Defensive Hybrid Intelligence | 3. Interpretation


In the architecture of Defensive Hybrid Intelligence, this is the third phase, following collection and fusion. In this stage, the organisation moves from the question “What is happening, based on the evidence?” to the questions “What does this mean for us?” and “How should we understand this situation in light of our duties, exposures, and strategic vulnerabilities?”

Interpretation in the context of DHI is defined as the systematic process by which an organisation derives intent, significance, scenario projections, and regulatory implications from an already fused body of intelligence. The object of interpretation is to extract from the fused intelligence an understanding of adversarial objectives, systemic vulnerabilities, and possible future developments, framed explicitly in terms of legal obligations, regulatory expectations, and governance responsibilities.

Interpretation is different from fusion:

1. Fusion is concerned with the reconstruction of what has occurred or is occurring, based on structured data, cross domain correlation, source reliability assessments, and tested hypotheses. It examines patterns, and produces assessments such as the determination that a series of cyber incidents, supply chain anomalies, and reputational attacks are aligned, and share a common adversarial infrastructure.

Interpretation is concerned with meaning and consequences. It assesses what strategic objectives the adversary has, what assets or functions are threatened, and what type of risk the attack generates or amplifies for the organisation.

2. Fusion produces intelligence findings that stand on their own, without depending on the organisation’s particular business model, governance structure, or regulatory obligations.

Interpretation internalises those findings into the entity’s particular context, translating them into implications for its lines of business, client relationships, critical operations, contractual networks, and regulatory status.

3. Fusion's objective is analytical accuracy. Accuracy is necessary but not sufficient. The organisation must understand why the accurate picture matters.

Interpretation's objective is strategic and legal relevance.

Interpretation is an intelligence and governance discipline. It leads to mapping intelligence against the organisation’s statutory and regulatory duties, including cybersecurity and operational resilience obligations, data protection duties, critical infrastructure requirements, financial stability mandates, sanctions and export control rules, and sector specific supervisory expectations.

The interpretive process examines whether the intelligence indicates the existence of hybrid operations that could jeopardise the continuity of critical services, undermine the integrity of financial markets, expose protected data, breach contractual security commitments, or compromise compliance with sanctions regimes. It also considers whether the observed pattern of hostile or anomalous activity is indicative of preparatory operations, and whether failing to act would later be construed as a breach of the duty of care or of the obligation to implement appropriate technical and organisational measures.

Interpretation must also address the question of adversarial intent, while remaining within the bounds of analytic caution and legal prudence. Fusion may establish that a state linked threat actor, known for previous hybrid campaigns, has engaged in coordinated activity targeting both the organisation’s IT infrastructure and key suppliers. Interpretation directly informs the degree of urgency, the scope of escalation, and the scale of protective measures that might be legally expected from the entity. For example, if the interpreted intent is to probe systemic vulnerabilities across a sector, rather than to target a single firm in isolation, the implications for supervisory engagement, industry coordination, and information sharing are substantially different.

Another central function of interpretation is structured scenario building. On the basis of fused intelligence, the organisation must develop reasoned projections of how the situation might evolve under different assumptions of adversarial behaviour and environmental conditions. These scenarios typically include a best case development, a worst case escalation path, and one or more intermediate paths. The interpretive exercise evaluates, for each scenario, the likely impact on the organisation’s operations, clients, markets, regulatory relationships, and strategic objectives.

It assesses, for example, whether continued hybrid pressure might lead to an operational outage, a cascading supply chain failure, a regulatory intervention, or a loss of market confidence. It also considers how adversaries might exploit regulatory procedures, legal disputes, media narratives, or social dynamics as part of a broader hybrid strategy. Scenario building, properly documented, supports later demonstrations of due diligence and foresight in the event of supervisory review or litigation.

Interpretation requires a disciplined assessment of risk significance across multiple categories. The fused intelligence must be translated into discrete impacts on strategic risk, operational risk, compliance risk, legal risk, reputational risk, and, where appropriate, systemic or sectoral risk. This includes an assessment of whether the intelligence indicates a risk that is localised, persistent, or structural. Whether it is idiosyncratic to the firm, or correlated with vulnerabilities across the wider sector or supply network. Whether it affects only technical assets, or also governance structures, decision making processes, and stakeholder confidence.

For example, an interpreted hybrid operation that combines technical intrusion with disinformation about the firm’s regulatory compliance record may simultaneously trigger concerns for data security, supervisory trust, and market perception, requiring a multi dimensional risk response.

A localised risk is a risk to a specific asset, process, function, supplier, business unit, or operational domain, without credible indications that it extends beyond it. It is characterised by limited scope, limited contagion potential, and an absence of systemic implications. Its consequences can be mitigated through targeted, proportionate measures. Legally, a localised risk does not ordinarily trigger cross entity, cross border, or sector wide obligations unless it escalates or reveals indicators of broader exposure.


