Read Time:2 Minute, 42 Second
Treadstone 71 Cyber Threat Intelligence Webinar Series 2020
10% of all proceeds will be donated to the Salvation Army https://www.salvationarmyusa.org/usn/covid19/
Five One Hour Cyber Threat Intelligence Webinars covering
- Stakeholder Management – April 14, 2 PM ETD
- Adversary Targeting – April 21, 2 PM ETD
- Intelligence Requirements – April 28, 2 PM ETD
- STEMPLES Plus – Indicators of Change – Hofstede Principles – May 5, 2 PM ETD
- Collection Management – May 12, 2 PM ETD
Register here
Webinar link to be provided upon enrollment.REGISTRATION REQUIREMENT: A VALID COMPANY EMAIL ADDRESS – ANY REGISTRATION OUTSIDE THIS REQUIREMENT WILL BE REJECTED. DO NOT REGISTER WITH GMAIL, HOTMAIL, OUTLOOK, YAHOO, PROTONMAIL, MAIL, TUTANOTA OR ANY TEMPORARY OR NON-GOVERNMENT OR COMPANY EMAIL. COMPANY MUST BE LEGITIMATE. THE ORGANIZATION MUST NOT BE TIED TO AN ADVERSARY GOVERNMENT OR ORGANIZATION.Students Receive:
- 1 CPE per Webinar
- Templates and Forms used in the Webinars
- 10% discounts on Treadstone 71 Training (online and in-person) for up to 1 year from the last Webinar completion date (May 12 to May 11, 2021)
Student requirements:
- Laptop
- WebEx software
- Earphones and microphone preferred
Cyber Threat Intelligence – Stakeholder Management
- Support to Leadership
- During Webinar Exercise
- Purpose of Stakeholder Analysis
- Questions use to organize your products
- Know your customer checklist
- Getting started checklist
- High-level process overview
- Steps to follow
- Sample Invitation Letter
- Strategic Questioning and Listening
- Active and Empathic Listening
- Stakeholder Collection and Tracking Model
- Reporting formats for real-time interaction
- Choices of visual support materials
- Stakeholder Impact and Influence
- Exercise Redux
- Wrap-up // Q&A
Cyber Threat Intelligence – Adversary Targeting
- What is D3A?
- D3A Targeting Requirements
- Adversary Identification
- Breakdown
- Bring in Stakeholder Requirements
- What is F3EAD?
- The D3A/F3EAD Integrated Process
- Aligned to the Cyber Threat Intelligence Lifecycle
- Integrated Lifecycle Breakdown
- The Full Lifecycle
- Logical Adversaries to Intelligence Requirement Development
Cyber Threat Intelligence – Intelligence Requirements
- Introduction
- Priority Intelligence Requirements (PIR) – What are they?
- During Webinar Exercise
- Intelligence Requirements
- Common Adversaries
- Information Requirements Process Flow
- Intelligence Requirements
- Essential Elements of Information
- Specific Information Requirements
- Indicators
- The Overall IR Process Flow
- Targeting – Intelligence Collection
- Information Required Prior to Intelligence Requirements
- Prioritization
- What is an Intelligence Requirement
- What is a Priority Intelligence Requirement
- Prioritization continued
- Collector/Analyst Need to Understand
- Stakeholder knowledge of their systems and data
- Intelligence Team Priority Intelligence Requirements Examples
- Get them to requirements
- Exercise Review
- Wrap-up and Q&A
Cyber Threat Intelligence – STEMPLES Plus – Indicators of Change – Hofstede Principles
- STEMPLES Plus – Strategic Analysis
- The Six Categories – ASCOPE
- Area
- Structures
- Capabilities
- Organizations
- People
- Events
- D3A Targeting F3EAD
- STEMPLES Plus
- Social
- Technical
- Economic
- Military
- Political
- Legal/Legislative
- Educational
- Security
- PLUS
- Religion
- Demographics
- Linguistics
- Psychological
- Other
- Indicators of change
- Motive thru Capabilities
- Levels of Concern
- Example
- Hofstede Principles
- Power and Distance
- Individualism and Collectivism
- Masculinity and Femininity
- Uncertainty Avoidance
- Long Term and Short Term
- Indulgence and Restraint
- Hofstede Country Comparison Exercise
- Wrap up and Q&A
Cyber Threat Intelligence – Collection Management
- Definition
- Requirements Management
- Mission Management
- Mission Analysis
- Gaps
- Collection Planning
- Simplified Process
- Collection Operations
- Principles
- Collection Manager Tasks
- Bringing in Intelligence Requirements
- A Multidisciplinary Approach
- Available Assets
- Complete a Plan
- The Collection Plan Template
- Breakdown of the template
- Collection Manager Tasks Redux
- Example completed plan
- Iterative feedback – Constant communication
- The Collection Plan Template
- Wrap up and Q&A