{"id":2509,"date":"2025-09-05T22:38:03","date_gmt":"2025-09-05T22:38:03","guid":{"rendered":"https:\/\/emojifaces.org\/blog\/?p=2509"},"modified":"2025-09-05T22:52:38","modified_gmt":"2025-09-05T22:52:38","slug":"cyber-intelligence-centre-roadmap-30-60-90-day-plan","status":"publish","type":"post","link":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/","title":{"rendered":"Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan"},"content":{"rendered":"<p>If you&#8217;re building a Cyber Intelligence Centre (CIC), you need a plan. And not just any plan \u2014 a smart, simple, and focused roadmap that helps you stay on track. Whether you\u2019re starting from scratch or upgrading what you\u2019ve got, the first 90 days are critical.<\/p>\n<p>This article breaks down a fun and easy roadmap for your CIC using a <b>30\/60\/90-day plan<\/b>. Think of it like building a secure, high-tech clubhouse that&#8217;s ready to handle all kinds of cyber trouble. Let\u2019s get started!<\/p>\n<h2>What is a Cyber Intelligence Centre?<\/h2>\n<p>A Cyber Intelligence Centre helps organizations detect, analyze, and respond to cyber threats. It gathers information from across the internet and internal systems to stop bad guys in their tracks.<\/p>\n<p>The centre is staffed with <i>threat hunters, analysts, engineers, and incident responders<\/i>. Together, they keep an eye on networks, respond to alerts, and share intelligence with teams.<\/p>\n<img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"720\" src=\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2026\/04\/smartphone-screen-showing-facebook-application-phishing-email-example-cybersecurity-warning-screen-suspicious-login-alert.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2026\/04\/smartphone-screen-showing-facebook-application-phishing-email-example-cybersecurity-warning-screen-suspicious-login-alert.jpg 1080w, https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2026\/04\/smartphone-screen-showing-facebook-application-phishing-email-example-cybersecurity-warning-screen-suspicious-login-alert-300x200.jpg 300w, https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2026\/04\/smartphone-screen-showing-facebook-application-phishing-email-example-cybersecurity-warning-screen-suspicious-login-alert-1024x683.jpg 1024w, https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2026\/04\/smartphone-screen-showing-facebook-application-phishing-email-example-cybersecurity-warning-screen-suspicious-login-alert-768x512.jpg 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/>\n<h2>Before You Begin<\/h2>\n<p>Before diving into your 30\/60\/90-day plan, ask yourself three questions:<\/p>\n<ul>\n<li><b>Why<\/b> do we need a CIC?<\/li>\n<li><b>Who<\/b> are the key people involved?<\/li>\n<li><b>What<\/b> are our priorities in the short and long term?<\/li>\n<\/ul>\n<p>These answers will shape how you move forward. Now let\u2019s break it down.<\/p>\n<h2>First 30 Days: Foundation &amp; Discovery<\/h2>\n<p>This is the setup stage. You&#8217;ve got your notebook (or laptop), your coffee, and big dreams. Now it&#8217;s time to lay the foundation.<\/p>\n<h3><b>Goals:<\/b><\/h3>\n<ul>\n<li>Understand the current security landscape<\/li>\n<li>Set clear objectives and metrics<\/li>\n<li>Identify stakeholders and build the team<\/li>\n<\/ul>\n<h3><b>Action Items:<\/b><\/h3>\n<ul>\n<li><b>Assess existing infrastructure:<\/b> What security tools do you already have? How are incidents handled?<\/li>\n<li><b>Meet the teams:<\/b> Talk to IT, Security, Risk, and Compliance. Build relationships.<\/li>\n<li><b>Document gaps:<\/b> Is threat detection too slow? Are you missing logs or alerts?<\/li>\n<li><b>Create the CIC charter:<\/b> Write a simple one-pager explaining the purpose and scope of the centre.<\/li>\n<li><b>Define KPIs:<\/b> Pick 3-5 key metrics (e.g., mean time to detect, response time).<\/li>\n<\/ul>\n<p>Think of this month as you measuring the battlefield and gathering your heroes. Lay the groundwork well!<\/p>\n<h2>Day 31\u201360: Build &amp; Design<\/h2>\n<p>Now that you know what you&#8217;re working with, it\u2019s time to build. This is where the real action begins.