ciso

How to Make the Most of Cyber Intelligence

Creating a cyber intelligence strategy involves operational and tactical measures as well as technical approaches, says Jeff Bardin, chief intelligence officer at Treadstone 71. See Also: Live Webinar | Combating Cyber Fraud: Best Practices for Increasing Visibility and Automating Threat Response In a video interview with Information Security Media Group, Bardin discusses: Why CISOs should be gathering cyber intelligence; The advantages and disadvantages of using cyber intelligence for offensive means; How CISOs can synthesize intelligence and quickly act…

Read More

Cyber Intelligence Collection Managers Course

Treadstone 71 Cyber Intelligence Manager's Course Course syllabus and content proprietary to Treadstone 71 For questions on the course, contract Treadstone 71 at osint AT treadstone71 DOT com All who sign up must agree to the Course EULA. Signing up for the course indicates click-through consent. Three-day course https://reg.planetreg.com/COLLECTIONMANAGER Non-inclusive Course Outline: Treadstone 71 Cyber Intelligence Collection Manager’s Course Collection Planning Interpretation of Stakeholder Needs PIRs / SIRs Mission and Requirements Management Convert RFI’s to…

Read More

Cyber Security 2015 – Skating Away on the Thin Ice of the New Day

2015 is nearly three week young and I am afraid we are going to see more of the same exposures as we did in 2014. Not much has changed in organizations. They are fundamentally following the same tactics and techniques to ‘defend’ against adversaries as they have for the past several years. The CISO still reports to the CIO in most organizations seeing security still as a technical issue. CISOs battle the CIO quietly trying…

Read More