As you build or reevaluate your program, it’s important to consider:
Risk Assessment and Planning
Before designing and implementing a program, ask yourself why a protective intelligence program is needed and what protective security challenges it will help address
Intelligence Collection
This includes a set of systems and processes to collect threat information and can be mini-programs into themselves
Case Management
Leverage technology that factors in patterns in activity over time and allows teams to automate tasks that previously took significant time away from actioning threats