<\/p>\n<h3><b>Goals:<\/b><\/h3>\n<ul>\n<li>Design the CIC architecture<\/li>\n<li>Start building workflows and processes<\/li>\n<li>Do your tech shopping (tools, platforms, etc.)<\/li>\n<\/ul>\n<h3><b>Action Items:<\/b><\/h3>\n<ul>\n<li><b>Choose your technology stack:<\/b> Pick SIEM tools (like Splunk, QRadar), threat intel platforms, and ticketing systems.<\/li>\n<li><b>Design your security workflow:<\/b> Identify how alerts are handled from detection to resolution.<\/li>\n<li><b>Develop playbooks:<\/b> Create response plans for attacks like phishing, ransomware, and insider threats.<\/li>\n<li><b>Secure your data:<\/b> Make sure logging and alerting are set up securely.<\/li>\n<li><b>Build a mini lab:<\/b> Set up a test environment where analysts can learn and experiment.<\/li>\n<\/ul>\n<p>In these 30 days, your CIC goes from ideas to blueprints. You\u2019re not just talking now \u2014 you\u2019re building something real.<\/p>\n<img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"720\" src=\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/a-wooden-block-spelling-security-on-a-table-data-security-excel-tools-spreadsheet-protection.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/a-wooden-block-spelling-security-on-a-table-data-security-excel-tools-spreadsheet-protection.jpg 1080w, https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/a-wooden-block-spelling-security-on-a-table-data-security-excel-tools-spreadsheet-protection-300x200.jpg 300w, https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/a-wooden-block-spelling-security-on-a-table-data-security-excel-tools-spreadsheet-protection-1024x683.jpg 1024w, https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/a-wooden-block-spelling-security-on-a-table-data-security-excel-tools-spreadsheet-protection-768x512.jpg 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/>\n<h2>Day 61\u201390: Operation and Optimization<\/h2>\n<p>You made it to the final stretch! Now&#8217;s the time to go live. Switch on the lights, test the alarms, and let your team get to work.<\/p>\n<h3><b>Goals:<\/b><\/h3>\n<ul>\n<li>Launch the CIC<\/li>\n<li>Respond to your first set of incidents<\/li>\n<li>Refine and improve based on feedback<\/li>\n<\/ul>\n<h3><b>Action Items:<\/b><\/h3>\n<ul>\n<li><b>Officially launch:<\/b> Announce your CIC across departments. Share what it does and how people can engage with it.<\/li>\n<li><b>Run simulations:<\/b> Test with mock incidents. How fast did the team respond? What went wrong?<\/li>\n<li><b>Monitor KPIs:<\/b> Track your metrics. Are your alert-to-resolution times improving?<\/li>\n<li><b>Optimize your playbooks:<\/b> Update based on lessons learned. Tweak language, steps, or add tools.<\/li>\n<li><b>Document wins:<\/b> Celebrate early successes. Show value to leadership.<\/li>\n<\/ul>\n<p>By now, your centre should be up and running, with staff tackling threats and systems humming. Well done!<\/p>\n<h2>Tips to Keep It Fun<\/h2>\n<ul>\n<li><b>Gamify training:<\/b> Use points and rewards for response drills<\/li>\n<li><b>Create a \u201cWall of Fame\u201d:<\/b> Show top analysts or brilliant catches<\/li>\n<li><b>Story time:<\/b> Share real stories of threats stopped or data saved \u2014 everyone loves a good \u201ccyber horror story\u201d<\/li>\n<\/ul>\n<h2>Common Challenges You Might Face<\/h2>\n<p>Nothing&#8217;s perfect. Even the best teams run into obstacles. Here are a few hiccups you might see \u2014 and how to deal with them:<\/p>\n<ul>\n<li><b>Too much data, not enough insights:<\/b> Focus on filtering alerts you care about. Use machine learning if possible.<\/li>\n<li><b>Skills gap:<\/b> Train juniors or seek outside experts for complex tasks. You don\u2019t need to hire ninjas on day one.<\/li>\n<li><b>Lack of buy-in from leadership:<\/b> Show quick wins. Share dashboards. Speak in their language: risk, cost, value.<\/li>\n<li><b>Burnout:<\/b> The work is intense. Rotate jobs, have fun breaks, and remember to celebrate wins.