CIP 6 Point Plan
"Bridging the communication gap between technical cyber teams, intel analyst teams and executive decision makers should be a high-priority objective." - Intelligence and National Security Alliance (INSA) White Paper 2015
OUR UNIQUE SOLUTION
“Cyber security is all too often thought of as an IT issue, rather than the strategic risk management issue that it actually is…” NCSC-GCHQ
Cyber Intelligent Partner's (CIP) tailored workshops and seminars train professionals to think and act outside an IT-only cyber solution.
CIP’s unique programs focuses on 6 critical elements in our CIP 6-Point Plan©
CIP's unique Professional Education Platform (PEP) focuses on 6 critical elements in our CIP 6-Point Plan©:
1. CYBER IQ ASSESSMENT TOOL:
What is your Cyber IQ? A proprietary Cyber Assessment Tool is given to each participant to fill out, allowing for an initial snapshot understanding of current skills, cyber plan, practices, procedures. This will become the foundation to build upon more effectively.
2. TRAINING WORKSHOPS:
CIP and Partner's present a tailored mix of cyber intelligence courses and concepts to upskill professionals and gain an integrated Tech Team-Intel Analyst Team-Decision Makers understanding and action plan.
3. "BRIDGE THE GAP":
How an organization’s Tech Teams-Intel Analyst Teams-Decision-Makers must work together to “Bridge the Gap” of understanding between the IT, Operational and Business perspectives of a cyber security action plan.
4. THREAT PROFILES:
Why is an organization a prime target to certain adversaries? Understanding the Geopolitical realities of today will help identify Threat Actors. We focus on the methods, motivations, and capabilities of likely adversaries. Think like your adversaries, and anticipate, defend more effectively against future attacks.
5. ANALYTICAL WAR GAME EXERCISES
A Cyber Intelligence war game simulation. A WDC proprietary software platform (AWG-C), presents an experiential training exercise incorporating the adversary methods and concepts an organization needs most.
6. CYBER CHANGE MANAGEMENT TOOL:
A “roadmap” including critical steps that enable executives and relevant employees to understand what actions are necessary to make and maintain desired changes, creating a lasting, more comprehensive, and effective cyber security program.
"Bridging the Gap” requires a more strategic and cross-functional approach among an organization’s three key groups: technical teams, intelligence analysts and decision makers.
"Bridging the gap"
why is this important?
"Understanding WHY your organization was attacked is just as important, if not more important than knowing who attacked you and how." - Defense Intelligence Officer for Cyber, Defense Intelligence Agency (2015)
Understanding the key drivers motivating cyber threat actors is critical to identifying potential vulnerabilities, directing resources towards defending critical assets, and developing an effective cyber defense.
A comprehensive security plan requires organizations to integrate their technical teams, intelligence analysts and decision makers to answer these fundamental questions: