Intelligence to Risk
Subscribe
Sign in
Home
Archive
About
New
Beyond the Code: Unearthing the Subtle Business Ramifications of Six Months in Vulnerabilities
At Recorded Future, we’re determined to iteratively answer the “So What? Now What?” (SW/NW) questions, which some intelligence professionals…
Sep 7
•
Levi Gundert
and
David C
1
Share this post
Beyond the Code: Unearthing the Subtle Business Ramifications of Six Months in Vulnerabilities
intelligence2risk.substack.com
Copy link
Facebook
Email
Notes
Other
The Risk Business: Second Edition
What Leaders Need to Know About Intelligence and Risk-Based Security
Sep 5
•
Levi Gundert
3
Share this post
The Risk Business: Second Edition
intelligence2risk.substack.com
Copy link
Facebook
Email
Notes
Other
August 2023
From Direct to Distant: The Challenge of Third and Fourth-Party Digital Risk Management
On July 31, The Information published an article titled “In an Unusual Move, Nvidia Wants to Know Its Customers’ Customers.” It occurred to me that…
Aug 15
•
Levi Gundert
4
Share this post
From Direct to Distant: The Challenge of Third and Fourth-Party Digital Risk Management
intelligence2risk.substack.com
Copy link
Facebook
Email
Notes
Other
July 2023
Cyber Attacks on NGOs: The Underreported Threat to Global Humanitarian Work
Cyber events can cause risk impacts that extend beyond business. Last week The Record reported the Norwegian Refugee Council (NRC) was victimized by a…
Jul 18
•
Levi Gundert
2
Share this post
Cyber Attacks on NGOs: The Underreported Threat to Global Humanitarian Work
intelligence2risk.substack.com
Copy link
Facebook
Email
Notes
Other
May 2023
Beyond the Surface: Unlocking Second-Order Thinking for Enhanced Risk Analysis
A foundational layer of the I2R (Intelligence to Risk) pyramid features second-order thinking to derive implications. This work is rarely…
May 2
•
Levi Gundert
6
Share this post
Beyond the Surface: Unlocking Second-Order Thinking for Enhanced Risk Analysis
intelligence2risk.substack.com
Copy link
Facebook
Email
Notes
Other
March 2023
From Crypto to Fiat: Sneaky Ways Cybercriminals Dodge KYC/AML
In the 1995 film “The Net,” Sandra Bullock’s character, Angela Bennett, orders a pizza online from pizza.net, the infamous “first thing sold online…
Mar 23
•
Dylan
and
Levi Gundert
1
Share this post
From Crypto to Fiat: Sneaky Ways Cybercriminals Dodge KYC/AML
intelligence2risk.substack.com
Copy link
Facebook
Email
Notes
Other
Understanding Adversary Cyber Infrastructure
A Guide for Executives
Mar 15
•
Levi Gundert
3
Share this post
Understanding Adversary Cyber Infrastructure
intelligence2risk.substack.com
Copy link
Facebook
Email
Notes
Other
February 2023
The Death of Private Sector Priority Intelligence Requirements
"PIRs"
Feb 14
•
Levi Gundert
and
Stu Solomon
9
Share this post
The Death of Private Sector Priority Intelligence Requirements
intelligence2risk.substack.com
Copy link
Facebook
Email
Notes
Other
2
January 2023
Five Risk Impacts
To Improve Executive Communication
Jan 26
•
Levi Gundert
8
Share this post
Five Risk Impacts
intelligence2risk.substack.com
Copy link
Facebook
Email
Notes
Other
Intelligence to Risk
Every good story includes a capable, if not impressive, antagonist. We’ve even become accustomed to celebrating adversaries and anti-heroes. The…
Jan 19
•
Levi Gundert
20
Share this post
Intelligence to Risk
intelligence2risk.substack.com
Copy link
Facebook
Email
Notes
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts