Close
Josh Lefkowitz
Chief Executive Officer
Josh Lefkowitz executes the company’s strategic vision to empower organizations with Business Risk Intelligence (BRI). He has worked extensively with authorities to track and analyze terrorist groups. Mr. Lefkowitz also served as a consultant to the FBI’s senior management team and worked for a top tier, global investment bank. Mr. Lefkowitz holds an MBA from Harvard University and a BA from Williams College.
Evan Kohlmann
Chief Innovation Officer
Evan Kohlmann focuses on product innovation at Flashpoint where he leverages fifteen years’ experience tracking Al-Qaida, ISIS, and other terrorist groups. He has consulted for the US Department of Defense, the US Department of Justice, the Australian Federal Police, and Scotland Yard’s Counter Terrorism Command, among others. Mr. Kohlmann holds a JD from the Univ. of Pennsylvania Law School and a BSFS in International Politics from the Walsh School of Foreign Service at Georgetown Univ.
Josh Devon
Chief Operating Officer / VP Product
Josh Devon focuses on product vision and strategy at Flashpoint while ensuring the company’s departments function synergistically during its rapid growth. He also works to ensure that customers receive best in class products, services, and support. Previously, Mr. Devon co-founded the SITE Intelligence Group where he served as Assistant Director. He holds an MA from SAIS at Johns Hopkins Univ. At the Univ. of Pennsylvania, he received a BS in Economics from the Wharton School and a BA in English from the College of Arts and Sciences.
Jennifer Leggio
Chief Marketing Officer / VP Operations
Jennifer Leggio is responsible for Flashpoint’s marketing, customer acquisition, and operations. Ms. Leggio has more than 20 years of experience driving marketing, communications and go-to-market strategies in the cybersecurity industry. She’s previously held senior leadership roles at Digital Shadows, Cisco, Sourcefire, and Fortinet. She’s been a contributor to Forbes and ZDNet, and has spoken on the importance of coordinated disclosure at DEF CON and Hack in the Box, and on threat actor “publicity” trends at RSA Conference, Gartner Security Summit, and SXSW Interactive.
Chris Camacho
Chief Strategy Officer
Chris Camacho partners with Flashpoint’s executive team to develop, communicate, and execute strategic initiatives pertaining to Business Risk Intelligence (BRI). With over 15 years of cybersecurity leadership experience, he has spearheaded initiatives across Operational Strategy, Incident Response, Threat Management, and Security Operations to ensure cyber risk postures align with business goals. Most recently as a Senior Vice President of Information Security at Bank of America, Mr. Camacho was responsible for overseeing the Threat Management Program. An entrepreneur, Mr. Camacho also serves as CEO for NinjaJobs: a career-matching community for elite cybersecurity talent. He has a BS in Decision Sciences & Management of Information Systems from George Mason University.
Lisa Iadanza
Chief People Officer
Lisa M. Iadanza leads all functional areas of People Operations at Flashpoint, including human resources, talent acquisition & management, employee engagement, and developing high performance teams. In addition to collaborating with the executive team to drive strategic growth, she plays an integral role in fostering Flashpoint’s culture and mission. Driven by her passions for mentorship, employee advocacy, and talent development, Ms. Iadanza has more than twenty years of experience in building, scaling, and leading human resources functions. Prior to Flashpoint, she held leadership roles at Conde Nast, Terra Technology, and FreeWheel. She is a member of the Society for Human Resources Management (SHRM) and holds a bachelor’s degree in management with concentrations in human resources and marketing from State University of New York at Binghamton.
Rob Reznick
VP of Finance and Corporate Development
Rob Reznick leads the finance, accounting, and corporate development teams at Flashpoint. Rob previously served as Director of Finance & Accounting for 1010data (acquired by Advance/Newhouse), and Director of Finance for Financial Guard (acquired by Legg Mason) after prior work in forensic accounting and dispute consulting. Mr. Reznick is a Certified Public Accountant and holds an MBA and MAcc from the Fisher College of Business at the Ohio State University, and a BBA from the Ross School of Business at the University of Michigan.
Lance James
Chief Scientist / VP Engineering
Lance James is responsible for leading Flashpoint’s technology development. Prior to joining Flashpoint in 2015, he was the Head of Cyber Intelligence at Deloitte & Touche LLP. Mr. James has been an active member of the security community for over 20 years and enjoys working creatively together with technology teams to design and develop impactful solutions that disrupt online threats.
Brian Costello
SVP Global Sales and Solution Architecture
Brian Costello, a 20-year information technology and security solutions veteran, is responsible for leading the Global Sales, Solution Architecture, and Professional Services teams at Flashpoint. Throughout his career, Brian has successfully built security and cloud teams that have provided customers with innovative technology solutions, exceeded targets and consistently grown business year over year. Prior to Flashpoint, Brian led a global security and cloud vertical practice for Verizon. Brian also held senior leadership roles at Invincea, Risk Analytics and Cybertrust. Brian received his B.A. from George Mason University.
Tom Hofmann
VP Intelligence
Tom Hofmann leads the intelligence directorate that is responsible for the collection, analysis, production, and dissemination of Deep and Dark Web data. He works closely with clients to prioritize their intelligence requirements and ensures internal Flashpoint operations are aligned to those needs. Mr. Hofmann has been at the forefront of cyber intelligence operations in the commercial, government, and military sectors, and is renowned for his ability to drive effective intelligence operations to support offensive and defensive network operations.
Jake Wells
VP Customer Success
Jake Wells leads the company’s customer success team, serving as an internal advocate for our government and commercial clients to ensure Flashpoint’s intelligence solutions meet their evolving needs. He leverages a decade of experience running cyber and counterterrorism investigations, most recently with the NYPD Intelligence Bureau, to maximize the value customers generate from our products and services. Mr. Wells holds an MA from Columbia University and a BA from Emory University.
Brian Brown
VP Business Development
Brian Brown is responsible for the overall direction of strategic sales and development supporting Flashpoint’s largest clients. In his role, Mr. Brown focuses on designing and executing growth-oriented sales penetration strategies across multiple vertical markets, including both Government and Commercial, supporting Flashpoint’s Sales and Business Development Teams. An experienced entrepreneur, Mr. Brown also serves as CSO for NinjaJobs, a private community created to match elite cybersecurity talent with top tier global jobs and also advise growth-stage cybersecurity companies.
image/svg+xml image/svg+xml
Flashpoint Introduces Innovative Approach for Use Case-Driven Intelligence

