Treadstone 71 Cyber Intelligence Subscription Program

The Cyber Intelligence 12-Month Online Subscription Program is designed to guide organizations in their cyber and threat intelligence program builds through online lectures, demonstrations, and templates covering a wide range of topics. After years of teaching intelligence courses and delivering intelligence programs to clients, Treadstone 71 now offers the subscription-based, automated program guiding clients through the strategic planning process, goals and objectives creation, maturity assessment, SOP development, threat intelligence platform selection, collection planning, intelligence analysis, analytic writing, and dissemination non-inclusively.

The program includes instructional videos tied to content with periodic direct access to Treadstone 71 for client deliverable reviews. The reviews follow a standard cycle including comments, suggestions, recommendations, and examples of previously finished products. Treadstone71 also offers regular ‘professor’ office hours for Q&A.

The program follows proven methods established over the years while creating intelligence programs. Clients move at a regular pace that corresponds with their internal schedules that Treadstone 71 helps to establish with the client. Clients may choose the entire subscription package or choose modules ala-cart. The subscription also includes the standard Cyber Intelligence Tradecraft Certification training and adds a new module assisting clients with the creation of table-top exercises.

An overview of some of the subscription content follows:

  • Strategic Plan development, acceptance, and dissemination
  • Mission
  • Vision
  • Guiding Principles
  • Roles and Responsibilities
  • Goals and Objectives
  • Roadmap
  • Cyber Intelligence Capability Maturity Model Assessment
  • Standard operating procedures
  •               RACI(S)
  •               Process flow diagrams
  •               Associated metrics
  •               Peer Reviews
  • Intelligence Functions
  • Communications, Responsibilities, Methods
  • Practices and Activities
  • Organizational interfaces
  • SOC and IR
  • Other intelligence groups
  • CISO/CSO and CIO
  • C-Suite
  • Department leadership
  • External groups
  •                            Vendors
  • Cyber Intelligence Lifecycle definition
  • Stakeholder Analysis
  • Collection Planning
  • Production
  • Structured analytic techniques
  • Analysis
  • Analytic Writing
  • Reporting and Briefing
  • Dissemination
  • Intelligence Information Sharing
  •               Enterprise objectives
  •               Communities of Interest
  •               Your internal ISAC
  • Threat Intelligence Platforms
  •               RFP and Selection process
  •               Maturation
  •               Vendor data feeds
  • Training and Knowledge Transfer
  •               Cyber Intelligence Tradecraft Certification
  •                            In-person
  •                            8-week online
  • Treadstone 71 Onsite Assessment and Assistance

Clients subscribing to the program create program content undergoing Treadstone 71 review prior to leadership delivery. The intent is to share our vast expertise in cyber intelligence to assist organizations in the timely building of their programs. Clients may choose to extend their program beyond a year or accelerate their program based upon their acceptance of agreed upon assumptions and requirements. Clients have the ability to speed up or slow down their programs throughout the subscription.

Mixmatch

We see this model as an effective and efficient way to extend our knowledge, share our standards-based program information while setting up an industry model rooted in intelligence community tradecraft. That tradecraft follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training, intelligence community directives (ICDs), content from the Sherman Kent School for Intelligence Analysis and Mercyhurst University as well as boots on the ground experience.

What do you have at the end of the program?

As clients carefully follow the training, timelines, and execute to the deliverables internally, clients will have built a complete cyber threat intelligence program. The program definition, strategy, policies, procedures, process flow diagrams, roles, responsibilities, templates, models, methods, tactics, techniques, reports, dissemination models, briefings, table-top exercises, as well as certified Cyber Intelligence Tradecraft professionals are all core components of the what clients achieve.

Our pricing model will be a fixed price for the core modules with add-on modules priced separately. Treadstone 71 onsite work options will be clear and defined with the ability of clients to purchase onsite and online ‘office hours’ over and above hours provided in the core modules. Clients will have the choice of selecting from several options.

