Services

Threat Intelligence Program Development

For organizations that are ready to make strategic investments in security and proactively protecting their brand, employees, and assets. Go beyond having and Information Security Program and develop a true Enterprise Threat Intelligence Program that serves the entire organization.


The Problem: Reactive, Autonomous, Mutually Exclusive Security Functions

Organizational "security programs" are predominantly reactive, protecting and defending in response to an active threat. Even actions considered to be "proactive" are essentially related to an indicator of compromise, which means someone else was affected and shared details that allowed others to avoid being vicitmized. Additionally, secuirty in organizations is usually stove-piped, segregated, and/or minimally (if at all) collaborative. Rather than being woven in to the fabric of the organization and functioning as an ecosystem where physical, techincal (network, application, device etc), and brand security are interdependant, they operate independantly and often autonomously. Technology has blurred the lines between security domains once thought to be mutually exclusive security functions, and organizations are unwilling or unable to create a true Security Ecosystem, one that is unified under one security leader, capable of being proactive, anticipating, and detering threats.

The Solution: An Enterprise Threat Intelligence Program

An Enterprise Threat Intelligence Program is multi-faceted and serves to enhance the security posture of the organization, protect your brand, employees and assets. It functions at all organizational levels: strategic, operational, and tactical. It seeks out potential threats, also known as indicators of attack (IoA) instead waiting for of indicators of compromise (IoC), thereby creating a more robust security posture. It is driven by business objectives, and takes proactive approach to protecting the organization holistically, unifying security efforts, and protecting your brand, assets, and employees. Threat Intelligence is the synthesizing element which brings security efforts together, reducing redundancy, optimizing efforts, and creating a healthy security ecosystem and culture.

Threat Intelligence Program Content

Divine Intel will help your organization develop a comprehensive Enterprise Threat Intelligence Program and work with key stakeholders to ensure their intelligence needs are identified and incorporated into the roadmap. As we work with you to build out your program, we help you avoid the most common mistakes by identifing the unique resource requirements for each phase, to include what to look for when hiring. Each client is unique, each Enterprise Threat Intelligence Program will look and operate differenly; however, we work to ensure each of the critical threat intelligence program core functions is incorporated into your program:

  • Planning & Governance
  • Data Collection
  • Data Processing
  • Information Analysis & Evaluation
  • Dissemination & Reporting
  • Action & Feedback

Benefits of an Enterprise Threat Intelligence Program

  • Reduced risk by identifying threats in their pre-attack phases
  • Reduced cost by reducing the time, money, and manpower spent on incident response
  • Reduced cost by reducing man hours spent on incident management because threats are found and addressed in advance
  • Consistently provide reliable, actionable information for C-Suite and other decision makers
  • Add value internally by providing information that enables critical adaptation of business operations
  • Add value externally by providing threat intelligence that allows others to make well-informed business decisions

Where does Threat Intelligence fit into an organization and what does it do?

To answer this question, let's take a look at one of the largest organizations that successfully leverages threat intelleigence, the Unites States military, and how its structure and functions commpare to commercial corporations.

Military commanders, even at the lowest strategic level, equivalent to a CEO, have the same basic staff functions at an enterprise level supporting them in achieving a mission. These staff roles are typically identified numerically as G1-4, and G6, and they are as follows: G1 is Human Resources; G2 is Intelligence; G3 is Operations; G4 is Logistics; G6 is Information Technology; and he has the commanders under him that perform the other necessary functions to succeed depending on the type of unit. In order for the commander to stay abreast of threats to his unit, he relies on threat intelligence and situational awareness reports from his Intelligence Team. All persons performing intelligence collection, processing, analysis, evaluation and reporting, fall under the senior leader of the Intelligence shop. They serve up, across, down and outside of the organization. First and most importantly they serve the Commander, providing him with intelligence information so that he may make well-informed decisions. In the corporate world, this can be anything from information about a potential acquisition, to a new phishing threat targeting C-levels or threat scenarios the organization should prepare for. They also serve across by providing intelligence information not only to the Commander, but also to the Operations, Information Technology, & Logistics departments. They also serve down the organization by passing threat/intelligence information down to the other commanders relevant to functions they perform or areas in which they are operating, equivalent to our Marketing or Sales departments. Finally they serve outside their immediate organization by sharing and collaborating on intelligence with other agencies and allied forces, equivalent to our industry partners and other threat intelligence teams or special interest groups.

