Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Optimize Your Security Program with an Intelligence Collection Plan (ICP)

Jason David
Jason David, Director of Intelligence, G4S Corporate Risk Services
April 16, 2019

With the U.S. economy firing on all cylinders at 3.5 percent growth in the third quarter, corporate profits over the past year have zoomed at a 10.3 percent pace — the fastest increase in six years. Of course, companies are focused on maintaining the pace, and it is a good reason for savvy leaders to think about protecting their key assets from exposure to ever-evolving internal and external security risks.

Five Steps to Building and Maintaining an ICP

Step 1: Identify the key risks to your organization that could severely impact its ability to operate. These risks are your Priority Intelligence Requirements (PIRs).

 

Step 2: Make sure your PIRs are aligned with organizational strategy and objectives. This requires security and intelligence leaders to take a cross-functional approach for buy-in.

 

Step 3: Create a list of Essential Elements of Information (EEI), specific issues that fall under PIRs. 

 

Step 4: Develop or outsource a data analytic platform that allows you to tag each EEI under each PIR for benchmarking and analysis.

 

Step 5: Review periodically for trending and intelligence gap analysis, preferably annually for reconsiderations of revamping the existing ICP based on changed organizational and security objectives.

While security leaders have the ability to leverage a multitude of robust integrated security solutions that are readily available on the market, some leaders often neglect intelligence collection planning as one of the simplest and most cost-efficient solutions to helping their organizations mitigate risk.

Commonly used in military, law enforcement and intelligence agency arenas, Intelligence Collection Plans (ICPs) require decision makers to task their teams with prioritizing and collecting a wide array of pertinent information within a specific time frame that is continuously updated and evaluated. In a law enforcement setting, for example, a leader who wants to know how illicit narcotics impacts violence in the United States may develop a collection plan that identifies how they are smuggled, types of conveyances and routes and communications methods that are used. Corporate security executives can mirror this methodology to not only identify and monitor the potential threat of workplace violence or business espionage in their facilities, but also establish necessary responses to mitigate these threats.

 

ICP Advantages

ICPs give a strategic advantage by identifying emerging trends and threats that uniquely impact an organization. Every organization faces a unique set of challenges, depending on the industry and global markets in which they operate. Consequently, security leaders must differentiate among a customized set of intelligence requirements to help identify emerging risks to their company. The Chief Security Officer for a global pharmaceutical company who has experienced a rash of legal actions due to counterfeit drugs resold in illicit markets requires an ICP with collection requirements centered on anti-counterfeiting intelligence, including trademark infringement, theft and illicit resale.

ICPs can also be used as a tool to set benchmarks in three core areas of a security mission against organization objectives: Facilities and Locations, and Specific Risks and Threats that need to be mitigated.

 

Set Priority Intelligence Requirements

The effectiveness of developing an ICP requires security managers to quantify how they are performing vs. organizational strategic objectives. To accomplish this task, however, security programs must set Priority Intelligence Requirements (PIRs) that are aligned with their most critical assets and the impacts on those assets from potential significant events. 

Priority Intelligence Requirement 1: Hurricanes & Major Storms
  1. Flooding
  2. Evacuation
  3. Power Outages
  4. Looting
  5. Vandalism

The security manager is now able to tag essential information to the intelligence requirement and over time establish clear trends that will be important in helping to make future decisions.

Once PIRs are established under the ICP, managers can assign benchmarks aligned with organizational objectives against their facilities. They must also use what are called Essential Elements of Information (EEIs), key information that security operators can capture to determine the core issues within their operation. Working through this process provides security managers with a roadmap on specific threats to be mitigated.

A global technology company based in a hurricane-prone location (see graphic) will build an ICP focused on hazardous weather to protect their data centers by assigning the EEIs to the PIR.

When security managers and analysts have completed an ICP to identify new trends and set new benchmarks, they should step back and determine intelligence gaps based on the data collected in the ICP. An ICP is perfect for illuminating security program needs, but when security analysts and operators have not collected sufficient information within the PIR it doesn’t mean that there was a mishap. It simply means that there is a key requirement in the ICP that needs further exploration. In these cases, additional resources should be dedicated to fill these gaps, which in turn will strengthen the security program and provide security operators with enough intelligence to understand how to efficiently respond to an event.

The survival of future security programs requires leaders to remain agile and flexible to a dynamic security environment marked by a growing symbiotic relationship between the physical, cyber and electronic spaces. This will further complicate the security environment, so security leaders should be open to new and innovative methodologies that provide value and efficiency. ICPs won’t solve all security challenges, but they are an excellent tool in helping security professionals build and execute robust security strategies within the framework of organizational objectives.  Additionally, security programs become more robust from trending and gap analysis of key facets of the ICP across the organization.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing