Treadstone 71 Cyber Threat Intelligence Webinars

Treadstone 71 Cyber Threat Intelligence Webinars

Five One Hour Cyber Threat Intelligence Pre-recorded Webinars covering

Free Short Course on our cyber intelligence training courses

Group Rate

#Registrants Rate/Person(USD)
5 749.00
10 699.00
20 599.00


Webinar link to be provided upon enrollment.

REGISTRATION REQUIREMENT: A VALID COMPANY EMAIL ADDRESS - ANY REGISTRATION OUTSIDE THIS REQUIREMENT WILL BE REJECTED. DO NOT REGISTER WITH GMAIL, HOTMAIL, OUTLOOK, YAHOO, PROTONMAIL, MAIL, TUTANOTA OR ANY TEMPORARY OR NON-GOVERNMENT OR COMPANY EMAIL. COMPANY MUST BE LEGITIMATE. THE ORGANIZATION MUST NOT BE TIED TO AN ADVERSARY GOVERNMENT OR ORGANIZATION.

Students Receive:

  • 1 CPE per Webinar
  • Templates and Forms used in the Webinars
  • 10% discounts on Treadstone 71 Training (online and in-person) for up to 1 year from the last Webinar completion date (May 12 to May 11, 2021)

Student requirements:

  • Laptop
  • WebEx software
  • Earphones and microphone preferred

Cyber Threat Intelligence – Stakeholder Management

On-Demand Webinar Registration

  1. Support to Leadership
    1. During Webinar Exercise
  2. Purpose of Stakeholder Analysis
  3. Questions used to organize your products
  4. Know your customer checklist
  5. Getting started checklist
  6. High-level process overview
  7. Steps to follow
    1. Sample Invitation Letter
  8. Strategic Questioning and Listening
    1. Active and Empathic Listening
  9. Stakeholder Collection and Tracking Model
    1. Reporting formats for real-time interaction
    2. Choices of visual support materials
    3. Stakeholder Impact and Influence
  10. Exercise Redux
  11. Wrap-up // Q&A

Cyber Threat Intelligence – Adversary Targeting

On-Demand Webinar Registration

  1. What is D3A?
  2. D3A Targeting Requirements
    1. Adversary Identification
    2. Breakdown
  3. Bring in Stakeholder Requirements
  4. What is F3EAD?
  5. The D3A/F3EAD Integrated Process
    1. Aligned to the Cyber Threat Intelligence Lifecycle
    2. Integrated Lifecycle Breakdown
    3. The Full Lifecycle
  6. Logical Adversaries to Intelligence Requirement Development
    1. Building Threat Matrices
    2. Simple to Complex
    3. Inclusion of ATT&CK Groups aligned to Nation-States
  7. Exercise Redux
  8. Wrap-up // Q&A

Cyber Threat Intelligence – Intelligence Requirements

On-Demand Webinar Registration

  1. Introduction
  1. Priority Intelligence Requirements (PIR) – What are they?
    1. During Webinar Exercise
  2. Intelligence Requirements
  3. Common Adversaries
  4. Information Requirements Process Flow
    1. Intelligence Requirements
    2. Essential Elements of Information
    3. Specific Information Requirements
    4. Indicators
    5. The Overall IR Process Flow
  5. Targeting – Intelligence Collection
  6. Information Required Prior to Intelligence Requirements
  7. Prioritization
    1. What is an Intelligence Requirement
    2. What is a Priority Intelligence Requirement
    3. Prioritization continued
  8. Collector/Analyst Need to Understand
  9. Stakeholder knowledge of their systems and data
  10. Intelligence Team Priority Intelligence Requirements Examples
  11. Get them to requirements
  12. Exercise Review
  13. Wrap-up and Q&A

Cyber Threat Intelligence – STEMPLES Plus – Indicators of Change – Hofstede Principles

On Demand Webinar Registration

  1. STEMPLES Plus – Strategic Analysis
  2. The Six Categories – ASCOPE
    1. Area
    2. Structures
    3. Capabilities
    4. Organizations
    5. People
    6. Events
  3. D3A Targeting F3EAD
  4. STEMPLES Plus
    1. Social
    2. Technical
    3. Economic
    4. Military
    5. Political
    6. Legal/Legislative
    7. Educational
    8. Security
    9. PLUS
      1. Religion
      2. Demographics
      3. Linguistics
  1. Psychological
  2. Other
  3. Indicators of change
    1. Motive thru Capabilities
    2. Levels of Concern
    3. Example
  4. Hofstede Principles
    1. Power and Distance
    2. Individualism and Collectivism
    3. Masculinity and Femininity
    4. Uncertainty Avoidance
    5. Long Term and Short Term
    6. Indulgence and Restraint
    7. Hofstede Country Comparison Exercise
  5. Wrap up and Q&A

Cyber Threat Intelligence – Collection Management

On Demand Webinar Registration

  1. Definition
  2. Requirements Management
  3. Mission Management
    1. Mission Analysis
    2. Gaps
  4. Collection Planning
    1. Simplified Process
  5. Collection Strategy
    1. Intelligence Collection Synchronization
  6. Collection Operations
    1. Principles
  7. Collection Manager Tasks
    1. Bringing in Intelligence Requirements
    2. A Multidisciplinary Approach
    3. Available Assets
  8. Request for Information
    1. RFI Template
  9. Complete a Plan
    1. The Collection Plan Templates
    2. Breakdown of the template
    3. Collection Manager Tasks Redux
    4. Example completed plan
  10. Iterative feedback – Constant communication
  11. Wrap up and Q&A

Contact Treadstone 71

Please note that only corporate email domains are allowed. Gmail, Hotmail, Yahoo, etc will be rejected.

Please type your full name.

Invalid Input

Invalid Input

Invalid email address.

Please tell us your area of interest.

Invalid Input

Contact Treadstone 71 Today for all your Cyber Intelligence needs.

CONTACT US TODAY