For more information about this new program, contact Treadstone 71 at 888.714.0071 or info@treadstone71.com. We will respond to all inquiries as long as they are from corporate and business accounts.

Copyright 2018 Treadstone 71 LLC

Singapore – Cyber Intelligence Training

Cyber Intel – Brochure and Signup

Cheque: make payable to :
MaitreAllianz PteLtd
Mail to: 3 Queen’s Road, #10-163, Singapore 260003
Bank Transfer: MaitreAllianz PteLtd
United Overseas Bank Limited,
RochorRoad Branch
Account No: 147-3020-918
Swift Code: UOVBSGSG

Payment must be made in Singapore Dollars.
Payment is required within 5 working days on receipt of invoice.
Bookings received less than 14 working days –cash payment only
SUBSTITUTION, CANCELLATION, NO-SHOW, POSTPONEMENT POLICIES, CONTACT DETAILS, and EVENT CONFIRMATION
SUBSTITUTION is allowed up to 7 days before day of event. AdminCharge of S30.00 is required for substitution request received with less than 7 days advance notice.
CANCELLATION must be made in writing. Refunds are computed based on the date of receiving your notice.
Full Refund –28 days or more prior to the event
75% -21 to 27 days notice
50% -20 to 14 days notice
25% -7 to 13 days notice
NO REFUND or credit for 6 days or less notice
NO SHOW, Sick Leave, Urgent BusinessCallor Absent for any reason-the full course fee is due.
If we CANCEL or POSTPONE the event, full refund will be given.
FORCE MAJEURE CLAUSE: We shall assume no liability whatsoever if this event is altered, rescheduled, postponed or canceled due to a fortuitous event, unforeseen occurrence, or any other event that renders performance of this event inadvisable, illegal, impractical or impossible. For purpose of this clause, a fortuitous event shall include but not limited to: an Acts of God; governmental restrictions and / or regulations; war or apparent act of war; terrorism or apparent act of terrorism; disaster; civil disorder, disturbance and / or riots; curtailment, suspension, and/or restriction on transport facilities / means of transportation; any other emergency.
YOUR DETAILS: All details required for registration are mandatory. If you found errors, kindly notify us.
SPEAKER CHANGES: Speakers and topics were confirmed at the time of publishing, however, circumstances beyond the control of the organizers may necessitate substitution, alterations or cancellation of the speakers and/or topics. As such, we reserve the right to alter or modify the advertised speakers and/or topics if necessary. Any substitution or alteration will be reflected on our web page as soon as possible. All delegates or their representative will also be notified as soon as the changes are made.
Tel: 6100 0621
http://www.maitreallianz.com

Course Brochure and Signup

Coincidences Take A Lot of Planning – RSA Conference 2018 – San Francisco

The RSA Conference is soon upon us! The expectation to see old friends and make new rsa1800008-buckle-up_augacquaintances. The show will once again be great with new technologies displayed, new ideas bantered about, and phrases around AI used inappropriately and about 5-10 years too soon. The parties will crank at night and many will suffer the cocktail flu come the next morning. 40,000 strong is the estimated number for this event! Huge!

کنفرانس RSA 2018  rsa-конференция 2018  2018 RSA 회의  rsa 2018年会议  مؤتمر rsa 2018

But what of the undercurrent that occurs unmentioned every year? Just beneath the surface are a series of activities generated by scores of foreign agents looking to steal information, intellectual property, or gain an upper hand over someone of importance being caught doing illicit things. How many spies will blanket the city and the shop floor armed with various technologies used to extract information? Cyber and physical espionage activities run amuck at such events. This is common and expected. How will you know when your data is being pilfered? Will your hotel room be secure? Are your 2018-04-05_14-43-31mobile devices secure? What data have you given up already? Flight plans, hotel information, email addresses, phone numbers, social media data, car rental information, events you will attend, arrival and departure times, restaurant reservations, meeting information… Do you think your data is not in the wind already? Will a chance encounter lead to unexpected information sharing? Is the person next to you at the bar there just by coincidence?

