Before designing and implementing a protective intelligence program, we must first outline the “why”.
As part of this, a comprehensive look at the assets being protected and the threats and vulnerabilities associated with them must be conducted. In most cases, this includes a thorough assessment of the digital footprint of the people or business entity being protected to identify what publicly available information can be exploited.