Story image

Flashpoint: Contextual data key to effective security

04 Feb 2019

Article by Flashpoint customer success senior director Glenn Lemons

For executive protection teams tasked with safeguarding business leaders in an increasingly complex threat landscape, having rapid access to relevant information is essential.

But as more threat actors shift operations online—and often to illicit, exclusive communities and platforms—many of the insights most useful to executive protection teams are becoming decentralised and difficult to access.

These challenges highlight the need for executive protection teams to augment their operations with a crucial resource: ‘finished intelligence’.

Widely considered the most consumable type of intelligence, finished intelligence is derived from timely, relevant data that has been deeply analysed, contextualised, and presented alongside all details needed to inform decisions.

Producing finished intelligence requires extensive resources, expertise, and bandwidth.

The following examples demonstrate why finished intelligence is an invaluable investment for executive protection teams:

Overcoming ‘analysis paralysis’ to make informed decisions

When sending prominent individuals to international destinations or high-profile events, executive protection teams must proactively establish an appropriate level of physical protection in a manner that is tactful and unobtrusive.

This requires a holistic awareness of the situation at hand and related risks but given the potentially overwhelming volume of noise or misinformation surrounding emerging developments, teams may struggle to determine which information is accurate and relevant.

As such, ‘analysis paralysis’, the stalling of key decisions in order to gather and analyse information, is a common pitfall for executive protection teams.

Moreover, without specialised subject matter expertise and visibility into illicit communities, these teams may be basing decisions on only a partial understanding of the risks they face.

By leveraging finished intelligence gathered by external subject matter experts, executive protection teams no longer need to waste time sifting through un-curated data.

This buys back resources for teams to focus on establishing appropriate defence measures based on comprehensive, accurate, and relevant information.

Communicating with stakeholders across the organisation

In order to justify their decisions and gain access to necessary resources, executive protection teams must effectively communicate risk to relevant stakeholders across the organisation.

But without concise reporting created with high-level consumption in mind, stakeholder communication can be yet another roadblock preventing executive protection teams from taking quick and effective action.

‘Finished intelligence’ reports are designed for dissemination to high-level stakeholders, offering bulleted key takeaways highlighting need-to-know information without having to read through a full report, followed by lengthier, more detailed reporting of interest to front-line defenders.

This eliminates the need to further distil intelligence for internal audiences, freeing up additional time for building an effective defence strategy.

Assessing executives’ online exposure

The internet’s integral role in daily life can lead to a surprising wealth of information about individuals ending up online, and business leaders are no exception.

As such, in a broader, strategic sense, executive protection extends beyond physical security to encompass digital exposure as well.

It is crucial for organisations to be aware of any potentially damaging or sensitive information pertaining to executives available online.

However, since personal data may be spread across various social media platforms, web archives, and in some cases, illicit dark web communities, many teams lack the capacity or ability to fully assess online exposure.

To address this capabilities gap, organisations can leverage individualised executive exposure reports gathered by external analysts to assess what information is out there and determine appropriate mitigation measures and contingency plans.

Given the importance of protecting business leaders and their data, failure is not an option when it comes to acknowledging and anticipating relevant threats.

Aerohive launches guide to cloud-managed network access control
NAC for Dummies teaches the key aspects of network access control within enterprise IT networks and how you can secure all devices on the network.
Sungard AS named DRaaS leader by Forrester
It was noted for its disaster-recovery-as-a-service solution’s ability to “serve client needs at all stages of their need for business continuity.”
Gartner: The five priorities of privacy executives
The priorities highlight the need for strategic approaches to engage with shifting regulatory, technology, customer and third-party risk trends.
Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.