SWOT Services

Strengths - Weaknesses - Opportunities - Threats - SWOT

Many information security organizations struggle with creating a functional program that follows business requirements and stays true to business intent. Treadstone 71 can lead you through the process of performing a Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis of your strategy and program. We will train your staff on how to perform a SWOT, execute the SWOT using existing program information, audit findings, policies, procedures and regulations.

Example areas of the SWOT are:

Strengths lists the most effective security aspects of your security program, for example regularly updated and current policies that are well communicated and followed. Improvements to the Department’s security posture can be accomplished by building upon these strengths.

Weaknesses outlines those aspects of your security program that put your organization at risk, for instance improperly configuration systems and devices, lack of well-defined procedures, ad-hoc entitlement review processes for remote access. These aspects of the program system should be improved.

Opportunities describes factors that can help improve your security program and overall posture. This might be the availability of security training funds for developers, or the implementation of a monitoring tool that was never deployed or not fully deployed that can greatly contribute to continuous monitoring. Items in this cell might be low-hanging-fruit--easy wins that can improve your overall security posture.

Threats highlights factors that magnify the adverse effects of your program weaknesses. For instance, your program may be subject to fine-imposing regulations, or may possess weak change management practices that lead to improper configuration management and a lack of asset management tracking. The improper configuration may also be a result of inappropriate access outside of release management windows.

You will walk away from this effort with an understanding of how to perform a SWOT; how to author and execute a security program plan, prioritized roadmap and how to deliver an effective communications plan that includes awareness and training.

Contact us now to get started on building a plan that gets the right people involved at the right time for the right reasons.

Copyright 2003 Treadstone 71 This email address is being protected from spambots. You need JavaScript enabled to view it. 1-888.714.0071 Office - 508.519.0363 Fax

Search Our Site

Treadstone 71 YouTube Channel 

T71Circle

 

The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio 

Online Cyber Intelligence Training Center for online courses

Jan 14-18, 2019 Cyber Intelligence - Amsterdam, NL

Cyber Intelligence Tradecraft Certification - Reston, VA March 4-8, 2019           

Cyber CounterIntelligence Tradecraft Certification - Reston, VA March 11-14, 2019

Intelligence Tradecraft - CounterIntelligence - Clandestine Cyber HUMINT  - Cyber Psyops - Persona Creation and Management - Cyber Influence Operations - Middle Eastern Cyber Warfare Tradecraft

Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly

Students and organizations taught (non-inclusively): AIB, American Express, Capital One, NATO, Belgian Military Intelligence, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, PenFED, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, Dutch Police, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA

T71new3

ON THE TREADSTONE 71 CYBER INTELLIGENCE TRADECRAFT TRAINING:

"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely."

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”

T71new4

Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.

Treadstone 71 Interview - Daily Mail on Industrial Control System Hacks

 

 

Treadstone 71 Cyber Intelligence Services

Treadstone 71 at Blackhat

  

Treadstone 71 New Services - Analysis as a Service

Cyber Jihad - 2008-2011 Compilation Part 1

Cyber CoiunterIntelligence Doctrine

Iran Cyber Proxies and Capabilities 

The Irari Report

Gaming as a Method of Jihadist Training

Treadstone 71 Keynote

Treadstone 71 Fox News

Treadstone 71 Hacktivity