• Seeing is not always believing
    Seeing is not always believing
  • Cyber Intelligence Maturity
    Cyber Intelligence Maturity Cyber Intelligence Maturity Management Cyber Intelligence Common Body of Knowledge
  • Information Sharing through your own ISAC
    Information Sharing through your own ISAC
  • Maskirovka - Non-Linear Warfare
    Maskirovka - Non-Linear Warfare Cyber Maskirovka - Non-Linear Warfare
  • Middle Eastern Cyber Warfare Assessments - Analysis
    Middle Eastern Cyber Warfare Assessments - Analysis Middle Eastern Cyber Warfare Doctrine
  • Cyber Influence Operations
    Cyber Influence Operations Treadstone 71 Cyber Counterintelligence and Clandestine Cyber HUMINT
  • To win at non-linear warfare you must first understand what it is
    To win at non-linear warfare you must first understand what it is
  • Patterns, trends, information inside data, intelligence created to prevent
    Patterns, trends, information inside data, intelligence created to prevent
  • Analysis as a Service - Light the fire for targeted analysis
    Analysis as a Service - Light the fire for targeted analysis
  • High-Value Target - Know Your Customer Risk and Attack Surface Assessment
    High-Value Target - Know Your Customer Risk and Attack Surface Assessment

High Level Benefits of the Cyber Intel Course

This course examines Sherman Kent's Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services. 

T71new2

Corporations and other private sector agencies and organizations, increasingly aware of cyber threats, are adding departments and employees to help anticipate and fight cybercrimes, hacktivists, state and non-state actors. This can cost clients more than €8 million per day. Clients learn the cyber intelligence lifecycle.Clients study the role and value of cyber intelligence relative to their organization.Clients develop skills in online targeting and collection, in modern organizations, businesses, and governments.

Clients learn the methods of their adversaries. Time is of the essence when protecting your organization's critical information assets against cyber threats. At times, days or even months can pass before vulnerabilities in your environment are patched, increasing business risk and expanding the window of exposure. 

The services use traditional intelligence tradecraft adopted for the Internet.

Clients understand the extent and depth of their Internet attack surface. (Treadstone 71 Intelligence Strategic Planning and Program Development)

Why do we need skills in cyber intelligence? Treadstone 71 works with clients to rapidly build effective and efficient intelligence capabilities. We have assisted organizations in the:

  • Identification, collection, assessment, development, and dissemination of Internet-based open source intelligence within surface Internet, darknet in support of the protection of the businesses physical and infrastructure as well as staff and clients.
  • Effectively managing, analyzing, extrapolating and visualizing salient data identified from multiple work streams and data sources including Internet-based open source intelligence research and bilateral investigations using relevant tools and methodology to produce high-quality analytical reporting.
  • Providing actionable intelligence and operational support in the form of detailed high-quality Internet-based open source intelligence reporting in support of the businesses physical and infrastructure as well as staff and clients.
  • Working with internal and external stakeholders (including law enforcement) to provide enhanced capabilities for the proactive identification and attribution of threats, activities and threat actors, including cyber criminal actors.
  • Regularly communicating analysis in respect to physical and cyber threat campaigns, threat actors and threat evolution placing into context the resulting current and future threat to their organization.
  • Developing innovative skills and capability to deliver team objectives.
  • Contributing to the growth of the team’s operational capability and delivery by utilizing (self-learning if necessary) suitable tools and analysis.
  • Managing and responding to stakeholder intelligence requirements, producing proper output for a range of audiences from Board level through to frontline staff.
  • Developing and keeping relationships with a wide range of internal stakeholders and external partners, officials and peers.

Today we deal with data and data points. Methods of analysis are not used nor understood. Information Technology staff struggle delivering actionable information useful to organization leadership. In fact, the concept of what is actionable is difficult for staff to articulate. Below are current deficiencies organizations face understanding the data they receive and do not receive:

Data is technical in nature.

Data is dictated by nuances and bias of the technologies in place.

Data is used for detection.

Data is not effectively organized for analysis.

Analysis is limited to technical trending and patterns.

Analysis, if it occurs, does not follow rigor and standard methods.

Reporting to senior leadership does not address their concerns and needs.

Metrics are not actionable, timely or accurate.

Personal agendas are part of the reporting.

Alternatives are not considered.

Analytic bias are unconsciously included in reports skewing the results.

There is an unwillingness to consider other judgments.

Outside experts are not used.

Responsibility for the judgment(s) is not collective.

Sources are not validated for credibility.

Sources are not verified for relevance.

Data and information gaps are not understood or communicated.

Concepts surrounding critical thinking are foreign to IT organizations.

Admission of mistakes is limited and/or hidden.

Data and information is not usable or complete.

(Treadstone 71 Intelligence Training)

Cyber Intelligence Training and Services ensures clients:

Identify the differences and intersections between open source data, open source information and open source intelligence

Understand the role and value of cyber intelligence relative to online targeting and collection, in modern organizations.

