Threat Intelligence2018-09-07T13:54:06+00:00

Threat Intelligence

Counter human threats against your people, business operations or physical locations with human analysis. We will work with your security team and other stakeholders to find the information you need to determine your next course of action. Find out what is being communicated, where it’s coming from, and how to stop it. Threat Intelligence provides value and helps organizations identify, mitigate and respond to advanced adversaries whether they are former employees or unknown individuals.

Threat Intelligence Use Cases:
  • Threat Scenario Planning
  • Ongoing Threat Monitoring
  • Deep and Dark Web Investigations

Prescient’s Cyber Practice works closely with clients to identify and mitigate threats. Our team handles cases discreetly and cost-effectively and delivers findings based on each client’s requirements.

Contact a Specialist


312-667-0870

Clients Served

Prescient’s Cyber Practice works closely with clients to identify and mitigate threats. Our team handles cases discreetly and cost-effectively and delivers findings based on each client’s requirements.

  • Corporate Security Departments
  • General Counsel and Legal Departments
  • Risk & Compliance Officers
  • Chief Information Security Officers (CISO)

How It Works

When you expect accurate and timely results, you’ll get them. We won’t bog you down with endless details and irrelevant fluff. Save time and energy with our Bottom-Line-Up-Front approach that presents quick-hit insights at the beginning of your reports, so you can quickly understand business risks.

Explore Our Process

Meet Your Expert

Max P.

Practice Lead, Cyber

Max is an intelligence & security risk professional skilled in protective intelligence, social media investigations, open source collection and dark web monitoring. As a veteran of the USMC Fleet Anti-Terrorism Security Team (F.A.S.T), he has experience in security risk assessments, crisis assessment and response, online and offline profiling, pattern of life analysis, and red-teaming. He specializes in helping clients assess and expose digital vulnerabilities to allow for effective threat mitigation and/or response. Max earned a B.A. in Intelligence Studies from Mercyhurst University.