{"id":3131,"date":"2023-01-05T09:14:20","date_gmt":"2023-01-05T08:14:20","guid":{"rendered":"https:\/\/strukturierteanalysedeutschland.de\/?p=3131"},"modified":"2023-01-05T09:18:52","modified_gmt":"2023-01-05T08:18:52","slug":"cybersecurity_meets_intelligence_a_journey_in_vain","status":"publish","type":"post","link":"https:\/\/strukturierteanalysedeutschland.de\/en\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/","title":{"rendered":"<strong>Cybersecurity meets Intelligence \u2013 a journey in vain?<\/strong>"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3131\" class=\"elementor elementor-3131\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0a5ab9b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0a5ab9b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c129e6c\" data-id=\"c129e6c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b9571c elementor-widget elementor-widget-image\" data-id=\"9b9571c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"384\" src=\"https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/Cyber_Sicherheit_Pixabay.jpg\" class=\"attachment-large size-large wp-image-2834\" alt=\"Analyse_Informationssicherheit_Cybersicherheit\" srcset=\"https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/Cyber_Sicherheit_Pixabay.jpg 640w, https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/Cyber_Sicherheit_Pixabay-300x180.jpg 300w, https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/Cyber_Sicherheit_Pixabay-600x360.jpg 600w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30d20ff elementor-widget elementor-widget-text-editor\" data-id=\"30d20ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>One year ago, I entered a world that was all at once: strangely familiar and quite foreign to me &#8211; the world of cybersecurity.<\/p><p>Familiar to me were the people: easy-going, enthusiastic, highly professional, at times reserved, and consistently humble. Familiar because I spent part of my youth in clans and guilds of various PC games. Familiar also because one of my brothers works in IT. So I liked the people there from the start and enjoyed having conversations where &#8222;lol&#8220; was a normal part of the active vocabulary.<\/p><p>What was foreign to me was what exactly these people did. That changed only very slowly, even despite efforts to explain it. I came to Flensburg to the DGC with a mission: I wanted to make the methods and procedures of my world (intelligence) fruitful for the world of information and cyber security. I had two weeks to do this. It was a unique opportunity, which I only had because the founder of DGC was so open to my ideas. So from my point of view, it was clear: At the end of these two weeks, I had to have worked out the basic outlines of a training design.<\/p><p>But it was so difficult for me to understand what was being done there in concrete terms, that at the end of the first week I said to my wife on the phone that the project would probably end with me not achieving my goal. Because not only did I not really understand what the professionals at DGC were doing &#8211; the people there didn&#8217;t really understand what I was actually doing either. So what is intelligence, anyway? What does intelligence analysis mean? What are structured analytic techniques for? (\/\/ By the way, explaining this is a very basic challenge when I am asked in Germany what I actually do for a living <img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/14.0.0\/svg\/1f609.svg\" alt=\"\ud83d\ude09\" \/> )<\/p><p>But in the second week, momentum started to come into the project. I saw parallels to what I already knew from my field of activity. Just like analysts, red teamers struggle with the challenge that knowledge sometimes only has a short half-life. For example, how certain security gaps can be exploited before they are eventually closed. This is a problem that becomes virulent when new personnel need to be qualified. So how can a large number of personnel be quickly brought up to a common level of knowledge? This is a challenge for which checklists, for example, can be helpful. Or the challenge of transferring past experience of attack scenarios to current customers, even though only one or two analogies suggest this, but without a full assessment of the situation having been carried out. This is a challenge that can be addressed in the intelligence domain by setting up and testing broad sets of hypothesis.<\/p><p>In the Blue Team area, the parallels to what I did in Military Intelligence were even more pronounced. It involves questions like: Who is our (potential) adversary? What are his intentions? What capabilities and means does he have? How can we or our customers protect ourselves effectively and efficiently against these threats? All these are questions that every S2, J2 or G2 has probably asked himself a thousand times. The procedures that have been established, the Structured Analytic Techniques (SATs) that are used, can be transferred 1 to 1. Only the terrain is different. It knows no borders, no times, no weather and often no exact opponent. And it is precisely this indeterminacy that makes it even more important to deploy available protection resources in a targeted manner. This requires that the situation has been analyzed with the help of a structured process &#8211; i.e., using Structured Analytic Techniques. In this way, protective measures can be designed and deployed in a way that saves resources.<\/p><p>So thanks to week two and the patient professionals at DGC, I was able to complete my mission successfully after all. I had created a training concept that transferred the most important fundamentals from the field of intelligence analysis to the field of cyber security in particular. In the meantime, a fully developed 3-day course has emerged from this.