Cyber Threat Intelligence Webinar Series 2020

Treadstone 71 Cyber Threat Intelligence Webinar Series 2020

10% of all proceeds will be donated to the Salvation Army https://www.salvationarmyusa.org/usn/covid19/

Five One Hour Cyber Threat Intelligence Webinars covering

  • Stakeholder Management – April 14, 2 PM ETD
  • Adversary Targeting – April 21, 2 PM ETD
  • Intelligence Requirements – April 28, 2 PM ETD
  • STEMPLES Plus – Indicators of Change – Hofstede Principles – May 5, 2 PM ETD
  • Collection Management – May 12, 2 PM ETD

Register here


Webinar link to be provided upon enrollment.REGISTRATION REQUIREMENT: A VALID COMPANY EMAIL ADDRESS – ANY REGISTRATION OUTSIDE THIS REQUIREMENT WILL BE REJECTED. DO NOT REGISTER WITH GMAIL, HOTMAIL, OUTLOOK, YAHOO, PROTONMAIL, MAIL, TUTANOTA OR ANY TEMPORARY OR NON-GOVERNMENT OR COMPANY EMAIL. COMPANY MUST BE LEGITIMATE. THE ORGANIZATION MUST NOT BE TIED TO AN ADVERSARY GOVERNMENT OR ORGANIZATION.

Students Receive:

  • 1 CPE per Webinar
  • Templates and Forms used in the Webinars
  • 10% discounts on Treadstone 71 Training (online and in-person) for up to 1 year from the last Webinar completion date (May 12 to May 11, 2021)

Student requirements:

  • Laptop
  • WebEx software
  • Earphones and microphone preferred

Cyber Threat Intelligence – Stakeholder Management

  1. Support to Leadership
    1. During Webinar Exercise
  2. Purpose of Stakeholder Analysis
  3. Questions use to organize your products
  4. Know your customer checklist
  5. Getting started checklist
  6. High-level process overview
  7. Steps to follow
    1. Sample Invitation Letter
  8. Strategic Questioning and Listening
    1. Active and Empathic Listening
  9. Stakeholder Collection and Tracking Model
    1. Reporting formats for real-time interaction
    2. Choices of visual support materials
    3. Stakeholder Impact and Influence
  10. Exercise Redux
  11. Wrap-up // Q&A

Cyber Threat Intelligence – Adversary Targeting

  1. What is D3A?
    1. D3A Targeting Requirements
    2. Adversary Identification
      1. Breakdown
    3. Bring in Stakeholder Requirements
    4. What is F3EAD?
    5. The D3A/F3EAD Integrated Process
      1. Aligned to the Cyber Threat Intelligence Lifecycle
      2. Integrated Lifecycle Breakdown
    6. The Full Lifecycle
      1. Logical Adversaries to Intelligence Requirement Development

Cyber Threat Intelligence – Intelligence Requirements

  1. Introduction
  2. Priority Intelligence Requirements (PIR) – What are they?
    1. During Webinar Exercise
  3. Intelligence Requirements
  4. Common Adversaries
  5. Information Requirements Process Flow
    1. Intelligence Requirements
    2. Essential Elements of Information
    3. Specific Information Requirements
    4. Indicators
    5. The Overall IR Process Flow
  6. Targeting – Intelligence Collection
  7. Information Required Prior to Intelligence Requirements
  8. Prioritization
    1. What is an Intelligence Requirement
    2. What is a Priority Intelligence Requirement
    3. Prioritization continued
  9. Collector/Analyst Need to Understand
  10. Stakeholder knowledge of their systems and data
  11. Intelligence Team Priority Intelligence Requirements Examples
  12. Get them to requirements
  13. Exercise Review
  14. Wrap-up and Q&A

Cyber Threat Intelligence – STEMPLES Plus – Indicators of Change – Hofstede Principles

  1. STEMPLES Plus – Strategic Analysis
  2. The Six Categories – ASCOPE
    1. Area
    2. Structures
    3. Capabilities
    4. Organizations
    5. People
    6. Events
  3. D3A Targeting F3EAD
  4. STEMPLES Plus
    1. Social
    2. Technical
    3. Economic
    4. Military
    5. Political
    6. Legal/Legislative
    7. Educational
    8. Security
    9. PLUS
      1. Religion
      2. Demographics
  • Linguistics
  1. Psychological
  2. Other
  3. Indicators of change
    1. Motive thru Capabilities
    2. Levels of Concern
    3. Example
  4. Hofstede Principles
    1. Power and Distance
    2. Individualism and Collectivism
    3. Masculinity and Femininity
    4. Uncertainty Avoidance
    5. Long Term and Short Term
    6. Indulgence and Restraint
    7. Hofstede Country Comparison Exercise
  5. Wrap up and Q&A

Cyber Threat Intelligence – Collection Management

  1. Definition
  2. Requirements Management
  3. Mission Management
    1. Mission Analysis
  4. Gaps
  5. Collection Planning
    1. Simplified Process
  6. Collection Operations
  7. Principles
  8. Collection Manager Tasks
  9. Bringing in Intelligence Requirements
  10. A Multidisciplinary Approach
  11. Available Assets
  12. Complete a Plan
    1. The Collection Plan Template
      1. Breakdown of the template
    2. Collection Manager Tasks Redux
    3. Example completed plan
    4. Iterative feedback – Constant communication
  13. Wrap up and Q&A