The Next Big Thing

In 2010 Gartner espoused that applied security (Signals) intelligence was no longer an option for companies.

I called the analyst on this not because I thought he was wrong, far from the contrary, more because I thought they should swing for the fences a little bit more readily!

Signals intelligence is a great and useful tool if you can get it with valid and clean data; that’s a big if given the lack of ‘connectedness’ between all of the logs in an organization and the difficulty in processing all this information without having your own Intel team.

MY point to Gartner was more of that Signals Intel is only half of the mystery; the other component for corporations is Human Intel.

Now many of my contemporaries will no doubt argue here that companies can’t afford security intelligence teams, much less ‘Humint’ programs. I am here to tell you its time you all stepped up to the big table and starting prioritizing threats.

If you can accurately identify which threats are really risks for your organization you can do a few important things:

  • Optimize security spend to those things that are truly highest risk
  • Aid the business in acting boldly in decision making in areas where the risk is actually lower or in areas where security investment is high.
  • Make security a strategic competitive advantage for your firm
  • Create real executive briefing information in terms of what it means to your company, not just explain what CNN said last night

Only when you combine signals and human Intel over a sustained period of time, can you really begin to be sure when answering leadership’s question…..How do you know we are spending our money on the right things?

Dave Tyson

Leave a Comment





Ready to Get Started?

Click on the button below to take the first step towards securing your organization against cyber security threats.

Marketing Meeting

The Top 3 Cyber Security Risks Every Chief Marketing Officer Should Care About

The Chief Marketing Officer (CMO in many organizations) is on the front lines of two of the largest battle fronts ...
Read More
Castle

Digital Comes of Age

For the past millennia or so, the traditional approach to securing assets has been the utilization of a castle mentality. ...
Read More
Paradigm Shift

A True Paradigm Shift in Security Management

"Cyber Security 1.0" was vulnerability based, and has what I would argue limited and decreasing levels of success as public breaches ...
Read More
Geek Shall Inherit the Earth

The Geek Shall Inherit the Earth………..

At least according to Microsoft a few years ago, and if that’s true then the earth will be led by a ...
Read More
IT Security for Physical Security Pro

IT Security for the Physical Security Professional

One of the greatest challenges for a CISO is helping traditional security professionals believe they can learn information security fundamentals ...
Read More
IT Security Sales Professionala

IT Sales “Professionals” and Common Sales Tactics

I don’t want this to sound like a rant, but after four years in the Silicon Valley being bombarded by ...
Read More
Scroll To Top