A persistent risk is a risk with continuity over time, recurring patterns of manifestation, or a sustained adverse influence on operations, governance, or compliance obligations. It is not episodic or incidental but enduring, requiring ongoing mitigation or monitoring. In legal terms, a persistent risk creates heightened expectations for documentation, remediation, board oversight, and demonstrable risk control effectiveness.

Example: A financial institution repeatedly experiences low level cyber probing directed at its authentication systems, over several months. Each individual attempt is contained, but the activity never fully ceases, and forensic analysis reveals that the probing originates from infrastructure associated with a hostile state linked actor. Despite implementing technical mitigations, the attempts reappear in modified form, indicating adversarial adaptation. This ongoing pattern suggests not an isolated incident but a sustained effort to test defences, map vulnerabilities, and maintain adversarial presence. Legally, such continuity elevates the matter from a routine security event to a persistent operational and compliance risk that demands enhanced monitoring, formal escalation, and documented governance attention.


A structural risk is a risk embedded within the organisation’s foundational arrangements, such as its system architecture, supply chain configuration, governance model, regulatory exposure, or market dependencies. Such risks arise from the underlying design, interconnections, or systemic relationships that shape the organisation’s ability to operate lawfully and resiliently. In legal analysis, structural risks have the highest significance, as they may have contagion potential, cross border implications, or sector wide relevance, triggering obligations relating to operational resilience, systemic risk management, supervisory notification, or reconfiguration of core dependencies.

Example: A critical infrastructure operator relies on a single foreign cloud provider located in a jurisdiction subject to extraterritorial surveillance laws and known for state directed operations. Even without any active incident, the architecture of this dependency embeds a continuous exposure, the provider’s legal obligations to its home government. This risk originates from the organisation’s foundational design choices.


Case study for interpretation: In a large financial institution, the fused intelligence has established that over a three month period, the institution has experienced recurrent low level cyber intrusions targeting its payment messaging systems, a series of seemingly unrelated supply chain disruptions affecting a third country data centre provider, and a coordinated disinformation campaign on media channels suggesting weaknesses in the institution’s liquidity and risk controls.

Fusion has identified that the cyber infrastructure used in the intrusions has been previously associated with a state linked actor engaged in hybrid operations against critical financial infrastructure in another region. The findings are evidence based and have been subjected to multi hypothesis testing, leading to the conclusion that a coordinated, multi-vector operation is likely underway, though its exact objectives remain uncertain.

Interpretation now takes this fused intelligence and situates it within the institution’s specific legal and strategic context.

It examines the likely intent of the adversary. The combination of intrusions, supply chain pressure, and reputational attacks suggests that the operation may be designed to test the institution’s resilience, identify structural weaknesses, and create optionality for future disruption.

The interpretive analysis maps these insights against the institution’s regulatory obligations under operational resilience and incident reporting frameworks. It assesses whether, in light of the interpreted hybrid operation, the institution must treat the situation as potentially material, even before a major attack occurs, and whether a proactive supervisory notification is advisable or required.

The interpretive process constructs scenarios. In a conservative scenario, continued low level hybrid pressure could erode internal resources, distract management, and require sustained defensive investment, without overt systemic impact.

In a more severe scenario, the adversary could escalate, synchronising a technical attack on payment messaging with intensified disinformation and further supplier disruption, causing market participants to question the institution’s stability and possibly triggering liquidity stress or regulatory intervention.

Interpretation weighs the plausibility of each scenario, taking into account geopolitical developments, known adversary patterns, and sector wide vulnerabilities.

The institution, through this interpretive lens, assesses its risk posture. It may conclude that the current situation represents a strategic hybrid risk to financial stability, reputational integrity, and regulatory trust, requiring a broader response than the technical containment of individual intrusions.

Interpretation in DHI transforms fused intelligence into an understanding of adversarial intent, systemic vulnerability, and potential future states, framed within the organisation’s concrete regulatory and governance environment. Properly designed and documented, the interpretation phase enables boards and senior management to make decisions that are operationally sound and legally defensible in the face of complex hybrid threat landscapes.


Another attempt to understand the difference between fusion and interpretation.

Fusion answers the question: “What does the evidence show?” It does not answer what to do, why it is happening, or what the consequences are for our organization.

Fusion produces validated correlations, strengthened or rejected hypotheses, evidence backed conclusions, likelihood assessments, factual patterns, adversarial signatures (analytical, not strategic), evidence, event reconstruction, and domain alignment.

Fusion produces the factual, evidentiary foundation. It is objective, technical, analytic.

Interpretation answers:

- “What does this mean for us?”

- “Why is this happening?”

- “What could come next?”

- “How does this affect our strategic, regulatory, or business position?”

