F3EAD + Adversarial Thinking for Strengthening Strategic Planning

Mar 2025

F3EAD is a concept used in military special operations and intelligence gathering. It stands for Find, Fix, Finish, Exploit, Analyze, and Disseminate. In the context of modern security, F3EAD can be applied as a framework for how modern security teams should operate in an environment characterized by constant volatility, uncertainty, and evolving threats. Essentially you need to look at it as a way to identify threats and vulnerabilities (Find), contain the threat (Fix), eliminate the threat (Finish), leverage lessons learned and adapt your own TTPs and controls (Exploit), understand what led to the attack (Analyze) so we can go gather more intelligence, and share it (Disseminate).

It’s an ongoing cycle that requires every team member, from the most junior to the most seasoned, as well as senior leaders and the CISO, to bring their best "thinking like an adversary" mindset. F3EAD it’s a good framework for internal use within a driven and successful security organization.

One thing that is still missing is the ability to apply that same adversarial mindset to enhance corporate and organizational strategic planning and process development. Especially in more traditional business, where CISOs and other senior security leaders are often seen more as a compliance requirement than anything else.

I think it’s time executive leadership and the market in general understand that a good security professional is someone that is not static or stagnant, but rather someone who moves forward and adapts. Someone that can bring immense value to strategic planning.

We deal in uncertainties and chaos. That’s the world of security. And it has a lot in common with VUCA (Volatility, Uncertainty, Complexity, and Ambiguity), a framework used to describe the chaotic and unpredictable nature of the modern world, including business and organizations.

We need to change what CISOs and Senior Security Leadership do and how they do it. Senior security professionals need to bring that adversarial way of thinking to the top and help build a more resilient and stronger business or organization. As security professionals, we need to help methodically strengthen planning and strategies by asking the right questions and helping senior executives to stay prepared. Remember the 7 Ps: Proper Prior Planning Prevents Piss Poor Performance.

To that end, I’d like to bring in a process that can turn this approach into an actionable reality. A process designed to enhance the resiliency of a strategy and its goals by encouraging executives to think like adversaries and actively “attack” the plan.

I’m calling it F3EAD + A and it’s a very early Alpha version. I’m open to (realistic) suggestions. One caveat: no checklists and no compliance BS. Checklists are useful for tasks that require specific, safety actions, like a pilot checking the plane, engine, or flaps, or when setting up a new system with basic security hardening, access controls, and endpoint protection. But in the world of adversarial thinking, relying on checklists will limit security's effectiveness and lead to stagnation. And stagnation equals death, so that's a no-go.

(Shameless plug: this is one of the services we are building for Black Arrows. The process described below is a compressed version of the one the advisory from Black Arrows can bring to an organization.)

Process Outline

1. Define or Describe the Strategy Clearly

2. Assume the Role of an Adversary

3. Stress-Test the Strategy

4. Explore Alternative Actions

5. Simulate Worst-Case Scenarios

6. Refine and Strengthen

7. Repeat Regularly

F3EAD + A Framework. Key Actions, Tools, and Outputs

1. Define or Describe the Strategy Clearly

Objective: Establish a comprehensive understanding of the strategy before stress-testing and red teaming it.

Key Actions:

Tools & Templates: Strategy Statement Template

Expected Output: A clear and concise strategic statement with key assumptions and outcomes defined.

2. Assume the Role of an Adversary

Objective: Identify potential disruptors and their motivations.

Key Actions:

Tools & Templates: Threat Actor Profile Template

Expected Output: A Threat Actor Matrix outlining potential adversaries and likely attack scenarios.

3. Stress-Test the Strategy

Objective: Identify vulnerabilities and gaps and simulate how adversaries could exploit them.

Key Actions:

Tools & Templates: Red Team Playbook

Expected Output: A comprehensive list of weaknesses and gaps with actionable recommendations for mitigation.

4. Explore Alternative Actions

Objective: Develop fallback plans and alternative strategies.

Key Actions:

Tools & Templates: Scenario Planning Worksheet

Expected Output: A set of contingency plans ensuring flexibility and resilience.

5. Simulate Worst-Case Scenarios

Objective: Test the resilience of the strategy under extreme conditions.

Key Actions:

Tools & Templates: Crisis Response Framework

Expected Output: A refined crisis response plan ensuring rapid adaptability.

6. Refine and Strengthen

Objective: Implement strategic improvements to close identified gaps.

Key Actions:

Tools & Templates:

Expected Output: A finalized, fortified strategy document with built-in resilience.

7. Repeat Regularly

Objective: Maintain strategy strength through continuous evaluation.

Key Actions:

Tools & Templates:

Expected Output: A continuously evolving strategy that remains robust against future challenges.

To Close

To ensure a resilient and more secure business strategy, we need to help executives think like an adversary, identifying weaknesses and issues in their strategy and plans before competitors, market shifts, or malicious actors do. F3EAD + A structured process can help leaders test, refine, and strengthen strategic plans by simulating attacks, exploring alternative views, and challenging key assumptions.

Hold quarterly F3EAD + A sessions to help them understand "What Could Go Wrong." Bring security to the table by assisting businesses in becoming more resilient and better equipped to navigate the world of VUCA.