0 0
Read Time:42 Second

Three days from 9 AM to 18-19:00 September 7-9, 2021 – Back Bay Boston, Massachusetts

Learn and execute the intelligence lifecycle as you build your cyber intelligence program or enhance your existing program.

We will cover Stakeholder Analysis, Priority Intelligence Requirements, Adversary Targeting, and Threat Matrices, STEMPLES Plus, Collection Planning, and Execution. Each section will include artifacts covering policies, procedures, methods, rules, RACIs, process flow diagrams, templates, and examples.

In addition to the above, we will cover Structured Analytic Techniques (SATS), Analysis, Analytic Writing, and Briefing Methods.

You will walk out of this class with all the above plus sample strategic intelligence program plans, job descriptions, threat intelligence RFP documentation, and examples.

This class is limited to 12 students at this time.

For more information contact Treadstone 71 at info AT treadstone71 DOT com

See you in Boston!

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence