The IWP Cyber Intelligence Initiative (Ci2) is a professional education program of The Institute of World Politics. IWP Ci2 was designed by business leaders and national security experts to help both government and corporate executives better understand the intelligence and counterintelligence aspects of cyber security and how to use intelligence and counterintelligence methods to increase security and reduce business risk. Cyber vulnerabilities are usually understood to be technical ones that require technological solutions. However, at least half of cyber vulnerabilities are human: including a lack of threat awareness, poor computer hygiene, and ignorance of how hostile intelligence organizations operate and exploit human failings.
Ci2 offers professional development seminars on topics like: cyber strategy development, cyber intelligence analysis, and protective security through counterintelligence.
To learn more about IWP CII programs, please visit www.cyberintelligenceinitiative.org.
cy · ber in · tel · li · gence \ ˈsībər inˈteləjəns \ 1: PRODUCT a) assessment of an adversary's capabilities, intentions and activities resulting from the collection, processing, integration, analysis, and interpretation of information needed to secure digital property and assets; b) evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice about an existing or emerging menace or hazard that can be used to enhance threat awareness and inform decisions on how to respond to that menace or hazard; and c) the use of protective security and counterintelligence methods to protect digital property and assets; 2: PROCESS the collecting and processing (including pattern analysis) of relevant cyber information -- including the intentions, capabilities, opportunities, and cyber operations of foreign countries, non-state actors, and their agents -- which is needed by governments for their national security policies and by non-governmental organizations for their business and other purposes; and b) distinguishing between technical and human vulnerabilities and the use of both defensive and offensive counterintelligence concepts to address the latter.