Fall Sale on Online Intelligence Training
WWW.CYBERINTELTRAININGCENTER.COM WWW.TREADSTONE71.COM
WWW.CYBERINTELTRAININGCENTER.COM WWW.TREADSTONE71.COM
Creating a cyber intelligence strategy involves operational and tactical measures as well as technical approaches, says Jeff Bardin, chief intelligence officer at Treadstone 71. See Also: Live Webinar | Combating Cyber Fraud: Best Practices for Increasing Visibility and Automating Threat Response In a video interview with Information Security Media Group, Bardin discusses: Why CISOs should be gathering cyber…
Read More “How to Make the Most of Cyber Intelligence” »
Treadstone 71 announces our new Training Subscription Program for Cyber Intelligence. Bring your teams together and harness the power of team-based, corporate targeted, virtual cyber intelligence learning. Treadstone 71 delivers a comprehensive set of cyber threat intelligence and counterintelligence training for your organization geared to instruct and provide hands-on learning while maturing your program. Our…
Read More “Subscription Training Cyber Intel, Counterintel, Analysis, Techniques…” »
“When you have the training, are given a knowledgebase of targeted artifacts, and have direct access to the source for four weeks, you have everything you need to rapidly build your cyber and threat intelligence program.”
a pragmatic approach to security and threat intelligence, away from the buzzwords and away from the fluff talk.
An extension and update to Fallacies and Faultlines Organizations follow inaccurate definitions of threat intelligence leading to poorly conceived cyber threat intelligence programs. Vendors communicate threat intelligence definitions supporting their offerings propagating the fallacy that threat intelligence solves numerous security problems. Treadstone 71 Stakeholder Brief-Understanding Intelligence Cyber Threat Intelligence functions being built on a foundation…
Read More “Stakeholder Brief – Understanding Intelligence” »
…, inaccurate understanding of what an intelligence professional is, and the inability of organizations to see beyond purely defensive measures for information security. These fallacies, understood to be non-inclusive, create inherent fault lines in our security programs.
This free course provides an overview of the Certified Threat Intelligence Analyst online instruction as well as pre-recorded webinars on Stakeholder Management, Adversary Targeting, Intelligence Requirements, STEMPLES Plus, and Collection Management. Treadstone 71 Online Training
Stakeholder Management – April 14, 2 PM ETD
Adversary Targeting – April 21, 2 PM ETD
Intelligence Requirements – April 28, 2 PM ETD
STEMPLES Plus – Indicators of Change – Hofstede Principles – May 5, 2 PM ETD
Collection Management – May 12, 2 PM ETD

You must be logged in to post a comment.