Treadstone 71 Selected to Deliver at the RSA Conference 2018 San Francisco
Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided
Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided
8 Years In the Making – The Treadstone 71 Cyber Intelligence Capability Maturity Model with the Common Body of Knowledge
This is a one-day course designed to educate corporate leadership and stakeholders in cyber and threat intelligence. There is a general awareness of the need to establish intelligence functions. Many organizations do not have a fundamental understanding of what intelligence is, where the function should reside, how it is different from business and competitive intelligence while…
Read More “Intelligence for the C-Suite and Stakeholders” »
Thurs 9:15 AM Moscone South 307. Treadstone 71 talk on adversary infiltration target centric DandD @RSAConference https://www.rsaconference.com/events/us17/agenda/sessions/6113-wilderness-of-shlemiels Register ahead of time for a seat Be there! http://www.treadstone71.com
HALF MOON BAY, CA (PRWEB) JANUARY 25, 2017 Treadstone 71 today announced a full suite of Cyber and Threat Intelligence and CounterIntelligence training courses. The courses drive the expansion of Treadstone 71’s accelerated, academically validated, intelligence training to global markets. Treadstone 71 delivers courses in California, Virginia, Canada, the United Kingdom, and the Netherlands and…
…or What I want for Cyber Security and Intelligence Christmas 2016 All CIOs must have served as a CISO for at least 4 years before being allowed to be a CIO. All CIOs must have a CISSP, CISM, and at least 2 technical information security certifications and have been thoroughly trained and qualified to be…
Read More “The 12 Days of Cyber Christmas” »
This article is partially written in analytic writing format starting with the conclusions first. The Conclusion section does not include normal analytic paragraphs and alternative analysis following standard intelligence tradecraft analytic writing. Instead, the Recommendations and Opportunities section represents supervisory actions. The article uses the Admiralty System or NATO System as a method for evaluating…
“With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real world scenarios establishing a solid understanding on utilizing these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional.”
Social network targeting, data collection, production, analysis and reporting is very much center stage at Treadstone 71. Intelligence of any type must be applied if it is to be useful, and it needs to be actionable. In most cases, this implies that the intelligence has to be transmitted, communicated, shared and delivered with clear recommendations and opportunities to the client.
Treadstone 71 integrates counterintelligence and cyber counterintelligence as extracted and analyzed from social networking and other Web 2.0+ sites. We have taken the physical tradecraft of intelligence and applied cyber methods to this mature discipline. We help organizations recognize how they are being targeted for intelligence collection purposes and, provide cyber counterintelligence support and services to defend against this threat. Our services draw relationships between various social networking sites finding threads that tie together leading to assumptions based upon available evidence. Treadstone 71 also considers various competing hypothesis ensuring all possible scenarios are considered.
Using denial, deception and counterintelligence operations while staying within the legal bounds of our client nation, Treadstone 71 identifies and remediates issues using counter strategies to drive the desired perception. Cyber intelligence gathering from social networking can be a precursor to more devious activities such as cyber espionage and virtual penetration and manipulation of your most prized possessions. Know and understanding your cyber attack surface is the first step towards addressing these issues.
Whether our client is an individual or a large organization, we prepare our customers in the tradecraft of cyber intelligence and counterintelligence. For more information about our Social Networking Intelligence Services, please contact us:
888-687-8450 Office – 508.519.0363 Fax – info@treadstone71.com

You must be logged in to post a comment.