<\/p><p>I will return to Flensburg in two weeks and test this training with the professionals of the DGC. It will certainly be an exciting three days for all involved. And I am especially looking forward to meeting the people there again.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f6beb98 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"f6beb98\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-795c56b\" data-id=\"795c56b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b95db26 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b95db26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>One year ago, I entered a world that was all at once: strangely familiar and quite foreign to me &#8211; the world of cybersecurity. Familiar to me were the people: easy-going, enthusiastic, highly professional, at times reserved, and consistently humble. Familiar because I spent part of my youth in clans and guilds of various PC [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2834,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3131","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity meets Intelligence \u2013 a journey in vain? - Strukturierte Analyse Deutschland<\/title>\n<meta name=\"description\" content=\"Informations- und Cybersicherheit k\u00f6nnen viel aus dem Bereich Intelligence lernen. Das zu erkennen, war allerdings eine Herausforderung.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/strukturierteanalysedeutschland.de\/en\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity meets Intelligence \u2013 a journey in vain? - Strukturierte Analyse Deutschland\" \/>\n<meta property=\"og:description\" content=\"Informations- und Cybersicherheit k\u00f6nnen viel aus dem Bereich Intelligence lernen. Das zu erkennen, war allerdings eine Herausforderung.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/strukturierteanalysedeutschland.de\/en\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/\" \/>\n<meta property=\"og:site_name\" content=\"Strukturierte Analyse Deutschland\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-05T08:14:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-05T08:18:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/Cyber_Sicherheit_Pixabay.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"384\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Donner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/\"},\"author\":{\"name\":\"Donner\",\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/#\\\/schema\\\/person\\\/85f03ad2811c6423d3196b79c373ff34\"},\"headline\":\"Cybersecurity meets Intelligence \u2013 a journey in vain?\",\"datePublished\":\"2023-01-05T08:14:20+00:00\",\"dateModified\":\"2023-01-05T08:18:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/\"},\"wordCount\":737,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Cyber_Sicherheit_Pixabay.jpg\",\"articleSection\":[\"Allgemein\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/\",\"url\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/\",\"name\":\"Cybersecurity meets Intelligence \u2013 a journey in vain? - Strukturierte Analyse Deutschland\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Cyber_Sicherheit_Pixabay.jpg\",\"datePublished\":\"2023-01-05T08:14:20+00:00\",\"dateModified\":\"2023-01-05T08:18:52+00:00\",\"description\":\"Informations- und Cybersicherheit k\u00f6nnen viel aus dem Bereich Intelligence lernen. Das zu erkennen, war allerdings eine Herausforderung.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/#primaryimage\",\"url\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Cyber_Sicherheit_Pixabay.jpg\",\"contentUrl\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Cyber_Sicherheit_Pixabay.jpg\",\"width\":640,\"height\":384,\"caption\":\"Analyse_Informationssicherheit_Cybersicherheit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/2023\\\/01\\\/05\\\/cybersecurity_meets_intelligence_a_journey_in_vain\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity meets Intelligence \u2013 a journey in vain?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/#website\",\"url\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/\",\"name\":\"Strukturierte Analyse Deutschland\",\"description\":\"Intelligence makes the Difference\",\"publisher\":{\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/#organization\",\"name\":\"Strukturierte Analyse Deutschland\",\"url\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cropped-Logo_02.png\",\"contentUrl\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cropped-Logo_02.png\",\"width\":500,\"height\":143,\"caption\":\"Strukturierte Analyse Deutschland\"},\"image\":{\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/strukturierteanalysedeutschland.de\\\/#\\\/schema\\\/person\\\/85f03ad2811c6423d3196b79c373ff34\",\"name\":\"Donner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cfe58667d71022535a7229c54dcd8a21b26c50b344b99b94ee925ec983759514?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cfe58667d71022535a7229c54dcd8a21b26c50b344b99b94ee925ec983759514?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cfe58667d71022535a7229c54dcd8a21b26c50b344b99b94ee925ec983759514?s=96&d=mm&r=g\",\"caption\":\"Donner\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity meets Intelligence \u2013 a journey in vain? - Strukturierte Analyse Deutschland","description":"Informations- und Cybersicherheit k\u00f6nnen viel aus dem Bereich Intelligence lernen. Das zu erkennen, war allerdings eine Herausforderung.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/strukturierteanalysedeutschland.de\/en\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity meets Intelligence \u2013 a journey in vain? - Strukturierte Analyse Deutschland","og_description":"Informations- und Cybersicherheit k\u00f6nnen viel aus dem Bereich Intelligence lernen. Das zu erkennen, war allerdings eine Herausforderung.","og_url":"https:\/\/strukturierteanalysedeutschland.de\/en\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/","og_site_name":"Strukturierte Analyse Deutschland","article_published_time":"2023-01-05T08:14:20+00:00","article_modified_time":"2023-01-05T08:18:52+00:00","og_image":[{"width":640,"height":384,"url":"https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/Cyber_Sicherheit_Pixabay.jpg","type":"image\/jpeg"}],"author":"Donner","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Donner","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/#article","isPartOf":{"@id":"https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/"},"author":{"name":"Donner","@id":"https:\/\/strukturierteanalysedeutschland.de\/#\/schema\/person\/85f03ad2811c6423d3196b79c373ff34"},"headline":"Cybersecurity meets Intelligence \u2013 a journey in vain?","datePublished":"2023-01-05T08:14:20+00:00","dateModified":"2023-01-05T08:18:52+00:00","mainEntityOfPage":{"@id":"https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/"},"wordCount":737,"commentCount":0,"publisher":{"@id":"https:\/\/strukturierteanalysedeutschland.de\/#organization"},"image":{"@id":"https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/#primaryimage"},"thumbnailUrl":"https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/Cyber_Sicherheit_Pixabay.jpg","articleSection":["Allgemein"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/","url":"https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/","name":"Cybersecurity meets Intelligence \u2013 a journey in vain? - Strukturierte Analyse Deutschland","isPartOf":{"@id":"https:\/\/strukturierteanalysedeutschland.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/#primaryimage"},"image":{"@id":"https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/#primaryimage"},"thumbnailUrl":"https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/Cyber_Sicherheit_Pixabay.jpg","datePublished":"2023-01-05T08:14:20+00:00","dateModified":"2023-01-05T08:18:52+00:00","description":"Informations- und Cybersicherheit k\u00f6nnen viel aus dem Bereich Intelligence lernen. Das zu erkennen, war allerdings eine Herausforderung.","breadcrumb":{"@id":"https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/#primaryimage","url":"https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/Cyber_Sicherheit_Pixabay.jpg","contentUrl":"https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/Cyber_Sicherheit_Pixabay.jpg","width":640,"height":384,"caption":"Analyse_Informationssicherheit_Cybersicherheit"},{"@type":"BreadcrumbList","@id":"https:\/\/strukturierteanalysedeutschland.de\/2023\/01\/05\/cybersecurity_meets_intelligence_a_journey_in_vain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/strukturierteanalysedeutschland.de\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity meets Intelligence \u2013 a journey in vain?"}]},{"@type":"WebSite","@id":"https:\/\/strukturierteanalysedeutschland.de\/#website","url":"https:\/\/strukturierteanalysedeutschland.de\/","name":"Strukturierte Analyse Deutschland","description":"Intelligence makes the Difference","publisher":{"@id":"https:\/\/strukturierteanalysedeutschland.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/strukturierteanalysedeutschland.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/strukturierteanalysedeutschland.de\/#organization","name":"Strukturierte Analyse Deutschland","url":"https:\/\/strukturierteanalysedeutschland.de\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/strukturierteanalysedeutschland.de\/#\/schema\/logo\/image\/","url":"https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/cropped-Logo_02.png","contentUrl":"https:\/\/strukturierteanalysedeutschland.de\/wp-content\/uploads\/2021\/07\/cropped-Logo_02.png","width":500,"height":143,"caption":"Strukturierte Analyse Deutschland"},"image":{"@id":"https:\/\/strukturierteanalysedeutschland.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/strukturierteanalysedeutschland.de\/#\/schema\/person\/85f03ad2811c6423d3196b79c373ff34","name":"Donner","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/cfe58667d71022535a7229c54dcd8a21b26c50b344b99b94ee925ec983759514?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cfe58667d71022535a7229c54dcd8a21b26c50b344b99b94ee925ec983759514?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfe58667d71022535a7229c54dcd8a21b26c50b344b99b94ee925ec983759514?s=96&d=mm&r=g","caption":"Donner"}}]}},"_links":{"self":[{"href":"https:\/\/strukturierteanalysedeutschland.de\/en\/wp-json\/wp\/v2\/posts\/3131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/strukturierteanalysedeutschland.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/strukturierteanalysedeutschland.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/strukturierteanalysedeutschland.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/strukturierteanalysedeutschland.de\/en\/wp-json\/wp\/v2\/comments?post=3131"}],"version-history":[{"count":4,"href":"https:\/\/strukturierteanalysedeutschland.de\/en\/wp-json\/wp\/v2\/posts\/3131\/revisions"}],"predecessor-version":[{"id":3136,"href":"https:\/\/strukturierteanalysedeutschland.de\/en\/wp-json\/wp\/v2\/posts\/3131\/revisions\/3136"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/strukturierteanalysedeutschland.de\/en\/wp-json\/wp\/v2\/media\/2834"}],"wp:attachment":[{"href":"https:\/\/strukturierteanalysedeutschland.de\/en\/wp-json\/wp\/v2\/media?parent=3131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/strukturierteanalysedeutschland.de\/en\/wp-json\/wp\/v2\/categories?post=3131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/strukturierteanalysedeutschland.de\/en\/wp-json\/wp\/v2\/tags?post=3131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}