Litigation Research Support

For anyone anticipating or actively invovled in litigation needing research or consultations related to online information and/or sources.

C-Suite Risk Assessments

For organizations interested in identifying risks related to personal information exposure of key personnel.

Digital Footprinting & Data Removal

For individuals who would like to reduce the information about them that is publicly available. Discounts are available for famillies, minors, veterans, law enforcement, and spouses/widows of veterans or law enforcement.

There are plenty of services offering to remove your information from the Internet for between $100 and $500, and they in fact get your information removed. However, within a matter of weeks or months, your data begins to slowly repopulate, and eventually you wind up paying for the services again. By design, this is a repeat business model because they never truly address the source of the problem: consumer behavior.

Luckily for you, we not only work to remove your personal data, but we also teach you how it populates so you can take back control of your privacy. This is one service where we hope to never have repeat customers, rather fully satisfied customers who recommend us to their friends and family. We offer various levels of data removal to meet different client needs, to include customers who just want to know what information is out there, to those who want to reduce spam and marketing calls/mailings/emails, and the few who truly want to take back their privacy.

The Problem:

Your personal information is scattered all over the Internet, and you don't know where to begin to remove it. This information could be used in multiple, even nefarious ways:

  • Stalking
  • Bullying
  • Identity theft
  • Pedophiles targeting minors
  • Potential employers "vetting" you through other parties
  • Scammers targeting you
  • Revenge
  • Litigation

The Solutions:

Personal Privacy Assessment (PPA)

The Personal Privacy Assessment (PPA) for one individual starts with a minimum of a 4-hour assessment; however, the total hours required for a comprehensive assessment will vary depending on client needs/request. A full report of findings and data sources is provided for the client. PPA clients receive 50% off the Hide Me or Erase Me service if purchased within 90 days of report delivery.

Inform Me

A service for customers who simply want to know what information is out there about them. Often, this service is best suited for people who simply do not have the time to write the letters and submit the inquiries to obtain their consumer reports. These reports reflect your consumer behavior such as your purchasing habits, vehicle accident history, prescription history, and a variety of other information used for targeted marketing. However, this same information can also be used to influence premiums and rates you are charged for services. Knowledge is not power until is it used, but you must first obtain it. Allow us to help you gain a better understanding of what information is out there about you and empower you to take action to have it removed and/or corrected as needed.

Stop the Madness

A service for customers whose goal is to reduce the insane junk mail, unwanted calls, and email spam. First, we teach you how your information is captured and later sold to whomever is willing to buy a list of names, phone numbers, and email addresses. We also work to understand what your tolerance level is for these kinds of marketing/mailings, review the pros and cons of different behavior changes, and then help you regain control of your phone, mailbox, and inboxes. This helps reduce the stress in your life, allows you to focus on the things that matter, and reduces the amount of noise you have to sift through on a daily basis. A biproduct of this service is an increase in personal security as you take back some of your privacy.

Hide Me

A service for clients who are serious about taking back their privacy. For clients who believe they have strong levels of privacy already, we recommend the Personal Privacy Assessment service This and the Erase Me service are heavily focused on educating clients on the ways in which their personal information is at risk on websites such as social media, their employer, and even "offical" sites. We do not accept clients for this service who are not committed to changing their behavior as we feel it would be unethical to take payment and put forth the effort knowing that it will be nullified shortly after completion.

Erase Me

A service for public officials, law enforcement (part-time,, full-time, or any other sworn-in capacity), identity theft victims, or clients at risk of physical harm.

Services Inform Me Stop the Madness Hide Me Erase Me
Consultation Time X X X X
Consumer Report Requests (up to 13 reports)^^ X X X
Credit Reports (up to 4 reports) X X X
Unsolicited Call Blocking Registration X X X
Pre-Screen Credit Offers Mail OptOut X X X
Marketing Mail OptOut X X X
Coupon Junk Mail OptOut X X X
Personal Data Removal from 100+ People Search Sites X X X
Personal Data Removal from Public Data Brokers X X
Personal Data Removal from Non-Public Data Brokers X X

^^ Does not include credit reports from Experian, Equifax, TransUnion, or Innovis. Rather these reports reflect your consumer behavior such as purchase habits, accident history, prescription history which can affect rates you are charged for services.