All questions you should consider. All questions that are usually forgotten or ignored.

BEHIND ALL COINCIDENCES THERE IS A PLAN, AND BEHIND ALL PLANS THERE IS A COINCIDENCE – Malnar

I12149464887

Treadstone 71 Selected to Deliver at the RSA Conference 2018 San Francisco

Foundations for a Strong Intelligence Program
April 18, 9AM-11AM RSA Conference
This Lab will explore key aspects of building a strong and long-lasting cyberthreat intelligence program. We’ll review methods of threat intelligence platform selection and bake-off techniques as well as cover stakeholder analysis and priority intelligence requirements. Additionally, we’ll practice collection planning and mission management as well as how to establish effective reporting and dissemination capabilities.

rsa2018
Cyber CounterIntelligence – Deception, Distortion, Dishonesty
April 18, 1:45PM-2:30PM RSA Conference
Deception, distortion, dishonesty are core to social media postings. Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided. The talk will cover methods of countering their messaging while applying these tactics to protect your own organization and brand. Moving from intelligence to counterintelligence is the natural next step in our evolution.

Plague of the Cyber RATS

How a toxic computer code delivered by ‘Remote Access Trojans’ is an invisible army able to take over a petrochemical plant and blow it to pieces

Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 per cent of Iranian university students are studying computer science – a cyber warfare talent pool.

http://www.dailymail.co.uk/news/article-5404055/How-hackers-using-RAT-malware-seized-petrochemical-site.html

No guns. No bombs. No conventional weapons of any kind. An invisible army able take over a petrochemical plant like this and blow it to pieces. That’s the power of a toxic computer code delivered by RATs – ‘Remote Access Trojans’ – that’s making UK security experts VERY nervous indeed

‘Fixing this takes political will, and business is always pushing back, because good cyber security adds costs,’ said Bardin. ‘Ultimately, something is going to blow up.’

Behzad Mesri – #HBO Hack – Silent Terror

البته سوال اصلی من از همون اول که این دیفیسر رو میشناختم
این بود که چرا اسمش یه o کم داره
skote vahshat – 

BehzadMasri – skote_vahshat Get the scoop here (PDF)

بهزاد مصری

فکر کنم اول اشتباه نوشته و همون معروف شده و توی رو در بایستی مونده

Wired Article
حالا امیدوارم که زندگیش خراب نشه، ولی کاش مقامات به این سوال هم پاسخ میدادن

TBH2

این لاگ ها و پیست ها و دیتابیس هایی که توی فروم های زیرزمینی تبادل میشن رو احتمالن دیدید
هیچ امنیت و پرایوسی ای باقی نمونده و قطعن یکی از مشتریان اینها، یا حتا عامل لیک شدنشون خود سازمان های دولتی و امنیتی هستند
چندان عجیب نیست که یک نفر به این شکل مشخصاتش لو میره…
یعنی واقعن هم خیلی کار سختی نیست، با یه سیستم شخصی هم میشه مشابهش رو انجام داد، دیگه دولت که خیلی دستش بازتره

bm3

اونی که مرتکب یک جرم سایبری بزرگ میشه و لو نمیره یا لو میره ولی پیدا نمیشه خیلی کارش درسته…
واقعن کار سختیه… یعنی دائم باید از دید اونی که می خواد پیداش بکنه به موضوع نگاه بکنه و این از کاری که مرتکبش میشه هم مهم تر و شاید سخت تره

سکات وشات

TBH

ا📌 طلاعات تکمیلی در مورد بهزاد مصری و هک HBO

🔹 کشف حمله سایبری زمانی که Time Warner کمپانی پدر HBO در حال خریده شدن توسط AT&T به مبلغ ۸۵ میلیارد دلار بوده است، اتفاق افتاد. این کشف سهام اچ بی او را کاهش داد.

‼️ مصری ظاهرا نمایشنامه قسمت های ساخته نشده سریال های اچ بی او را نیز سرقت کرده است.

