Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementSecurity Education & Training

How to Balance Supply and Demand within Corporate Intelligence Programs

By Daniil Davydoff
Leadership
August 14, 2019

A cursory review of the latest writing on public sector intelligence analysis reveals a great deal of soul-searching about emerging threats to the profession. One area of concern is a growing imbalance between intelligence supply and demand. The supply of intelligence is increasing while the demand is shrinking. Policymakers are more interested in making decisions based on information they read or see on the internet, it seems, skipping the intelligence middleman. Private sector intelligence programs also suffer from supply and demand imbalances that can prevent them from creating value for their companies or cause them to stagnate. The origins and symptoms of the imbalances for corporate programs, though, can be tricky to recognize. Are analysts producing too much or too little intelligence? Are security leaders demanding too much or too little? How do we even tell that there is a mismatch in the first place? A simple, four-quadrant framework can help identify imbalances and set programs back on track.

A Diagnostic Framework for Assessing Intelligence Supply and Demand

The diagram below can be used as a rough diagnostic tool to identify where current levels of supply and demand are, and later, where they should be. Imagine intelligence supply (products delivered by analysts) on the X-axis and intelligence demand (interest in intelligence by security leadership) on the Y-axis. Quadrant I and Quadrant III represent programs where supply and demand—whether low or high—are balanced. In such programs, security leaders get enough intelligence to answer their questions and not too much to overwhelm them. Intelligence analysts, meanwhile, can rest easy knowing that what they produce is meeting present needs and is being adequately absorbed by their organization. These quadrants are ideal because, all else being equal, the creators and the recipients of intelligence are satisfied. This satisfaction, in turn, leads to higher motivation among analysts, greater predictability of workflow, and directors who are willing to “go to bat” for their teams.  

Intelligence Supply & Demand framework

 

Source: Daniil Davydoff

 

In the other two quadrants, imbalances will create problems. In Quadrant II, for instance, leaders who have a high appetite for intelligence are not being given enough analysis. Consequently, they may think that the analyst team is not skilled or large enough for the task at hand. In Quadrant IV, analysts that are producing a large volume of content may become frustrated about their work going into a proverbial black hole and not being read. They may also worry about their inability to make an impact on security decision-makers.

 

In the long run, both the “shortage” and “glut” scenarios will prevent programs from reaching their potential. An intelligence team’s value will come into question and retention issues will arise. Worse, recession or changes in company directions may doom a program entirely. Bringing intelligence supply and demand back to balance is therefore important, but should the balance be in Quadrant I or Quadrant III, and how to move a program in either direction?

Addressing Intelligence Supply and Demand Imbalances

To solve identified imbalances, the first step is to establish whether the current levels of supply and demand came about purposefully or unintentionally. In Quadrant II, the low supply of intelligence may have been a deliberate choice of analysts who sought to be strategic about their deliverables. Alternatively, it could be due to under-confident analysts struggling to adapt to corporate needs or just a shortage of personnel or technology. In the same way, high intelligence demand may be driven by leaders who have come from intelligence backgrounds and seek to recreate the value of their old teams. Or it may be a poorly thought-through desire to keep up with the Joneses through production of “dailies” or “weeklies.”

The Quadrant IV scenario can be looked at in the same way. A high supply of intelligence may mean that analysts are efficient at delivering vast quantities of useful products, or that intelligence production has simply run amok. At the same time, low demand from security leaders may reflect a need for highly targeted assessments only, or it could mean an “old school” bias against what has been seen in the past as work that is too intangible.

The distinction between purposeful and unintentional is an important one because it points directly to the kind of solution needed to address the imbalance. In general, if the levels of both supply and demand were chosen purposefully, the answer is greater communication between the security leadership and analyst teams. The two sides need to arrive at an understanding of what the program’s purpose is and what the optimal level of intelligence production should be.

If the level of supply or demand is unintentional, however, other remedies are required. An under-producing intelligence team may need greater training or else staffing changes, supervisory hires, or external consultants may be necessary. Overproducing analysts, on the other hand, may benefit from guidance on strategic prioritization. Lest one think that analysts are always the problem, security leadership may sometimes need a bit of handholding too. Analysts can educate security directors on the downsides of the “kitchen sink” approach to alerts and analysis. Likewise, under-interested security leaders can be shown examples of work that will directly impact physical security or operations.

 

 

KEYWORDS: corporate security intelligence security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dan davydoff   pic1

Daniil Davydoff, CPP, is Director, Research Management and Operations at Eurasia Group and director of social media for the World Affairs Council of Palm Beach. He has been published by ASIS International/Security Management, Risk Management Magazine, The National Interest, The Carnegie Council for Ethics in International Affairs, Foreign Policy and RealClearWorld, among other outlets. His views do not reflect those of his company.

Daniil Davydoff can be contacted on LinkedIn or at davydoff@eurasiagroup.net

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • leadership-enews2

    How to Avoid Intelligence Program Pitfalls

    See More
  • SEC0718-edu-feat-slide1_900px

    How Intelligence Analysis Can Drive Corporate ROI

    See More
  • leadership 2

    Bringing Different Backgrounds to Your Intelligence Team

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

See More Products

Events

View AllSubmit An Event
  • November 19, 2025

    From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

    ON DEMAND: When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing