Treadstone 71 Cyber Intelligence Subscription Program

The Cyber Intelligence 12-Month Online Subscription Program is designed to guide organizations in their cyber and threat intelligence program builds through online lectures, demonstrations, and templates covering a wide range of topics. After years of teaching intelligence courses and delivering intelligence programs to clients, Treadstone 71 now offers the subscription-based, automated program guiding clients through the strategic planning process, goals and objectives creation, maturity assessment, SOP development, threat intelligence platform selection, collection planning, intelligence analysis, analytic writing, and dissemination non-inclusively.

The program includes instructional videos tied to content with periodic direct access to Treadstone 71 for client deliverable reviews. The reviews follow a standard cycle including comments, suggestions, recommendations, and examples of previously finished products. Treadstone71 also offers regular ‘professor’ office hours for Q&A.

The program follows proven methods established over the years while creating intelligence programs. Clients move at a regular pace that corresponds with their internal schedules that Treadstone 71 helps to establish with the client. Clients may choose the entire subscription package or choose modules ala-cart. The subscription also includes the standard Cyber Intelligence Tradecraft Certification training and adds a new module assisting clients with the creation of table-top exercises.

An overview of some of the subscription content follows:

  • Strategic Plan development, acceptance, and dissemination
  • Mission
  • Vision
  • Guiding Principles
  • Roles and Responsibilities
  • Goals and Objectives
  • Roadmap
  • Cyber Intelligence Capability Maturity Model Assessment
  • Standard operating procedures
  •               RACI(S)
  •               Process flow diagrams
  •               Associated metrics
  •               Peer Reviews
  • Intelligence Functions
  • Communications, Responsibilities, Methods
  • Practices and Activities
  • Organizational interfaces
  • SOC and IR
  • Other intelligence groups
  • CISO/CSO and CIO
  • C-Suite
  • Department leadership
  • External groups
  •                            Vendors
  • Cyber Intelligence Lifecycle definition
  • Stakeholder Analysis
  • Collection Planning
  • Production
  • Structured analytic techniques
  • Analysis
  • Analytic Writing
  • Reporting and Briefing
  • Dissemination
  • Intelligence Information Sharing
  •               Enterprise objectives
  •               Communities of Interest
  •               Your internal ISAC
  • Threat Intelligence Platforms
  •               RFP and Selection process
  •               Maturation
  •               Vendor data feeds
  • Training and Knowledge Transfer
  •               Cyber Intelligence Tradecraft Certification
  •                            In-person
  •                            8-week online
  • Treadstone 71 Onsite Assessment and Assistance

Clients subscribing to the program create program content undergoing Treadstone 71 review prior to leadership delivery. The intent is to share our vast expertise in cyber intelligence to assist organizations in the timely building of their programs. Clients may choose to extend their program beyond a year or accelerate their program based upon their acceptance of agreed upon assumptions and requirements. Clients have the ability to speed up or slow down their programs throughout the subscription.

Mixmatch

We see this model as an effective and efficient way to extend our knowledge, share our standards-based program information while setting up an industry model rooted in intelligence community tradecraft. That tradecraft follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training, intelligence community directives (ICDs), content from the Sherman Kent School for Intelligence Analysis and Mercyhurst University as well as boots on the ground experience.

What do you have at the end of the program?

As clients carefully follow the training, timelines, and execute to the deliverables internally, clients will have built a complete cyber threat intelligence program. The program definition, strategy, policies, procedures, process flow diagrams, roles, responsibilities, templates, models, methods, tactics, techniques, reports, dissemination models, briefings, table-top exercises, as well as certified Cyber Intelligence Tradecraft professionals are all core components of the what clients achieve.

Our pricing model will be a fixed price for the core modules with add-on modules priced separately. Treadstone 71 onsite work options will be clear and defined with the ability of clients to purchase onsite and online ‘office hours’ over and above hours provided in the core modules. Clients will have the choice of selecting from several options.

For more information about this new program, contact Treadstone 71 at 888.714.0071 or info@treadstone71.com. We will respond to all inquiries as long as they are from corporate and business accounts.

Copyright 2018 Treadstone 71 LLC

Singapore – Cyber Intelligence Training

Cyber Intel – Brochure and Signup

Cheque: make payable to :
MaitreAllianz PteLtd
Mail to: 3 Queen’s Road, #10-163, Singapore 260003
Bank Transfer: MaitreAllianz PteLtd
United Overseas Bank Limited,
RochorRoad Branch
Account No: 147-3020-918
Swift Code: UOVBSGSG

Payment must be made in Singapore Dollars.
Payment is required within 5 working days on receipt of invoice.
Bookings received less than 14 working days –cash payment only
SUBSTITUTION, CANCELLATION, NO-SHOW, POSTPONEMENT POLICIES, CONTACT DETAILS, and EVENT CONFIRMATION
SUBSTITUTION is allowed up to 7 days before day of event. AdminCharge of S30.00 is required for substitution request received with less than 7 days advance notice.
CANCELLATION must be made in writing. Refunds are computed based on the date of receiving your notice.
Full Refund –28 days or more prior to the event
75% -21 to 27 days notice
50% -20 to 14 days notice
25% -7 to 13 days notice
NO REFUND or credit for 6 days or less notice
NO SHOW, Sick Leave, Urgent BusinessCallor Absent for any reason-the full course fee is due.
If we CANCEL or POSTPONE the event, full refund will be given.
FORCE MAJEURE CLAUSE: We shall assume no liability whatsoever if this event is altered, rescheduled, postponed or canceled due to a fortuitous event, unforeseen occurrence, or any other event that renders performance of this event inadvisable, illegal, impractical or impossible. For purpose of this clause, a fortuitous event shall include but not limited to: an Acts of God; governmental restrictions and / or regulations; war or apparent act of war; terrorism or apparent act of terrorism; disaster; civil disorder, disturbance and / or riots; curtailment, suspension, and/or restriction on transport facilities / means of transportation; any other emergency.
YOUR DETAILS: All details required for registration are mandatory. If you found errors, kindly notify us.
SPEAKER CHANGES: Speakers and topics were confirmed at the time of publishing, however, circumstances beyond the control of the organizers may necessitate substitution, alterations or cancellation of the speakers and/or topics. As such, we reserve the right to alter or modify the advertised speakers and/or topics if necessary. Any substitution or alteration will be reflected on our web page as soon as possible. All delegates or their representative will also be notified as soon as the changes are made.
Tel: 6100 0621
http://www.maitreallianz.com

Course Brochure and Signup

Treadstone 71 Selected to Deliver at the RSA Conference 2018 San Francisco

Foundations for a Strong Intelligence Program
April 18, 9AM-11AM RSA Conference
This Lab will explore key aspects of building a strong and long-lasting cyberthreat intelligence program. We’ll review methods of threat intelligence platform selection and bake-off techniques as well as cover stakeholder analysis and priority intelligence requirements. Additionally, we’ll practice collection planning and mission management as well as how to establish effective reporting and dissemination capabilities.

rsa2018
Cyber CounterIntelligence – Deception, Distortion, Dishonesty
April 18, 1:45PM-2:30PM RSA Conference
Deception, distortion, dishonesty are core to social media postings. Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided. The talk will cover methods of countering their messaging while applying these tactics to protect your own organization and brand. Moving from intelligence to counterintelligence is the natural next step in our evolution.

The Treadstone 71 Cyber Intelligence Program

Treadstone 71 Cyber Intelligence Program – Align with the needs of leadership

Years ago, Treadstone 71 crafted a series of training classes at the Master’s level for students eager to learn about cyber intelligence. Since then, Treadstone 71 continued to hone the courses to current events and organizational needs.  Organizations need training in cyber intelligence. All too often we find a dire lack of understanding outside of collection. Most organizations have staff that are proficient at collecting data well. But the next steps in the cyber intelligence lifecycle is lacking. Our training solves that problem providing students with the tools necessary to organize, produce, analyze and deliver recommendations and opportunities to leadership.

We also found a desire of organizations to assist in the build out of their programs. On several occasions, Treadstone 71 provided oversight and guidance to companies looking to build their own capabilities. Most see significant dollars going to vendors who provide regular reports, but the reports are from a create once –  sell many paradigm. Treadstone 71 teaches you how to fish.

The Treadstone 71 Cyber Intelligence Program includes:

  • Strategic Plan development, acceptance, and dissemination
    • Vision, mission, guiding principles, roles, responsibilities, goals & initiatives
  • Program Plan development, acceptance, dissemination, and implementation
  • Standard Operating Procedures
  • Priority Intelligence Requirement development
    • Passive Intelligence Collection
      • Collection and analysis methods and techniques
    • Organization, Production, Processing – Decomposition
    • Structured Analytic Techniques – Analytic Writing and Dissemination
  • Incident Response
    • Improve and provide feeds for automation
    • Improve detection and response
  • Intelligence Lifecycle Development
  • Threat Intelligence Program Development
      • Improve and provide feeds for automation and remediation
      • Security operations
      • Enhance and improve remediation actions
      • Centralize threat intelligence – Intelligence as a Service – Analysis as a Service
      • Drive improvements to risk management
        • Effective
        • Efficient
    • Improve workflow through well-defined roles and responsibilities
      • People, process and technology enhancements
    • Drive the quality improvements of your intelligence
      • Credibility and relevance
  • Adversaries
    • Who are they?
      • Motivation, intent, capabilities,
      • Dossiers – Baseball cards
  • Attack surface awareness
    • Situational awareness of your attack surface – digital footprint
      • Web – Social Media – Darknet
  • Virtual HUMINT Creation and Management
  • Internet Exposure Assessment – Attack Surface Analysis – Perception Management – Sentiment Analysis
    • Deep Web, Forums, Social Networking, Closed Sites, Darknet
    • Deception Detection and Credibility Analysis
    • Pattern, Trends and Tendency Analysis
  • Competitive Intelligence Assessment and Program Analysis
  • Campaign Analysis with Recommendations and Opportunities
  • Darknet / Deep Web exploration

We also see analysis in organizations, security operations centers and CERTS being performed on a very simplistic level. That level is usually given to the most experienced and most technical person on the team. A method that leads to inherent cognitive bias, a lack of critical thinking and a focus on technology only. This leads to inaccurate information being provided to leadership or information that is very short term and tactical at best – not even actionable intelligence.

Since launching the Cyber Intelligence course, many have asked for the follow-on courses. These courses have been sitting in the wings waiting for organizations to reach the need. That need of moving from a purely defensive posture to a enterprise posture with the proper operational tempo, situational awareness, and targeting. In response to this, Treadstone 71 is now releasing the complete series of courses (Anonymity – Cyber Personas – Social Networking Intelligence – Cyber Intelligence – Cyber Counterintelligence – Cybercrime) wrapped with an opportunity to engage us for full program development.  Treadstone 71 works jointly with your staff to fully understand your priority intelligence requirements, educational needs, strategic and programmatic requirements, and staffing needs to create a program that fits you time frame and needs.  We teach you how to fish.

Treadstone71CyberIntelProgram

Most organizations have expend scores of thousands of dollars in security operations 2016-01-26_9-38-51centers, CERTs and other such organizations. This effort needs to be matured into a well-rounded organization moving from purely technical and tactical to a strategic arm providing daily actionable intelligence and methods to counter adversaries in early stages of planning and preparation.

Treadstone 71 Cyber Intelligence Training

Cyber Intelligence Tradecraft Certification (click on the image to the left)

Contact Treadstone 71 now to find out more about this evolutionary model. The program is sound, the training proven and now in its 5th year of use.  888.714.0074  info@treadstone71.com

Blog at WordPress.com.

Up ↑

%d bloggers like this: