A White Paper Collaboration from Ontic Technologies & Concentric Advisors
In recent years, organizations ranging from Fortune 500 companies to non-profits, from governments to family offices, have all been forced to grapple with the security threat that persons of interest (POIs) pose to their employees and assets. POIs are motivated by a variety of factors including financial, personal, and work-related grievances, whether real or imagined. POIs range from disgruntled former employees to mentally ill “stalkers.” To manage this threat, many organizations have established protective intelligence programs that identify, assess, and monitor POIs and related security threats before they yield tragic results.
One of the single greatest problems that plagues protective intelligence teams and program managers is the problem of “fragmented” or “disparate” data. Fragmented data is the disconnect between the security intelligence data that you already have (relating to POIs, incidents, issues, entities, etc.) and the new data that you are acquiring daily, which seems to pile up faster than it can be processed. Many protective intelligence teams have years of data relating to an untold number of threats and threat actors, but no practical means to analyze it for patterns and trends.
Our collective experience serving as trusted service partners supporting various protective intelligence teams and implementing threat hunting initiatives for clients around the globe, points to one over-arching problem for corporate protective intelligence programs:
Each protective intelligence program’s stored data has incredible potential to facilitate early identification of emerging threats, but many organizations lack a practical method for tapping into this data and unfortunately lose insights that would increase its value.
We believe that leveraging purpose-built technologies can allow an experienced analyst to arrive more quickly at deeper risk insights, while repeatedly producing results that drive positive outcomes for stakeholders.