<\/li>\n<\/ul>\n<h2>Life After 90 Days<\/h2>\n<p>The first 90 days are just the beginning. After this, it\u2019s all about <i>scaling and maturing<\/i> your CIC. Here\u2019s a peek at what comes next:<\/p>\n<ul>\n<li><b>Add automation:<\/b> Use SOAR tools to respond faster<\/li>\n<li><b>Share intelligence:<\/b> Join threat-sharing communities<\/li>\n<li><b>Train continuously:<\/b> Offer industry certs and skill-building programs<\/li>\n<li><b>Make it measurable:<\/b> Use dashboards and daily stand-ups<\/li>\n<li><b>Stay agile:<\/b> The cyber landscape changes fast. Keep learning!<\/li>\n<\/ul>\n<p>Remember, every major cyber defence force started somewhere. With dedication, your CIC could evolve into a world-class security hub. Keep going, keep improving.<\/p>\n<img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"720\" src=\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2026\/01\/a-woman-writing-on-a-white-board-with-a-marker-teamwork-online-collaboration-digital-tools.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2026\/01\/a-woman-writing-on-a-white-board-with-a-marker-teamwork-online-collaboration-digital-tools.jpg 1080w, https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2026\/01\/a-woman-writing-on-a-white-board-with-a-marker-teamwork-online-collaboration-digital-tools-300x200.jpg 300w, https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2026\/01\/a-woman-writing-on-a-white-board-with-a-marker-teamwork-online-collaboration-digital-tools-1024x683.jpg 1024w, https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2026\/01\/a-woman-writing-on-a-white-board-with-a-marker-teamwork-online-collaboration-digital-tools-768x512.jpg 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/>\n<h2>Wrapping It Up<\/h2>\n<p>Launching a Cyber Intelligence Centre doesn\u2019t have to be scary or complex. Break it into 30-day chunks, focus on people and processes, and keep it fun.<\/p>\n<p>The key takeaway? <b>Start small, move smart, and grow confidently.<\/b><\/p>\n<p>In this increasingly digital world, your CIC could become the heart of your security operation \u2014 always watching, always reading the signs, and always ready to respond.<\/p>\n<p>Now, grab that roadmap and build the future of cyber intelligence!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you&#8217;re building a Cyber Intelligence Centre (CIC), you need a plan. And not just any plan \u2014 a smart, &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan\" class=\"read-more button\" href=\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#more-2509\" aria-label=\"Read more about Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan\">Read more<\/a><\/p>\n","protected":false},"author":39,"featured_media":2421,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[485],"tags":[],"class_list":["post-2509","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","resize-featured-image"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan - EmojiFaces Blog \ud83d\ude0e<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan - EmojiFaces Blog \ud83d\ude0e\" \/>\n<meta property=\"og:description\" content=\"If you&#8217;re building a Cyber Intelligence Centre (CIC), you need a plan. And not just any plan \u2014 a smart, ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"EmojiFaces Blog \ud83d\ude0e\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-05T22:38:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-05T22:52:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/red-padlock-on-black-computer-keyboard-cybersecurity-user-data-vpn-logs-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jame Miller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jame Miller\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/\"},\"author\":{\"name\":\"Jame Miller\",\"@id\":\"https:\/\/emojifaces.org\/blog\/#\/schema\/person\/a0f9a21c48eb810387960779e71189a6\"},\"headline\":\"Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan\",\"datePublished\":\"2025-09-05T22:38:03+00:00\",\"dateModified\":\"2025-09-05T22:52:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/\"},\"wordCount\":936,\"publisher\":{\"@id\":\"https:\/\/emojifaces.