🔹 از سوابق مصرف هک کردن زیرساخت‌های انرژی اتمی اسرائیل می باشد.

🔹۷ اتهام مصری شامل «جرایم رایانه‌ای»، «جرایم مالی»، «اخاذی»، «سرقت هویت» و دیگر جرایم است. باور مقامات آمریکایی این است که وی در حال حاضر در ایران سکونت دارد.

🔹 متن ایمیلی که مصری به هک شدگان فرستاده شامل عبارت زیر بوده است:

“Hi to All losers! Yes it’s true! HBO is hacked!”

BM

🔹 مصری با نام مستعار Skote Vahshat حداقل ده اکسپلویت از نوع SQL Injection ثبت کرده، و ده ها سایت را دیفیس کرده است.

🔹 بر اساس ادعای مصری، وی بیش از ۱.۵ ترابایت داده به سرقت برده است.

🔴 گروه هکری OurMine کنترل حساب توییتر HBO را در شهریور ماه گرفتند. به نظر میرسد رمز این حساب توسط مصری به آنها منتقل شده است.

🔴 یکی از دلایل متهم شدن سریع مصری، تلاش وی برای تماس با خبرنگاران و رسانه های متعدد جهت تحت فشار گذاشتن اچ بی او برای پرداخت مبلغ اخاذی بوده است.

🔹 اولین اقدام مصری یافتن دسترسی از راه دور کارکنان به شبکه اچ بی او بوده که بتواند از همان طریق دسترسی خود به زیرساخت را حفظ نماید.

Zapad Exercises – 2nd/3rd Order Effects

 

The recent Russian Zapad wargaming exercises included a plethora of electronic capabilities demonstration and potentially more. Russia is known to recently been involved in illegal immigration efforts in Sweden, Finland, and Norway along with hostile intent along its northern borders (Estonia, Latvia, Lithuania) including cell/communication tower tampering. Could the recent Zapad exercises be more than just wargaming?

Some What If thoughts on these non-linear actions:

– Testing capabilities, distance, strength, impacts
– Testing responses like a stone in pond
    – 2nd and 3rd order effects were measured to determine the impact on targets, targets responses, etc.
    – Russians had people in each target country assisting with target impacts
    – Russians monitored target government communications from within each country
    – Determine length of time for target government to respond and what methods were used and where to get communications back online (if at all) – the locations of the response represent capabilities unknown to Russia until such an exercise is performed
– Other possibles:
     – A cover for illegal activities that occurred during the exercise – a feint, a ruse
 – Testing a precursor to actual execution – that is why military exercises are performed
 – What capabilities are being left in the exercise areas; what is not being removed after the exercise using the exercise as a ruse to place assets close to Western borders that were not there before
 What do you think?
 https://uawire.org/news/media-belarusian-and-russian-militaries-are-jamming-mobile-communications-along-border-with-poland

Treadstone 71 Announces Cyber Intelligence Capability Maturity Model

Treadstone 71 developed a maturity model to help organizations determine the maturity of their cyber intelligence initiatives against the cyber intelligence common body of knowledge (CICBOK). The model provides strategic and operational aspects of your cyber intelligence maturity, where it needs to go, and where you should concentrate your attention to create more value for your business. Nearly 8 years in the making, the Treadstone 71 Cyber Intelligence Maturity Model uses traditional tradecraft as delivered by Sherman Kent and Richards Heuer, intelligence community standards, analytic standards, and experiential knowledge derived from years of training, assessing, and building cyber intelligence programs.

The Treadstone 71 Cyber Intelligence Capability Maturity Model (T71-CICMM) is a methodology used to develop and refine an organization’s cyber intelligence program. Not only is the model educational and practical skills for learning and developing expertise, but also a roadmap for building a cyber intelligence program. More information is available here:

Treadstone 71 Cyber Intelligence Maturity Model

T71CICMM.png

Blog at WordPress.com.

Up ↑

%d bloggers like this: