Additional Advisory, Assessment and Training Services
Additional Advisory, Assessment and Training Services
All companies increasingly depend upon business-to-business software applications to enhance operations, creating a broad range of risks in the process. These risks include security, availability, recoverability, performance, scalability, and compliance risks related to mission critical, internet facing systems. Many times, the primary cause of these risks is an absence of expertise and consideration of security and privacy during systems development. Previously unstructured implementations of risk mitigation measures in the systems development lifecycle lead to both over- and under-investment in development controls. Many companies claim to use a risk-based approach that incorporates cost-effective levels of risk mitigation commensurate with the corporations risk tolerance levels. The effort should use security architecture, structure within the systems development lifecycle and a proper coding program and training.
Operational Maturity Using RIIOT
The RIIOT Method – comprises five different approaches to data gathering and can be applied to the administrative, physical and technical areas and is a core underlying principle of any assessment activity.
Strengths - Weaknesses - Opportunities - Threats - SWOT
Many information security organizations struggle with creating a functional program that follows business requirements and stays true to business intent. Treadstone 71 can lead you through the process of performing a Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis of your strategy and program. We will train your staff on how to perform a SWOT, execute the SWOT using existing program information, audit findings, policies, procedures and regulations.
The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers. Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft. This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team. – Antonio
Cyber Intelligence Tradecraft Certification - Reston, VA March 4-8, 2019
Cyber CounterIntelligence Tradecraft Certification - Reston, VA March 11-14, 2019
Intelligence Tradecraft - CounterIntelligence - Clandestine Cyber HUMINT - Cyber Psyops - Persona Creation and Management - Cyber Influence Operations - Middle Eastern Cyber Warfare Tradecraft
Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly
Students and organizations taught (non-inclusively): AIB, American Express, Capital One, NATO, Belgian Military Intelligence, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, PenFED, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, Dutch Police, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).
ON THE TREADSTONE 71 CYBER INTELLIGENCE TRADECRAFT TRAINING:
"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS. SANS does not compare. They are more of a class mill today. The Treadstone 71 course material is unique, focused, and timely."
“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”
Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’
He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.
Treadstone 71 Cyber Intelligence Services
Treadstone 71 at Blackhat
Treadstone 71 New Services - Analysis as a Service
Cyber Jihad - 2008-2011 Compilation Part 1
Cyber CoiunterIntelligence Doctrine
Iran Cyber Proxies and Capabilities
The Irari Report
Gaming as a Method of Jihadist Training
Treadstone 71 Keynote
Treadstone 71 Fox News
Treadstone 71 Hacktivity