Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Orienting Intelligence Requirements to the Small Business Space
Published:
December 12, 2023

Orienting Intelligence Requirements to the Small Business Space

By:
Joe Slowik
Share icon
Glitch effectGlitch effectGlitch effect

The discipline of intelligence, particularly in the context of cyber operations, features a number of formal concepts and processes that may appear distracting or irrelevant to the practical needs of small to medium-sized businesses (SMBs). While intelligence requirements, including priority intelligence requirements (PIRs) and similar concepts, play a crucial role in national security, the conventional methods of developing, refining, and documenting these requirements may seem burdensome for the SMB level.

However, a balanced approach is essential and can be achieved by focusing on the organizational benefits of intelligence requirements without getting bogged down in excessive processes.

Intelligence & Decision Making

Intelligence as a concept is primarily concerned with decision making, but not for its own sake. Stakeholders within the organization, whether a gigantic military power or even a small printing shop, must make decisions in the face of uncertainty. Intelligence works to reduce—but not eliminate—this uncertainty to enable better, more relevant actions within the scope of the organization’s goals. As seen in the following chart, we can view intelligence as a practice where the universe of all possible observations is whittled down through collection to relevant data points, which in turn are refined into information and finally completed intelligence through processes of analysis and production.

Process of intelligence refinement

Refinement of Observations Into Intelligence

The end result of this refinement should be relevant guidance and similar assistance to drive organizational decision making. In the broadest sense, this can range from business intelligence items such as pricing and investment strategies to competitive intelligence on what organizational rivals seek to achieve. For our purposes, we are focusing on cyber threat intelligence (CTI).

CTI is typically viewed as a stream of indicators or other technical observables for populating firewall block lists or similar. Yet this ignores the huge array of potential decisions around information technology, the use of such technology, and the policies governing it that intelligence can meaningfully inform and improve. For example, intelligence can help guide investment in products (beyond security-specific items) based on observations of the threat landscape, determine policies such as migration to cloud services, or even inform the type and nature of security awareness training offered by the organization. Both practitioners and consumers of CTI must break free of an overly specific view of this discipline and embrace a wider perspective, understanding the variety of decisions that are supported and improved through its application.

However, the expansive view of CTI poses a problem. Within this much wider field of responsibility, where does CTI focus its efforts, and what priorities exist for its exercise? With unlimited time, resources, and personnel, this may be irrelevant as all possible avenues of interest can be investigated simultaneously—but no organization exists with this mixture of unlimited capacity. Instead, limited resources in terms of personnel, time, and technical sources of information need to be prioritized to align with the organization’s goals, and the decisions most important and relevant to its success.

The Need For Requirements

At this moment, the necessity of intelligence requirements becomes obvious. In a resource-constrained environment, a thorough review and analysis of requirements becomes an invaluable mechanism to guide intelligence analysis and production toward the areas most relevant and beneficial to the supported organization. Intelligence requirements are thus not about intelligence itself, but rather focused on how intelligence and its outputs relate to the supported organization.

Within the scope of large organizations, developing accurate, meaningful requirements can be a long, complex process. Done properly, requirements would investigate the organization’s purpose and objectives, the processes through which those objectives are achieved, and then identify the key decision makers behind these specific processes. These stakeholders can then be interviewed to determine needs, identify knowledge gaps, and focus intelligence efforts throughout the intelligence cycle.

The Intelligence Cycle

Within CTI specifically, stakeholders emerge from the Chief Information Security Officer (CISO) or equivalent down to the Security Operations Center (SOC) lead, with multiple potential intermediate entities in between. Collection efforts will be driven by the problems and concerns facing these audiences, with follow-on refinement, analysis, and production looking to address the decisions these stakeholders must make. Finally, feedback enters into the equation to determine how appropriate the resulting intelligence products are, from indicator feeds for the SOC to informed policy guidance for the CISO, for the desired outcomes and necessary decisions facing these audiences.

While we can admire the thoroughness of this approach and note its benefits in driving an accurate, evidence-driven methodology to build and guide an intelligence program, we also must admit a critical shortfall. The described methodology of intelligence requirement building is costly. These costs extend from the personnel to perform such in-depth analysis to the time required to do such analysis well. Such costs may be difficult to justify or, for smaller organizations lacking a significant or independent CTI function, impossible to bear. Thus, there is a temptation to forgo the requirements process and allow whatever CTI resources are available to do what they think is “best” based on CTI’s own perception of needs and values.