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/red-padlock-on-black-computer-keyboard-cybersecurity-user-data-vpn-logs-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/\",\"url\":\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/\",\"name\":\"Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan - EmojiFaces Blog \ud83d\ude0e\",\"isPartOf\":{\"@id\":\"https:\/\/emojifaces.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/red-padlock-on-black-computer-keyboard-cybersecurity-user-data-vpn-logs-1.jpg\",\"datePublished\":\"2025-09-05T22:38:03+00:00\",\"dateModified\":\"2025-09-05T22:52:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#primaryimage\",\"url\":\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/red-padlock-on-black-computer-keyboard-cybersecurity-user-data-vpn-logs-1.jpg\",\"contentUrl\":\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/red-padlock-on-black-computer-keyboard-cybersecurity-user-data-vpn-logs-1.jpg\",\"width\":1080,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/emojifaces.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/emojifaces.org\/blog\/#website\",\"url\":\"https:\/\/emojifaces.org\/blog\/\",\"name\":\"EmojiFaces Blog \ud83d\ude0e\",\"description\":\"Simple Emoji Keyboard to Copy &amp; Paste\",\"publisher\":{\"@id\":\"https:\/\/emojifaces.org\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/emojifaces.org\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/emojifaces.org\/blog\/#organization\",\"name\":\"EmojiFaces Blog \ud83d\ude0e\",\"url\":\"https:\/\/emojifaces.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/emojifaces.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2022\/07\/cropped-emojifaces-logo.png\",\"contentUrl\":\"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2022\/07\/cropped-emojifaces-logo.png\",\"width\":312,\"height\":63,\"caption\":\"EmojiFaces Blog \ud83d\ude0e\"},\"image\":{\"@id\":\"https:\/\/emojifaces.org\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/emojifaces.org\/blog\/#\/schema\/person\/a0f9a21c48eb810387960779e71189a6\",\"name\":\"Jame Miller\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/emojifaces.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/906d8a8fa6c3e14384c5577430fce80ea6f816e5fc083e2bc39ab04d01d06283?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/906d8a8fa6c3e14384c5577430fce80ea6f816e5fc083e2bc39ab04d01d06283?s=96&d=mm&r=g\",\"caption\":\"Jame Miller\"},\"description\":\"I'm Jame Miller, a cybersecurity analyst and blogger. Sharing knowledge on online security, data protection, and privacy issues is what I do best.\",\"url\":\"https:\/\/emojifaces.org\/blog\/author\/jamesm\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan - EmojiFaces Blog \ud83d\ude0e","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan - EmojiFaces Blog \ud83d\ude0e","og_description":"If you&#8217;re building a Cyber Intelligence Centre (CIC), you need a plan. And not just any plan \u2014 a smart, ... Read more","og_url":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/","og_site_name":"EmojiFaces Blog \ud83d\ude0e","article_published_time":"2025-09-05T22:38:03+00:00","article_modified_time":"2025-09-05T22:52:38+00:00","og_image":[{"width":1080,"height":720,"url":"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/red-padlock-on-black-computer-keyboard-cybersecurity-user-data-vpn-logs-1.jpg","type":"image\/jpeg"}],"author":"Jame Miller","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jame Miller","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#article","isPartOf":{"@id":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/"},"author":{"name":"Jame Miller","@id":"https:\/\/emojifaces.org\/blog\/#\/schema\/person\/a0f9a21c48eb810387960779e71189a6"},"headline":"Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan","datePublished":"2025-09-05T22:38:03+00:00","dateModified":"2025-09-05T22:52:38+00:00","mainEntityOfPage":{"@id":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/"},"wordCount":936,"publisher":{"@id":"https:\/\/emojifaces.org\/blog\/#organization"},"image":{"@id":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/red-padlock-on-black-computer-keyboard-cybersecurity-user-data-vpn-logs-1.