Threat Intelligence Program Development

For organizations that are ready to make strategic investments in security and proactively protecting their brand, employees, and assets. Go beyond having and Information Security Program and develop a true Enterprise Threat Intelligence Program that serves the entire organization.


The Problem: Reactive, Autonomous, Mutually Exclusive Security Functions

Organizational "security programs" are predominantly reactive, protecting and defending in response to an active threat. Even actions considered to be "proactive" are essentially related to an indicator of compromise, which means someone else was affected and shared details that allowed others to avoid being vicitmized. Additionally, secuirty in organizations is usually stove-piped, segregated, and/or minimally (if at all) collaborative. Rather than being woven in to the fabric of the organization and functioning as an ecosystem where physical, techincal (network, application, device etc), and brand security are interdependant, they operate independantly and often autonomously. Technology has blurred the lines between security domains once thought to be mutually exclusive security functions, and organizations are unwilling or unable to create a true Security Ecosystem, one that is unified under one security leader, capable of being proactive, anticipating, and detering threats.

The Solution: An Enterprise Threat Intelligence Program

An Enterprise Threat Intelligence Program is multi-faceted and serves to enhance the security posture of the organization, protect your brand, employees and assets. It functions at all organizational levels: strategic, operational, and tactical. It seeks out potential threats, also known as indicators of attack (IoA) instead waiting for of indicators of compromise (IoC), thereby creating a more robust security posture. It is driven by business objectives, and takes proactive approach to protecting the organization holistically, unifying security efforts, and protecting your brand, assets, and employees. Threat Intelligence is the synthesizing element which brings security efforts together, reducing redundancy, optimizing efforts, and creating a healthy security ecosystem and culture.

Threat Intelligence Program Content

Divine Intel will help your organization develop a comprehensive Enterprise Threat Intelligence Program and work with key stakeholders to ensure their intelligence needs are identified and incorporated into the roadmap. As we work with you to build out your program, we help you avoid the most common mistakes by identifing the unique resource requirements for each phase, to include what to look for when hiring. Each client is unique, each Enterprise THreat Intelligence Program will look and operate differenly; however, we work to ensure each of the critical threat intelligence program core functions is incorporated into your program:

  • Planning & Governance
  • Data Collection
  • Data Processing
  • Information Analysis & Evaluation
  • Dissemination & Reporting
  • Action & Feedback

Benefits of an Enterprise Threat Intelligence Program

  • Reduced risk by identifying threats in their pre-attack phases
  • Reduced cost by reducing the time, money, and manpower spent on incident response
  • Reduced cost by reducing man hours spent on incident management because threats are found and addressed in advance
  • Consistently provide reliable, actionable information for C-Suite and other decision makers
  • Add value internally by providing information that enables critical adaptation of business operations
  • Add value externally by providing threat intelligence that allows others to make well-informed business decisions

Where does Threat Intelligence fit into an organization and what does it do?

To answer this question, let's take a look at one of the largest organizations that successfully leverages threat intelleigence, the Unites States military, and how its structure and functions commpare to commercial corporations.

Military commanders, even at the lowest strategic level, equivalent to a CEO, have the same basic staff functions at an enterprise level supporting them in achieving a mission. These staff roles are typically identified numerically as G1-4, and G6, and they are as follows: G1 is Human Resources; G2 is Intelligence; G3 is Operations; G4 is Logistics; G6 is Information Technology; and he has the commanders under him that perform the other necessary functions to succeed depending on the type of unit. In order for the commander to stay abreast of threats to his unit, he relies on threat intelligence and situational awareness reports from his Intelligence Team. All persons performing intelligence collection, processing, analysis, evaluation and reporting, fall under the senior leader of the Intelligence shop. They serve up, across, down and outside of the organization. First and most importantly they serve the Commander, providing him with intelligence information so that he may make well-informed decisions. In the corporate world, this can be anything from information about a potential acquisition, to a new phishing threat targeting C-levels or threat scenarios the organization should prepare for. They also serve across by providing intelligence information not only to the Commander, but also to the Operations, Information Technology, & Logistics departments. They also serve down the organization by passing threat/intelligence information down to the other commanders relevant to functions they perform or areas in which they are operating, equivalent to our Marketing or Sales departments. Finally they serve outside their immediate organization by sharing and collaborating on intelligence with other agencies and allied forces, equivalent to our industry partners and other threat intelligence teams or special interest groups.

