• Seeing is not always believing
    Seeing is not always believing
  • Cyber Intelligence Maturity
    Cyber Intelligence Maturity Cyber Intelligence Maturity Management Cyber Intelligence Common Body of Knowledge
  • Information Sharing through your own ISAC
    Information Sharing through your own ISAC
  • Maskirovka - Non-Linear Warfare
    Maskirovka - Non-Linear Warfare Cyber Maskirovka - Non-Linear Warfare
  • Middle Eastern Cyber Warfare Assessments - Analysis
    Middle Eastern Cyber Warfare Assessments - Analysis Middle Eastern Cyber Warfare Doctrine
  • Cyber Influence Operations
    Cyber Influence Operations Treadstone 71 Cyber Counterintelligence and Clandestine Cyber HUMINT
  • To win at non-linear warfare you must first understand what it is
    To win at non-linear warfare you must first understand what it is
  • Patterns, trends, information inside data, intelligence created to prevent
    Patterns, trends, information inside data, intelligence created to prevent
  • Analysis as a Service - Light the fire for targeted analysis
    Analysis as a Service - Light the fire for targeted analysis
  • High-Value Target - Know Your Customer Risk and Attack Surface Assessment
    High-Value Target - Know Your Customer Risk and Attack Surface Assessment

Treadstone 71 Cyber Intelligence Subscription Program

The Cyber Intelligence 12-Month Online Subscription Program is designed to guide organizations in their cyber and threat intelligence program builds through online lectures, demonstrations,T71mixmatch and templates covering a wide range of topics. After years of teaching intelligence courses and delivering intelligence programs to clients, Treadstone 71 now offers the subscription-based, automated program guiding clients through the strategic planning process, goals and objectives creation, maturity assessment, SOP development, threat intelligence platform selection, collection planning, intelligence analysis, analytic writing, and dissemination non-inclusively.

888.714.0071 for more information - This email address is being protected from spambots. You need JavaScript enabled to view it.

(Cyber-Intelligence-Program-12-Month-Online---Treadstone-71_AR_A.pdf) Get ready for 2019

Cyber Intelligence Tradecraft Certification - Denver November 5-9, 2018 (special price before Nov 1)

Cyber Intelligence Tradecraft Certification - Amsterdam, NL January 14-18, 2019

The program includes instructional videos tied to content with periodic direct access to Treadstone 71 for client deliverable reviews. The reviews follow a standard cycle including comments, suggestions, recommendations, and examples of previously finished products. Treadstone71 also offers regular ‘professor’ office hours for Q&A.

The program follows proven methods established over the years while creating intelligence programs. Clients move at a regular pace that corresponds with their internal schedules that Treadstone 71 helps to establish with the client. Clients may choose the entire subscription package or choose modules ala-cart. The subscription also includes the standard Cyber Intelligence Tradecraft Certification training and adds a new module assisting clients with the creation of table-top exercises.

An overview of some of the subscription content follows:

  • Strategic Plan development, acceptance, and dissemination
  • Mission
  • Vision
  • Guiding Principles
  • Roles and Responsibilities
  • Goals and Objectives
  • Roadmap
  • Cyber Intelligence Capability Maturity Model Assessment
  • Standard operating procedures
  •               RACI(S)
  •               Process flow diagrams
  •               Associated metrics
  •               Peer Reviews
  • Intelligence Functions
  • Communications, Responsibilities, Methods
  • Practices and Activities
  • Organizational interfaces
  • SOC and IR
  • Other intelligence groups
  • CISO/CSO and CIO
  • C-Suite
  • Department leadership
  • External groups
  •                            Vendors
  • Cyber Intelligence Lifecycle definition
  • Stakeholder Analysis
  • Collection Planning
  • Production
  • Structured analytic techniques
  • Analysis
  • Analytic Writing
  • Reporting and Briefing
  • Dissemination
  • Intelligence Information Sharing
  •               Enterprise objectives
  •               Communities of Interest
  •               Your internal ISAC
  • Threat Intelligence Platforms
  •               RFP and Selection process
  •               Maturation
  •               Vendor data feeds
  • Training and Knowledge Transfer
  •               Cyber Intelligence Tradecraft Certification
  •                            In-person
  •                            8-week online
  • Treadstone 71 Onsite Assessment and Assistance

Treadstone 71 developed a maturity model to help organizations determine the maturity of their cyber intelligence initiatives against the cyber intelligence common body of knowledge (Figure 2 below). The model provides strategic and operational aspects of your cyber intelligence maturity, where it needs to go, and where you should concentrate your attention to create more value for your business. 8 years in the making, the Treadstone 71 Cyber Intelligence Maturity Model uses traditional tradecraft as delivered by Sherman Kent and Richards Heuer, intelligence community standards, analytic standards, and experiential knowledge derived from years of training, assessing, and building cyber intelligence programs.