Understand the use of online anonymity

Understand their Internet attack surface:

Methods to remediate attack surface issues

Step by step methods to implement the program

Ideas for policy and procedure changes

Integration with traditional technical penetration testing and threat vulnerability assessments

New methods that identifies least path of resistance

Understand collection and analysis of online human intelligence, geospatial information, imagery intelligence, and cyber intelligence (all source)

Know the fundamentals behind cyber intelligence collection and analysis

Deliver accurate reports on time with complete data

Remove bias from reporting

Build rigor and stand methods of intelligence into their programs

Quickly examine the data for new targeting and potential immediate recommendations and/or opportunities

Develop methods for critical thinking

Build skills and capabilities in OSINT tools for data collection

Move from see, detect and arrest to prevention and prediction

Align technical with social networking data.

Create information of value

Deliver actionable intelligence that is accurate and complete

Understanding link, trend, pattern, tendency, and anomaly analysis

Develop capabilities that anticipate adversarial actions

Reduce analytic cycle time

Provide leadership with recommendations and opportunities

Deliver the bottom line up front each time, every time

Cyber Intelligence Training and Program development assists organizations to:

  • Drive strategy to define and deliver the analytic reporting;
  • Expand intelligence team capabilities to aggregate data, information, and intelligence from both internal and external sources;
  • Hold the organization to account to reflect the client and stakeholder perspectives into its everyday actions; and
  • Create and embed the behavioral, target-based, analytic methods;
  • understand methods to support the governance of external data collections required across the organization through provisioning of an ad-hoc collection service and managing organizational feedback questionnaire;
  • Promote and embed organizational intelligence services including establishing and building processes, products, making the best use of technology, and building effective relationships;
  • Make the most appropriate use of data and information to join up intelligence and engage with stakeholders across your organization to produce credible intelligence products;
  • Manage effective engagements with internal stakeholders to gain an understanding of their requirements to deliver appropriate intelligence services and products;
  • Promote any intelligence service and products; (Intelligence as a Force Multiplier)
  • Find new, and managing existing, relationships with stakeholders;
  • Engage with external contacts to build new and develop existing relationships with organizations, data providers, and technology vendors.
  • Exploit existing resources and tools to shape credible intelligence and proactively seeking new ways to enhance and improve the intelligence service offerings;
  • Improve processes, approaches, and tools to deliver the most efficient and effective service your organization;
  • Support the cyber, threat, business, and competitive intelligence leads in managing the delivery of key products;
  • Deliver presentations and training to support the team and internal stakeholders in understanding our intelligence services;
  • Support and shape strategic technology requirements to support intelligence processes;
  • Provide mentoring and coaching for colleagues and;
  • Actively contribute to wider departmental intelligence activities and initiatives.

 

“The Cyber Intelligence Training delivered and created by Jeff Bardin adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – StudentFortune 100 Company”

Contact Treadstone 71 today – This email address is being protected from spambots. You need JavaScript enabled to view it.This email address is being protected from spambots. You need JavaScript enabled to view it.

 

 

Search Our Site

Treadstone 71 YouTube Channel 

T71Circle

 

The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio 

Online Cyber Intelligence Training Center for online courses
June 18-22 Cyber Intelligence - London
Jul 31-Aug 3 Cyber Intelligence Tradecraft Las Vegas - PRE-BLACKHAT
Aug 13-17 Cyber Intelligence- Reston, VA
Sep 17-21 - Cyber Intelligence- Boston, MA
Oct 15-19 Cyber Counter Intelligence - Reston, VA
Nov 5-9 Cyber Intelligence- Denver, CO
Dec 3-7 Cyber Counter Intelligence - Columbia, Maryland

Intelligence Tradecraft - CounterIntelligence - Clandestine Cyber HUMINT  - Cyber Psyops - Persona Creation and Management - Cyber Influence Operations - Middle Eastern Cyber Warfare Tradecraft

Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly

Students and organizations taught (non-inclusively): AIB, American Express, Capital One, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, several members of FlashPoint, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA

T71new3

ON THE TREADSTONE 71 CYBER INTELLIGENCE TRADECRAFT TRAINING:

"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely."

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”

T71new4

Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.

Treadstone 71 Interview - Daily Mail on Industrial Control System Hacks

 

 

Treadstone 71 Cyber Intelligence Services

Treadstone 71 at Blackhat

  

Treadstone 71 New Services - Analysis as a Service

Cyber Jihad - 2008-2011 Compilation Part 1

Cyber CoiunterIntelligence Doctrine

Iran Cyber Proxies and Capabilities 

The Irari Report

Gaming as a Method of Jihadist Training

Treadstone 71 Keynote

Treadstone 71 Fox News

Treadstone 71 Hacktivity