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/","url":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/","name":"Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan - EmojiFaces Blog \ud83d\ude0e","isPartOf":{"@id":"https:\/\/emojifaces.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#primaryimage"},"image":{"@id":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/red-padlock-on-black-computer-keyboard-cybersecurity-user-data-vpn-logs-1.jpg","datePublished":"2025-09-05T22:38:03+00:00","dateModified":"2025-09-05T22:52:38+00:00","breadcrumb":{"@id":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#primaryimage","url":"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/red-padlock-on-black-computer-keyboard-cybersecurity-user-data-vpn-logs-1.jpg","contentUrl":"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2025\/07\/red-padlock-on-black-computer-keyboard-cybersecurity-user-data-vpn-logs-1.jpg","width":1080,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/emojifaces.org\/blog\/2025\/09\/05\/cyber-intelligence-centre-roadmap-30-60-90-day-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/emojifaces.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Intelligence Centre Roadmap: 30\/60\/90-Day Plan"}]},{"@type":"WebSite","@id":"https:\/\/emojifaces.org\/blog\/#website","url":"https:\/\/emojifaces.org\/blog\/","name":"EmojiFaces Blog \ud83d\ude0e","description":"Simple Emoji Keyboard to Copy &amp; Paste","publisher":{"@id":"https:\/\/emojifaces.org\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/emojifaces.org\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/emojifaces.org\/blog\/#organization","name":"EmojiFaces Blog \ud83d\ude0e","url":"https:\/\/emojifaces.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/emojifaces.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2022\/07\/cropped-emojifaces-logo.png","contentUrl":"https:\/\/emojifaces.org\/blog\/wp-content\/uploads\/2022\/07\/cropped-emojifaces-logo.png","width":312,"height":63,"caption":"EmojiFaces Blog \ud83d\ude0e"},"image":{"@id":"https:\/\/emojifaces.org\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/emojifaces.org\/blog\/#\/schema\/person\/a0f9a21c48eb810387960779e71189a6","name":"Jame Miller","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/emojifaces.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/906d8a8fa6c3e14384c5577430fce80ea6f816e5fc083e2bc39ab04d01d06283?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/906d8a8fa6c3e14384c5577430fce80ea6f816e5fc083e2bc39ab04d01d06283?s=96&d=mm&r=g","caption":"Jame Miller"},"description":"I'm Jame Miller, a cybersecurity analyst and blogger. Sharing knowledge on online security, data protection, and privacy issues is what I do best.","url":"https:\/\/emojifaces.org\/blog\/author\/jamesm\/"}]}},"_links":{"self":[{"href":"https:\/\/emojifaces.org\/blog\/wp-json\/wp\/v2\/posts\/2509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/emojifaces.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/emojifaces.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/emojifaces.org\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/emojifaces.org\/blog\/wp-json\/wp\/v2\/comments?post=2509"}],"version-history":[{"count":1,"href":"https:\/\/emojifaces.org\/blog\/wp-json\/wp\/v2\/posts\/2509\/revisions"}],"predecessor-version":[{"id":2550,"href":"https:\/\/emojifaces.org\/blog\/wp-json\/wp\/v2\/posts\/2509\/revisions\/2550"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/emojifaces.org\/blog\/wp-json\/wp\/v2\/media\/2421"}],"wp:attachment":[{"href":"https:\/\/emojifaces.org\/blog\/wp-json\/wp\/v2\/media?parent=2509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/emojifaces.org\/blog\/wp-json\/wp\/v2\/categories?post=2509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/emojifaces.org\/blog\/wp-json\/wp\/v2\/tags?post=2509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}