The Treadstone 71 Cyber Intelligence Capability Maturity Model (T71-CICMM) is a methodology used to develop and refine an organization’s cyber intelligence program. Not only is the model of educational and practical skills for learning and developing expertise, but also a roadmap for building a cyber intelligence program.

Treadstone 71 Cyber Intelligence Tradecraft Certification

Program Outline 


CYBINT1 – Anonymity and Passive Persona setup, Open Source Intelligence, the Intelligence Lifecycle, Collection Methods and Techniques, Collection Planning, PIRs, SIRs, Collection Process Flow, Collection Tools and Targeting, Alignment with Hunt and Detect Needs, Ties to CSIRT, TTPs, IoCs, Threat Intelligence, Open Source Intelligence, All-Source Intelligence, Source Credibility and Validity, Source Relevance, Types of Evidence, Confidence usage, Standard Glossary and Taxonomy – 1 Day (Case Study 1 Start)

CYBINT2 – Organization, Production, and Structured Analytic Techniques, Adversary Denial and Deception, Use of Techniques, Standing Orders from Leadership, Process Flow, Metrics, Intake forms, and templates, Case Studies using Techniques, Analysis of Competing Hypothesis, Identifying Your Consumers, Stakeholder Identification, Analytic Writing, BLUF, AIMS, Issues in Analysis/Pitfalls, Case Study 1 Review – 1 Day (Case Study 2 Start, Case Study 1 Complete)

CYBINT3 – Production Management, Critical Thinking, Intellectual Traits, Questions to Diffuse, Creative Thinking, Cognitive Bias, Inductive/Abductive/Deductive Reasoning, Inference and interpretation, Historic trending and campaign analysis, Intelligence for organizational resilience, Review of Intel471, Review of Recorded Future, Threat Intelligence Platforms (TIPs), Assessing TIPs for selection, Information Sharing – Building your internal ISAC, Communities of Interest, Case Study 2 Presentations – 1 Day (Case Study 3 Start, Case Study 2 Complete)

CYBINT4 – Types and Methods of Analysis, Decomposition, Recomposition, Methods for Fusion, Synthesis, and Analysis, Types of Reports, Product Line Mapping / Report Serialization, and Dissemination, Argument Mapping, Intelligence Briefs, Cyber and Threat Intelligence Program Strategic Plan, Goals, Objectives, Course Overview, Tool Reviews, Course Review, Treadstone 71 Methods, Treadstone 71 Cyber Intelligence Capability Maturity Model, Case Study 3 Presentations 2 Days

Lecture, Hands-on, Apprenticeship, in-class exercises, student presentations, analytic writing and products, templates, course material—40 CPEs

This course follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training.

I. Introduction to Intelligence

II. Critical Thinking

III. Analytic Writing

IV. Creative Thinking

V. Analytic Briefing

VI. Structured Analytic Techniques.

VII. Analytic Issues

VIII. Argument Mapping

IX. Case Studies

Copyright 2018 Treadstone 71 LLC

Cyber Intelligence Training Center

Search Our Site

Treadstone 71 YouTube Channel 

T71Circle

 

The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio 

Online Cyber Intelligence Training Center for online courses
Oct 15-19 Cyber Counter Intelligence - Reston, VA
Nov 5-9 Cyber Intelligence- Denver, CO
Jan 14-18, 2019 Cyber Intelligence - Amsterdam, NL

Intelligence Tradecraft - CounterIntelligence - Clandestine Cyber HUMINT  - Cyber Psyops - Persona Creation and Management - Cyber Influence Operations - Middle Eastern Cyber Warfare Tradecraft

Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly

Students and organizations taught (non-inclusively): AIB, American Express, Capital One, NATO, Belgian Military Intelligence, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, PenFED, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, Dutch Police, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA

T71new3

ON THE TREADSTONE 71 CYBER INTELLIGENCE TRADECRAFT TRAINING:

"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely."

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”

T71new4

Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.

Treadstone 71 Interview - Daily Mail on Industrial Control System Hacks

 

 

Treadstone 71 Cyber Intelligence Services

Treadstone 71 at Blackhat

  

Treadstone 71 New Services - Analysis as a Service

Cyber Jihad - 2008-2011 Compilation Part 1

Cyber CoiunterIntelligence Doctrine

Iran Cyber Proxies and Capabilities 

The Irari Report

Gaming as a Method of Jihadist Training

Treadstone 71 Keynote

Treadstone 71 Fox News

Treadstone 71 Hacktivity