Treadstone 71 Cyber Intelligence Program Development

Treadstone 71 Cyber Intelligence Program - Align with the needs of leadership - Force Multiplier Advisory Services

Years ago, Treadstone 71 crafted a series of training classes at the Master's level for students eager to learn about cyber intelligence. Since then, Treadstone 71 continued to hone the courses to current events and organizational needs.  Organizations need training in cyber intelligence. All too often we find a dire lack of understanding outside of collection. Most organizations have staff that are proficient at collecting data well. But the next steps in the cyber intelligence lifecycle is lacking. Our training solves that problem providing students with the tools necessary to organize, produce, analyze and deliver recommendations and opportunities to leadership.  



We also found a desire of organizations to assist in the build-out of their programs. On several occasions, Treadstone 71 provided oversight and guidance to companies looking to build their own capabilities. Most see significant dollars going to vendors who provide regular reports but the reports are from a create once -  sell many paradigm. Treadstone 71 teaches you how to fish.

The Treadstone 71 Cyber Intelligence Program includes:

  • Strategic Plan development, acceptance, and dissemination
    • Vision, mission, guiding principles, roles, responsibilities, goals & initiatives
  • Program Plan development, acceptance, dissemination, and implementation
  • Standard Operating Procedures
  • Priority Intelligence Requirement development
    • Passive Intelligence Collection
      • Collection and analysis methods and techniques
    • Organization, Production, Processing - Decomposition
    • Structured Analytic Techniques - Analytic Writing and Dissemination
  • Incident Response 
    • Improve and provide feeds for automation
    • Improve detection and response
  • Intelligence Lifecycle Development
  • Threat Intelligence Program Development
      • Improve and provide feeds for automation and remediation 
      • Security operations 
      • Enhance and improve remediation actions
      • Centralize threat intelligence – Intelligence as a Service – Analysis as a Service
      • Drive improvements to risk management
        • Effective
        • Efficient
    • Improve workflow through well-defined roles and responsibilities
      • People, process and technology enhancements
    • Drive the quality improvements of your intelligence
      • Credibility and relevance
  • Adversaries
    • Who are they?
      • Motivation, intent, capabilities,
      • Dossiers – Baseball cards
  • Attack surface awareness
    • Situational awareness of your attack surface – digital footprint
      • Web – Social Media - Darknet
  • Virtual HUMINT Creation and Management
  • Internet Exposure Assessment - Attack Surface Analysis - Perception Management - Sentiment Analysis
    • Deep Web, Forums, Social Networking, Closed Sites, Darknet
    • Deception Detection and Credibility Analysis
    • Pattern, Trends and Tendency Analysis
  • Competitive Intelligence Assessment and Program Analysis
  • Campaign Analysis with Recommendations and Opportunities
  • Darknet / Deep Web exploration

We also see analysis in organizations, security operations centers and CERTS being performed on a very simplistic level. That level is usually given to the most experienced and most technical person on the team. A method that leads to inherent cognitive bias, a lack of critical thinking and a focus on technology only. This leads to inaccurate information being provided to leadership or information that is very short term and tactical at best - not even actionable intelligence.

Since launching the Cyber Intelligence course, many have asked for the follow-on courses. These courses have been sitting in the wings waiting for organizations to reach the need. That need of moving from a purely defensive posture to a complete posture with the proper operational tempo and targeting. In response to this, Treadstone 71 is now releasing the complete series of courses (Anonymity - Cyber Personas - Social Networking Intelligence - Cyber Intelligence - Cyber Counterintelligence - Cybercrime) wrapped with an opportunity to engage us for full program development.  Treadstone 71 works jointly with your staff to fully understand your priority intelligence requirements, educational needs, strategic and programmatic requirements, and staffing needs to create a program that fits you time frame and needs.  We teach you how to fish. 

Most organizations have spent scores of thousands of dollars in security operations centers, CERTS, and other such organizations. This effort needs to be matured into a well-rounded organization moving from purely technical and tactical to a strategic arm providing daily actionable intelligence and methods to counter adversaries in early stages of planning and preparation. 

Treadstone 71 Cyber Intelligence Training

Contact Treadstone 71 now to find out more about this revolutionary model. The program is sound, the training proven and now in its 5th year of use.  888.714.0074 Office or This email address is being protected from spambots. You need JavaScript enabled to view it. - 















































Treadstone 71©

Search Our Site

Treadstone 71 - We See What Others Cannot

The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio 

Fortune 100 Company



ONLINE - Cyber Intelligence Tradecraft Certification - Enroll now for April 28, 2018, start date. 8-week online course.

March 12-16 Cyber Counterintelligence - Reston, VA (Cyber Intel Course Pre-Requisite)
March 19-23 Cyber Intelligence- Columbia, Maryland
April 9-13 Cyber Intelligence- London, UK

April 23-27 Cyber Intelligence - NYC
April 30 – May 3 Cyber Intelligence - Los Angeles California - Burbank
May 14-18 Cyber Intelligence- San Jose, CA
June 18-22 Cyber Intelligence- Annapolis Junction, Maryland
Aug 13-17 Cyber Intelligence- Reston, VA
Sep 17-21 - Cyber Intelligence- Boston, MA
Oct 15-19 Cyber Counter Intelligence - Reston, VA
Nov 5-9 Cyber Intelligence- Denver, CO
Dec 3-7 Cyber Counter Intelligence - Columbia, Maryland


Intelligence Tradecraft - CounterIntelligence - Clandestine Cyber HUMINT  - Cyber Psyops - Persona Creation and Management - Cyber Influence Operations - Middle Eastern Cyber Warfare Tradecraft

Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly

Students and organizations taught (non-inclusively):

AIB, American Express, Capital One, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, several members of FlashPoint, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA



"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely."

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”


Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.

Treadstone 71 Interview - Daily Mail on Industrial Control System Hacks







Treadstone 71 Cyber Intelligence Services








Treadstone 71 at Blackhat








Treadstone 71 New Services - Analysis as a Service








Cyber Jihad - 2008-2011 Compilation Part 1








Cyber CoiunterIntelligence Doctrine








Iran Cyber Proxies and Capabilities 








The Irari Report








Gaming as a Method of Jihadist Training








Treadstone 71 Keynote








Treadstone 71 Cyber Intel Services / Training
















Treadstone 71 Secureworld Expo







Treadstone 71 Fox News







Treadstone 71 Hacktivity