Professional Services

Our Approach

The primary focus of our professional services offerings is filling niche gaps in cybersecurity and cyber-intelligence operations. Our secondary focus is structuring those services to educate and prepare the client to eventually transition the capabilities to internal personnel; should they have the desire. Our analysts and operators have extensive experience with cyber intelligence operations in the public and private sectors, and can deliver top-tier outcomes while also elevating the skills and knowledge of your personnel.

  • Our table-top exercises (TTX) can help evaluate the efficiency of your cyber-intelligence operations, as well as their effectiveness in enhancing other cybersecurity functions. We can do this by delivering a TTX focused exclusively on evaluating processes within the cyber-intelligence capability, or by integrating a cyber-intelligence element into a larger security exercise. Each TTX we deliver is customized in collaboration with the client to ensure a best-fit solution that optimizes performance assessment. Components of a TTX include:

    • Leadership engagement and TTX scoping

    • Scenario and materials development

    • Exercise administration and post-exercise hot wash

    • Detailed after-action reports with recommendations

  • A cyber intelligence program is more than the sum of its tools and data. An effective cyber intelligence program employs methodologies and processes developed in the context of the goals and operational realities of the organization; including budget, experience & skills of personnel, and adjacent cybersecurity functions. Our team helps you avoid the pitfalls associated with purchasing inputs without plan by helping you validating needs, identifying best-fit solutions, and developing the methodologies and processes that will ensure maximum return on investment. Capabilities we’ve developed for clients include:

    • Dark-web collection & analysis

    • Malware repository development

    • Security-data aggregation and transformation

    • Our leadership-advisory services provide a dedicated subject matter expert (SME) to support senior leaders and executives operating within—or with responsibility for—cyber-intelligence operations. This service is for leaders transitioning into a cyber intelligence role as well as seasoned executives, such as CISO, seeking guidance and best practices for applying cyber intelligence. Engagements are tailored to your needs and may include:

    • Developing policy, strategy, and implementation plans

    • Preparing for executive briefings and GRC reviews

    • Creating foundational and operational documentation such as program charters, intelligence requirements, and staffing plans

  • A robust intelligence and collection requirements (ICR) program is key to delivering positive, repeatable outcomes to stakeholders. IntL8 has the necessary understanding of processes and tools to help you develop and deploy an ICR program within your cyber intelligence operation. Based on your desired end state, our team can administer the program indefinitely or transition it to your personnel. ICR services can include:

    • Identifying and engaging stakeholders

    • Developing and documenting ICR

    • Integrating ICR with your Threat Intelligence Platform

    • Supporting strategy sessions for process improvement