Adversary Perspective – Simulation or Out of the Box?

Adversarial mindset is important to any security program whether you are protecting a Fortune 500 company, critical infrastructure, a high net worth person or yourself. We discussed some of the elements of using adversarial mindset here: http://iprotectiveconcepts.com/4-steps-to-taking-the-adversarys-perspective-and-enhancing-your-security/. I should empathize at this point I am mainly looking at protection against physical threats and not looking…

Loose Lips: Recognizing and Avoiding Elicitation

In discussing social engineering and threats to your personal security we mentioned elicitation.  Elicitation is a technique that is used by an adversary to get a person to unintentionally divulge more information about a particular subject than they normally would.  Its used to gather confidential or proprietary information and in the realm of personal security…

Using Threat Info in the Context of Business Operations

  When evaluating threat information, especially information received from subscription security intelligence services which are produced for a broad audience, it is essential to view them in the context of your company’s operations.  Many, if not most providers, use a color and/or numerical rating to designate the risk level of a particular city or country. …

Utilizing Local Sources for Threat Intelligence

Local sources of information can be immensely valuable when assessing the threat level at a location.  These local sources may include host country national employees, expatriate employees or expatriates affiliated with another organization, employees of vendors or others.  They are often able to provide excellent insight as they are there on the ground in the…

Evaluating & Choosing Private Intelligence Providers

How does management identify and monitor these threats in different locations around the world?  Many companies subscribe to one or more of the private security intelligence providers that are available.  While some of these firms use the term intelligence to describe their products and services, others use terms like risk reporting, assessment & analysis and…

Tactical vs. Strategic Intelligence

Intelligence needs related to security will largely be determined by the type of operation a company has in a particular location, the size of the footprint, number of personnel, amount of infrastructure and assets, etc.  As an example, a company involved in oil, gas or mining operations with extensive and costly infrastructure will typically need…