Three Things You Need for Effective Intelligence Requirements

Intelligence Basics
June 27, 2018

Intelligence operations will not get off the ground without well-curated intelligence requirements. Yet with an overwhelming number of internal and external data sources firing off alerts and notifications about potential incidents and threat actor activity, it’s challenging to put together IRs that prioritize a program’s needs.

Intelligence requirements mandate some foundational activities be in place, such as asset inventory, adversary evaluation, and a narrow operational focus, all of which can help inform the prioritization of needs, allocation of resources, determination of data sources, and the types of analysis and expertise required to process that data into intelligence.

Let’s dig into each foundational activity:

1. Asset Inventory is First Step

Commercial-sector intelligence operations are meant to protect a business from adversaries. To get to that point, however, requires an organization identify and prioritize the assets that make it a target. In other words, ask what cyber, physical, tangible and irreplaceable assets exist that would be worth stealing or disrupting?

Critical assets, those which are the backbone of business and operational continuity, are of the highest value. These assets including intellectual property, product road maps, physical and technical infrastructure, proprietary customer information, employees, stakeholders and shareholders, and if they were to be compromised or physically attacked, the ramifications for the business would substantial.

Once you’ve identified your business’s assets, you need to prioritize them. Few intelligence operations have limitless resources, so prioritizing the assets that are most critical to your business can help you allocate your resources more effectively.

2. Identify Adversaries and What They’re After

It’s important to consider that threat actors will not target all assets. So after you’ve identified and prioritized your business’s assets, you need to consider what types of threats and adversaries could be motivated to compromise them and why. To start, it can be helpful to consider the following questions:

  • Are you aware of any threats and/or adversaries that have previously targeted your business’s assets?
  •  

  • Are you aware of any threats and/or adversaries that have previously targeted other, similar businesses and/or assets?
  •  

  • Has your business previously experienced any security incidents or breaches? If so, what assets were compromised, how, and by whom?

 

Cybercriminals and fraudsters, for example, are usually financially motivated and known to seek personally identifiable information (PII), financial information, login credentials, and other types of relatively common assets to be monetized within various schemes. Malicious insiders, meanwhile, are commonly motivated by revenge, ideology, coercion, or ego. In any case, the more you know about the extent to which your business’s assets could potentially be targeted and why, the more focused and successful your intelligence requirements and resulting intelligence operation are likely to be.

3. Narrow Your Focus

The information compiled during an asset inventory and an adversarial evaluation is central the creation of a narrowly focused and tightly defined intelligence requirement. Effective IRs identify specific information that could reveal targeting of your most valuable assets. It’s important to keep in mind that IRs are typically framed as questions your intelligence operation should be designed to answer.

For example, your business has suffered substantial financial losses following numerous successful business email compromise (BEC) scams. As a result, you wish to establish an IR to help combat these attacks in the future. The asset in this situation would be the funds the employees had mistakenly wired to BEC scammers, whereas the means of successful exploitation would be the targeted employees’ inability to identify the BEC emails as such.

Within this context, a properly focused IR could look like the following:

  • What types of social engineering tactics are most likely to result in a successful BEC scam?
  •  

  • What types of employee training initiatives could help prevent future BEC scams from being successful?

 

Another key consideration is how an IR will influence the outcome of an intelligence operation. More specifically, the examples above would likely result in intelligence pertaining to BEC social engineering tactics and additional insights that could be used to inform employee training initiatives and ultimately help combat future BEC scams. This also means that if the anticipated answer to any IR does not appear as if it will provide value to the business, it should be revised accordingly and before continuing with the intelligence operation.

It’s important to remember that intelligence requirements, though essential, are only one component of an intelligence operation. The outcome of any such operation also depends on the quality of its data sources, the expertise and skill sets of its analysts, as well as the relevance, actionability, and timeliness of the resulting intelligence, among other factors. Intelligence operations can be extremely complex and difficult to navigate for even highly sophisticated teams, which is why it can be beneficial for businesses to seek third-party support from intelligence vendors, information-sharing communities, and other trusted partners as necessary.

avatar

Josh Lefkowitz

CEO

Josh Lefkowitz is the Chief Executive Officer of Flashpoint, where he executes the company’s strategic vision to empower organizations with Business Risk Intelligence (BRI) derived from the Deep & Dark Web. He has worked extensively with authorities to track and analyze terrorist groups. Mr. Lefkowitz also served as a consultant to the FBI’s senior management team and worked for a top tier, global investment bank. Mr. Lefkowitz holds an MBA from Harvard University and a BA from Williams College.

Flashpoint Intelligence Brief

Subscribe to our newsletter to stay up-to-date on our latest research, news, and events