Litigation Research Support

For anyone anticipating or actively invovled in litigation needing research or consultations related to online information and/or sources.

C-Suite Risk Assessments

For organizations interested in identifying risks related to personal information exposure of key personnel.

Digital Footprinting & Data Removal

For individuals who would like to reduce the information about them that is publicly available. Discounts are available for famillies, minors, veterans, law enforcement, and spouses/widows of veterans or law enforcement.

There are plenty of services offering to remove your information from the Internet for between $100 and $500, and they in fact get your information removed. However, within a matter of weeks or months, your data begins to slowly repopulate, and eventually you wind up paying for the services again. By design, this is a repeat business model because they never truly address the source of the problem: consumer behavior.

Luckily for you, we not only work to remove your personal data, but we also teach you how it populates so you can take back control of your privacy. This is one service where we hope to never have repeat customers, rather fully satisfied customers who recommend us to their friends and family. We offer various levels of data removal to meet different client needs, to include customers who just want to know what information is out there, to those who want to reduce spam and marketing calls/mailings/emails, and the few who truly want to take back their privacy.

The Problem:

Your personal information is scattered all over the Internet, and you don't know where to begin to remove it. This information could be used in multiple, even nefarious ways:

  • Stalking
  • Bullying
  • Identity theft
  • Pedophiles targeting minors
  • Potential employers "vetting" you through other parties
  • Scammers targeting you
  • Revenge
  • Litigation

The Solutions:

Personal Privacy Assessment (PPA)

The Personal Privacy Assessment (PPA) for one individual starts with a minimum of a 4-hour assessment; however, the total hours required for a comprehensive assessment will vary depending on client needs/request. A full report of findings and data sources is provided for the client. PPA clients receive 50% off the Hide Me or Erase Me service if purchased within 90 days of report delivery.

Inform Me

A service for customers who simply want to know what information is out there about them. Often, this service is best suited for people who simply do not have the time to write the letters and submit the inquiries to obtain their consumer reports. These reports reflect your consumer behavior such as your purchasing habits, vehicle accident history, prescription history, and a variety of other information used for targeted marketing. However, this same information can also be used to influence premiums and rates you are charged for services. Knowledge is not power until is it used, but you must first obtain it. Allow us to help you gain a better understanding of what information is out there about you and empower you to take action to have it removed and/or corrected as needed.

Stop the Madness

A service for customers whose goal is to reduce the insane junk mail, unwanted calls, and email spam. First, we teach you how your information is captured and later sold to whomever is willing to buy a list of names, phone numbers, and email addresses. We also work to understand what your tolerance level is for these kinds of marketing/mailings, review the pros and cons of different behavior changes, and then help you regain control of your phone, mailbox, and inboxes. This helps reduce the stress in your life, allows you to focus on the things that matter, and reduces the amount of noise you have to sift through on a daily basis. A biproduct of this service is an increase in personal security as you take back some of your privacy.

Hide Me

A service for clients who are serious about taking back their privacy. For clients who believe they have strong levels of privacy already, we recommend the Personal Privacy Assessment service This and the Erase Me service are heavily focused on educating clients on the ways in which their personal information is at risk on websites such as social media, their employer, and even "offical" sites. We do not accept clients for this service who are not committed to changing their behavior as we feel it would be unethical to take payment and put forth the effort knowing that it will be nullified shortly after completion.

Erase Me

A service for public officials, law enforcement (part-time,, full-time, or any other sworn-in capacity), identity theft victims, or clients at risk of physical harm.

Services Inform Me Stop the Madness Hide Me Erase Me
Consultation Time X X X X
Consumer Report Requests (up to 13 reports)^^ X X X
Credit Reports (up to 4 reports) X X X
Unsolicited Call Blocking Registration X X X
Pre-Screen Credit Offers Mail OptOut X X X
Marketing Mail OptOut X X X
Coupon Junk Mail OptOut X X X
Personal Data Removal from 100+ People Search Sites X X X
Personal Data Removal from Public Data Brokers X X
Personal Data Removal from Non-Public Data Brokers X X

^^ Does not include credit reports from Experian, Equifax, TransUnion, or Innovis. Rather these reports reflect your consumer behavior such as purchase habits, accident history, prescription history which can affect rates you are charged for services.