Priority Intelligence Requirements are hardly static in nature. They are stakeholder-driven. Intelligence professionals should follow the instructions in the following document to assist in preparing and managing intelligence requirements. PIRs may have technology components but they should not be driven by indicators of compromise (IoCs). IoCs help identifies malicious activity already in your environment and should align to cyber hygiene actions. Download the file below. 

Contact Treastone 71

Contact Treadstone 71 Today. Learn more about our Targeted Adversary Analysis, Cognitive Warfare Training, and Intelligence Tradecraft offerings.

Contact us today!