Interpretation includes strategic meaning, the adversary’s intent, the adversary’s objective, the broader geopolitical or economic context, and whether this aligns with known hybrid campaigns.

Interpretation includes organisational meaning. What this means for the business, which core assets are threatened, whether this is a shaping operation or a disruption, whether this indicates systemic exposure.

Interpretation includes regulatory meaning. Which legal obligations are implicated, whether this crosses materiality thresholds, the potential for supervisory scrutiny, the exposure to regulatory action, and whether the event is reportable.

Interpretation includes risk significance. Strategic risk, operational risk, reputational risk, financial risk, supply chain risk, resilience impact.

Interpretation includes scenario modelling. Best case scenario, worst case scenario, plausible scenarios, potential escalation path, and spillover effects.

Interpretation includes contextualisation, connecting the fused intelligence with the organisation’s mission, markets, regulatory environment, and adversary landscape.


In some organizations, fusion and interpretation are carried out as one analytical exercise, with evidentiary evaluation and strategic assessment proceeding simultaneously. This practice is methodologically flawed and legally dangerous, because it collapses two fundamentally distinct functions into a single cognitive process, not respecting the boundary between evidentiary analysis and the attribution of meaning.

Fusion involves the construction of analytical fact, the testing of hypotheses, the correlation of signals, the reconstruction of events, and the establishment of what the evidence objectively supports. It is a forensic and epistemic activity governed by standards of analytical sufficiency, reliability, and evidentiary integrity.

Interpretation involves the legal, strategic, and organisational significance of those fused findings, addressing questions of intent, consequence, materiality, scenario evolution, and regulatory impact.

When these two phases are performed together, interpretive judgments contaminate evidentiary reasoning, causing analysts to privilege explanations that fit preconceived organisational narratives or strategic expectations. This introduces confirmation bias, and prematurely excludes alternative hypotheses. It undermines the neutrality required for evidentiary assessment.

The collapse of the two stages leads to legal risk, as the organisation can not demonstrate that the analytical conclusions were reached independently of strategic or legal considerations. Where fusion and interpretation are combined, it becomes impossible to show that decisions were made on the basis of properly fused intelligence, not interpretive preferences.

In regulatory reviews, courts, and post incident investigations, organisations must be able to demonstrate that their assessment of a threat, incident, or hybrid operation was grounded first in an accurate reconstruction of events, and only thereafter in a reasoned evaluation of consequences and obligations. If evidence and interpretation are intermingled, regulators may conclude that the entity failed to exercise appropriate care, it acted on speculative or unsubstantiated assessments, or that it misclassified an incident due to premature interpretive bias. This can affect determinations relating to incident reporting, proportionality of response measures, compliance with statutory duties, and the adequacy of internal governance.


LEGAL DISCLAIMER. The information contained herein is provided for general informational, educational, and conceptual purposes only. It does not constitute, and must not be construed as, legal advice, regulatory advice, or any other form of formal advisory service. No legal, regulatory, fiduciary, or professional relationship must be created through the use, distribution, or interpretation of this material.

Laws, regulations, supervisory expectations, industry standards, and evidentiary rules vary significantly across jurisdictions and sectors. Applications of the principles, frameworks, and concepts described herein may differ depending on local legal requirements, organisational structures, regulatory mandates, contractual obligations, and sector specific compliance regimes. The material may not be appropriate, sufficient, or applicable to every jurisdiction or circumstance.

Legal entities and professionals must seek independent advice from qualified legal counsel licensed in the relevant jurisdiction before making any decisions, taking any action, or relying on any information contained in this document. No representation or warranty, express or implied, is made regarding the accuracy, completeness, reliability, or suitability of this material for any specific particular purpose, entity, or situation. We expressly disclaim any and all liability arising from reliance on the content, including but not limited to actions taken or not taken, errors or omissions, or any direct, indirect, incidental, consequential, or punitive damages.

References to regulatory concepts, legal doctrines, or governance practices are presented solely for educational discussion and do not constitute authoritative statements of law. Where examples are provided, they are illustrative in nature and do not describe actual events, individuals, or organisations. By accessing, using, or distributing this material, you acknowledge and agree that you are solely responsible for obtaining appropriate professional advice and for ensuring compliance with all applicable laws and regulations.


George Lekatis


This website is developed and maintained by Cyber Risk GmbH as part of its professional activities in the fields of risk management and regulatory compliance.

Cyber Risk GmbH specializes in supporting organizations in understanding, navigating, and implementing complex European, U.S., and international risk related regulatory frameworks.

Content is produced and maintained under the professional responsibility of George Lekatis, General Manager of Cyber Risk GmbH, a well known expert in risk management and compliance. He also serves as General Manager of Compliance LLC, a company incorporated in Wilmington, NC, with offices in Washington, DC, providing risk and compliance training in 58 countries.