To read this content please select one of the options below:

Strategic cyber intelligence

Randy Borum (School of Information, University of South Florida, Tampa, FL, USA)
John Felker (Cyber Intelligence Strategy, Hewlett-Packard Company, Herndon, VA, USA)
Sean Kern (National Defense University, Washington, DC, USA)
Kristen Dennesen (FireEye Labs, Reston, VA, USA)
Tonya Feyes (TF Solutions, Washington, DC, USA)

Information and Computer Security

ISSN: 2056-4961

Article publication date: 13 July 2015

3507

Abstract

Purpose

This paper aims to highlight the importance and role of strategic cyber intelligence to support risk-informed decision-making, ultimately leading to improved objectives, policies, architectures and investments to advance a nation or organization’s interests in the cyber domain.

Design/methodology/approach

Integration of professional research literature from the fields of intelligence studies, strategy and information/computer security.

Findings

Investing in technology, firewalls and intrusion detection systems is appropriate but, by itself, insufficient. Intelligence is a key component. Cyber intelligence emphasizes prevention and anticipation, to focus cybersecurity efforts before an attack occurs (“left of the hack”). Strategic cyber intelligence can substantially reduce risk to the organization’s mission and valued assets and support its due diligence.

Originality/value

This paper describes how strategic cyber intelligence can be implemented and used within an enterprise to enhance its cyber defense, and create a more proactive and adaptive security posture. It not only describes strategic cyber intelligence as a distinct discipline, but also demonstrates how the key intelligence functions articulate with existing cybersecurity risk management standards.

Keywords

Acknowledgements

This article is adapted, in part, from the Intelligence and National Security Alliance (INSA) White Paper: Strategic Cyber Intelligence, developed by INSA’s Cyber Intelligence Task Force in March, 2014. It contains, however, substantial original and expanded material.

Citation

Borum, R., Felker, J., Kern, S., Dennesen, K. and Feyes, T. (2015), "Strategic cyber intelligence", Information and Computer Security, Vol. 23 No. 3, pp. 317-332. https://doi.org/10.1108/ICS-09-2014-0064

Publisher

:

Emerald Group Publishing Limited

Copyright © 2015, Emerald Group Publishing Limited

Related articles