Operational Levels of Cyber Intelligence

Troy Mattern, Deputy Head of Cyber Security at the Zurich Insurance Company Ltd., is also Chairman of the Cyber Intelligence Task Force of the Intelligence and National Security Alliance (INSA). Previously the European Response Lead at Zurich Insurance, and Technical Director for Cyber Intelligence at the Software Engineering Institute, he is a graduate of the University of Arizona and the American Military University. A retired U.S. Marine Corps intelligence officer, Mr. Mattern has also served as Military Executive Assistant to the Deputy Commander of the United States Cyber Command in the U.S. Department of Defense.

[1]  Richard D. Graubart,et al.  Improving Cyber Security and Mission Assurance Via Cyber Preparedness (Cyber Prep) Levels , 2010, 2010 IEEE Second International Conference on Social Computing.

[2]  Derek S. Reveron,et al.  Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World , 2012 .

[3]  Ramon Casadesus-Masanell,et al.  From Strategy to Business Models and onto Tactics , 2010 .

[4]  Patrick Brézillon,et al.  Framing decision making at two levels , 2010, DSS.

[5]  Klaus Julisch Understanding and overcoming cyber security anti-patterns , 2013, Comput. Networks.

[6]  Sherali Zeadally,et al.  Securing Cyberspace in the 21st Century , 2013, Computer.

[7]  Jay McAllister,et al.  SEI Innovation Center Report: Cyber Intelligence Tradecraft Project: Summary of Key Findings , 2013 .

[8]  Frédéric Adam,et al.  Proceedings of the 2010 conference on Bridging the Socio-technical Gap in Decision Support Systems: Challenges for the Next Decade , 2010 .

[9]  B Vossekuil,et al.  Threat assessment: defining an approach for evaluating risk of targeted violence. , 1999, Behavioral sciences & the law.

[10]  E. Malone,et al.  The “wicked problem” of cybersecurity policy: analysis of United States and Canadian policy response , 2013 .

[11]  Song Chen,et al.  Human perspective to anomaly detection for cybersecurity , 2013, Journal of Intelligent Information Systems.

[12]  Eric Michael Hutchins,et al.  Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .

[13]  Randy Borum,et al.  Thr eat assessment: Definin g an approach to assessing risk for targeted violence , 1999 .

[14]  Si Li,et al.  Risk-Based Models of Attacker Behavior in Cybersecurity , 2013, SBP.

[15]  Daojing He,et al.  How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway? , 2014, IEEE Intelligent Systems.

[17]  Nasir D. Memon,et al.  Winning Cybersecurity One Challenge at a Time , 2012, IEEE Security & Privacy.

[18]  Newton Lee Cyber Attacks, Prevention, and Countermeasures , 2015 .

[19]  So Jeong Kim,et al.  Study on the Development of Early Warning Model for Cyber Attack , 2011, 2011 International Conference on Information Science and Applications.