The Definitive Guide to Establishing a Modern Protective Intelligence Program

What makes up a protective intelligence program, exactly? This guide describes the individual elements as they apply to the six core elements of the intelligence cycle.

This site is protected by reCAPTCHA and the Google
Privacy Policy and Terms of Service apply.


As you build or reevaluate your program, it’s important to consider:

Risk Assessment and Planning

Before designing and implementing a program, ask yourself why a protective intelligence program is needed and what protective security challenges it will help address

Intelligence Collection

This includes a set of systems and processes to collect threat information and can be mini-programs into themselves

Case Management

Leverage technology that factors in patterns in activity over time and allows teams to automate tasks that previously took significant time away from actioning threats