This independent action may end up producing good results, but if so, such outcomes are almost more due to luck than skill. Particularly within the context of complex organizations, understanding complete organizational functionality and dependencies is a lot to ask of any individual, let alone prioritizing how these functions relate and which require the most support. Within strictly defined information security functions, we may assume CTI can likely scope this narrower field adequately, but even here risks remain.

Threat intelligence for IT teams

For example, cursory reviewing of most major media reporting—such as what would land on the desktops of key organization decision makers—would stress state-sponsored disruption and similar items as appearing most relevant and severe for an entity, while a more hard-nosed review of data and impact scenarios might identify ransomware and business email compromise (BEC) as most critical to the organization itself. Bridging this gap, getting buy-in for the analysis produced, and understanding how and why these analytical approaches are relevant or reflected in organizational decision making are vital tasks to ensure the relevance and eventual application of CTI.

Simply, CTI left to its own devices remains aloof. CTI can still function, produce outputs, and maybe even justify its existence in some cases, but it will be unmoored from the primary purposes and goals of the organization itself. CTI thus becomes so much “frictionless spinning in a void” rather than a critical support mechanism for security decision-making.

Translating Requirements Beyond Enterprise Needs

The case for large, well-resourced organizations seems clear. But what about smaller entities who face similar decisions and security risks, but have nowhere near the resources to engage in such a process?

In these circumstances, we—as either CTI practitioners or consumers—benefit from looking at the requirements process as a continuum of possible outcomes, rather than a binary decision. Namely, there is a range of potential requirements available to us, extending from ignoring the requirements process entirely to the thorough interview and integration actions described previously. For the SMB (or hospital, school district, or local government), a CTI requirements process lies somewhere between these extremes, driven by a combination of that entity’s capacity to drive the process and the risk faced in failing to adequately do so.

Continuum of Intel Gathering

SMBs must balance the benefits of requirements development with the costs of doing so to arrive at some satisfactory compromise. One key mechanism driving this point is understanding what the organization (or its service providers) cannot do organically, and seeking external support when necessary.

In the case of business intelligence, core SMB decision makers do not have an analytical department producing in-house market analysis—but key decision makers will leverage trade publications and similar media to remain informed of the environment to ensure some understanding beyond the organic capacity of the organization. Similar solutions should, therefore, be sought after in other fields, including the realm of CTI, given the importance of information systems to the health and continued operation of nearly all organizations in the modern economy.

We thus arrive at outsourcing the CTI process, and even many of the requirements development items, to third parties that can aggregate efforts across multiple organizations to scale vision and effort adequately and effectively. This sounds deceptively simple, but for smaller decision makers (or the service providers acting on their behalf within the IT realm), it is critical to identify those providers that are specifically attuned to the needs of and threats to these organizations. Thus, some critical assessment and filtering is necessary, as intelligence outputs that are perfectly relevant and satisfactory for a government security service or large commercial enterprise will often be nearly useless for the SMB or service provider focused on such entities.

For the SMB recognizing the need to drive IT investment and decision making through an intelligence-informed process, or the service providers that do so on behalf of multiple such entities, critical questions emerge:

  • Does a provider understand and acknowledge the risk profile of my organization, or the organizations I support?
  • Does a provider engage with entities such as myself to continuously learn about the concerns facing such organizations, and refine that understanding over time?
  • Does that provider deliver outputs that are relevant to and actionable for my security decision making?
  • Are the costs associated with this provider justifiable and reasonable for the value added or created through a possible partnership or vendor relationship?

Nearly all of these questions have equivalents within an internal requirements generation process, but here, they are simplified into procurement-type language to drive the outsourcing of CTI functions for organizations that simply cannot build such capacity organically. In this manner, the organization (or service provider acting on the organization’s behalf) arrives at a place in the middle of our earlier requirements continuum, gathering some of the benefits of a requirements generation process while avoiding the steep costs of a full CTI requirements endeavor. The result should be incorporating an external resource for CTI and similar intelligence that can benefit decision-making for the SMB or service provider, and therefore drive better value creation and more efficient resource allocation.

Conclusion

Intelligence without requirements can exist, but will often find itself lost or irrelevant. However, developing and refining requirements is a time-consuming, expensive process itself.

For resource-limited organizations like SMBs, finding a balance between simply forgoing intelligence support and unachievable intelligence outcomes is necessary. Identifying those parties that align best with the needs of the organization and understanding the type of decisions facing such an organization are also critical to ensure success. Ignoring or overlooking the relevance of a potential CTI source to the defended organization or partner entities risks wasting resources, while omitting such support entirely means critical decision makers will remain in the dark concerning items vital to the entity's survival and growth.

Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action.

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).
Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy