Use cases demonstrate the enterprise-wide appeal of Business Risk Intelligence (BRI). Credit: Thinkstock The main reason I’m such an avid supporter of Business Risk Intelligence (BRI) is because it provides value not just to cybersecurity teams but also to all business units across an enterprise. But how does BRI do this? As someone who has spent the last few years helping companies integrate BRI into their business strategies, I get asked this question fairly often. Here are a few use cases that demonstrate BRI’s enterprise-wide appeal with regard to the following business units:Insider threat teamsAlthough most insider threat teams leverage certain types of intelligence to varying degrees, many rely largely on insider threat program (ITP) tools to support their threat detection efforts. Often marketed as all-in-one solutions, ITP tools combine and analyze disparate datasets to detect suspicious user behavior. As is the case with any security or intelligence offering, however, solutions that are truly all-in-one don’t really exist.Rather than reactively searching for threats, BRI complements ITP tools by enabling teams to proactively monitor for malicious activity and identify trends. In one situation, a BRI-led investigation helped an insider threat team identify a post on a cybercrime forum offering the sale of source code from unreleased software owned by a multinational technology company. When subsequent analysis determined the actor was a company employee, the team was able to safeguard the source code and work with law enforcement to take appropriate action against the rogue employee.Physical security teamsUpholding physical security has only grown more complicated in recent years as the cyber and physical threat landscapes become intertwined and adversaries’ motivations and capabilities evolve. But unlike their cybersecurity counterparts, physical security teams tend to have little exposure to intelligence derived from the cyber domain. This is largely because prior to BRI, most commercial-sector applications of such intelligence were—and still are—limited to cybersecurity and network defense initiatives. It’s crucial to remember, however, that just a because a threat or indicator originates online doesn’t mean its scope of influence will remain online. This is why BRI derived from the underground communities where physical adversaries congregate is so valuable. It can augment physical security efforts and help teams more effectively identify and mitigate physical risks.For example, with regard to executive protection, when a well-known CEO planned to attend a popular public event, his company leveraged BRI gleaned from a Deep Web forum to identify and assess the risk posed by previously unknown physical threat actors located in the vicinity. This intelligence enabled the company’s executive protection team to leverage a threat-based approach by deploying security resources in high-priority areas to protect their CEO during the event. Business development teamsBusiness development initiatives, by nature, expand the surface area upon which a threat can manifest. For business development teams that routinely establish and develop external partnerships or pursue M&A engagements, due diligence on target companies is essential.Because BRI can provide insight into any emerging threats that could potentially compromise the integrity of an upcoming M&A engagement or business partnership, it can be an invaluable resource for business development teams during the due diligence process.In one scenario, BRI derived from an elite Russian underground forum revealed an actor seeking hackers-for-hire to harvest proprietary M&A information from numerous top-tier law firms. This intelligence provided the named law firms with advance notice of the impending scheme, enabling them to safeguard their clients’ information and ultimately uphold the integrity of their M&A engagements.Anti-fraud teamsFraud, as I’ve written previously, is one of the most persistent and multifaceted threats facing transactional lines of business. Combating fraud effectively requires a comprehensive and proactive strategy driven by intelligence—particularly that which sheds light on emerging schemes, social engineering tactics, and fraudsters’ motivations, adaptations, and capabilities. This is why BRI has become essential for anti-fraud teams.One BRI use case with which I’m familiar illustrates this concept especially well. Just prior to the U.S. implementation of Europay, MasterCard, and Visa (EMV) several years ago, BRI derived from a Dark Web forum revealed that fraudsters had developed EMV-chip recording software and manufacturing techniques to fabricate chip-enabled credit cards capable of bypassing EMV security measures. This intelligence enabled financial institutions involved in the upcoming EMV launch, as well as retailers and payment processors, to adjust their launch strategy and anti-fraud measures accordingly, thereby stymieing the large-scale scheme before it was deployed.The above use cases demonstrate why it has become imperative for intelligence—and BRI in particular—to be integrated within not just cybersecurity initiatives but all business units across an enterprise. Indeed, when decision-makers broaden their mindsets and strategies pertaining to the value and function of intelligence, their organizations can become better positioned to proactively identify and mitigate the various cyber and physical risks they face. Related content opinion Fighting fraud: Tips for getting ahead of the ever-evolving threat Fraud is largely inevitable but fighting it doesn’t have to be fruitless. Chris Camacho shares tips to help businesses combat this threat more effectively. By Chris Camacho May 16, 2018 5 mins Fraud Hacking Technology Industry opinion How to hire the right analysts for your intelligence program As someone who’s been deeply involved in virtually every aspect of hiring and job-seeking in security and intelligence, I can attest firsthand that while the process is rarely easy, it’s worth the effort. By Chris Camacho Apr 12, 2018 5 mins Technology Industry IT Skills Staff Management opinion How to create a ‘gold standard’ intelligence program Regardless of the extent to which a business relies on third-party offerings, attaining a gold-standard intelligence program means leveraging intelligence in a manner that addresses enterprise-wide risk and provides a decision advantage over the broa By Chris Camacho Mar 29, 2018 7 mins Technology Industry IT Governance Data and Information Security opinion How do I BRI? Regardless of the threats, risks and security challenges a business may face, it’s crucial to recognize that having the right approach to intelligence has truly become a requirement. By Chris Camacho Feb 09, 2018 5 mins Phishing Technology Industry Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe