This episode of The Intel Cycle delves into the art and science of gathering and evaluating cyber intelligence. Host Vince Peeler explores the best practices for collecting threat data, leveraging internal (organic) and external (inorganic) sources to build a robust intelligence program. From network logs and endpoint detection to Open-Source Intelligence (OSINT) tools like Authentic8’s Silo for Research, Flashpoint’s Managed Attribution, and Hunchly 2.0, Vince highlights how organizations can collect actionable intelligence while maintaining operational security.
The episode also focuses on evaluating the quality and reliability of collected intelligence. Listeners will learn about key methodologies like the Admiralty Scale, confidence levels, and structured analytical techniques to assess source reliability and information credibility. Practical examples and best practices are provided to help organizations ensure their intelligence is accurate, actionable, and aligned with strategic goals.
Whether building a new cyber intelligence program or refining your existing strategies, this episode offers actionable insights and essential tools to enhance your intelligence operations. Don’t miss this comprehensive guide to collection and evaluation in cyber intelligence.
Share this post