Treadstone 71 Cyber Security Services

Cultural barriers and technical obstacles limit the effectiveness of the efforts of many security organizations.  In response, Treadstone 71 created Trusted Advisory Services.  We very quickly provide customers an unadulterated view of their security and risk posture.  The service provides timely intelligence on how to effectively mature operational inefficiencies while aligning security directly with business and regulatory requirements.  As a result, compliance is translated into actionable solutions and costs are reduced through the effective and efficient integration of security. T71ITILSecMgmt

Most of our competitors focus on risks that align to their offerings.  Treadstone 71 focuses on your business risk.  We know you are concerned with the theft of business critical information. We understand your worries over fraudulent buyers, sellers and the theft of authorization details. We have resolved the disputes that occur due to a lack of defined responsibility and accountability. Treadstone 71 recognizes the frustration and loss of confidence that occurs when systems do not work properly or errors and mistakes cause costly outages and information disclosure. Our Trusted Advisory Services embeds information security risk into your lifecycle ensuring cost reductions while demonstrating security as a true business enabler.


We use an ITIL integrated security approach to providing the most effective, complete and rapid assessment of business risk that we guarantee will noticeably reduce capital and operational costs. Our ‘boots on the ground’ approach ensures that accurate information is gathered and analyzed with a sense of urgency and purpose.

Treadstone 71 is a trusted advisor, offering Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) comprehensive cyber security services that deliver high return on investment. How?

  • We focus on information and information risk, protecting data from its inception through its lifecycle.
  • We offer proven security solutions based on experience defending against and mitigating attacks.
  • Rather than offering a patchwork series of standalone “fixes”, Treadstone 71 provides an integrated solution based on your organization’s existing resources – people, business processes, and technology infrastructure. You capture a higher return on investment because we build upon the resources you have in place.
    • We reduce cycle time and produce sustained benefits quickly by building security into the fabric of your organization.
    • We are proactive. Our proven approach focuses on confidentiality, authenticity, integrity, non-repudiation, and availability.
    • We drive continuous monitoring solutions ensuring your security posture is maintained while maintaining a finger on the pulse of your business drivers.

Federal and state governments, and commercial organizations, are facing the challenge of defending critical information systems from cyber-attacks, both internal and external. Agency CIOs and CISOs must demonstrate an ability to secure their information assets. The advanced persistent threat on enterprise networks, infrastructure, and information systems occurs frequently. CISOs are applying lessons learned from actual attacks that have compromised their systems and exposed their organizations to new threats. We bring mature, federally aware, in-depth solutions covering:

  • Continuous Monitoring Implementation and Management
  • Cloud Security Services (Founding member – Cloud Security Alliance)
  • Cloud Assessment Services (FISMA)
  • Risk, Compliance and Audit Preparation, Mitigation and Support
  • Enterprise Security Architecture Assessment, Design and Deployment
  • Building Security into the SDLC
  • Privacy and Data Protection Services
  • Governance, Risk, and Compliance (GRC) Strategic Planning and Program deployment
  • Risk Management Framework (RMF) building and implementation
  • Enterprise Security Metrics Management
  • Visualization of Exploitable Vulnerabilities – Verified Vectors of Attack
  • FISMA Maturity Assessments, Control Self Assessments and Remediation Support
  • Certification and Accreditation services – System Security Plan development
  • Regulatory Compliance Assessments
  • Risk and Impact Assessments based upon standards and federal regulations
  • Security Policy and Procedure Maturity Assessments and Management (CMM)
  • Security Test and Evaluation Services and Penetration Testing
  • Threat and Vulnerability Assessments
  • Data Classification and Data Loss Assessments
  • Security and Risk Program Implementations
  • Security Vendor Qualification
  • Security Training and Awareness Assessments, Program Management
  • Communication Planning
  • Certification and Accreditation
  • Security Test and Evaluation
  • Independent Verification and Validation
  • Cyber Intelligence – Open Source Intelligence
  • Contact:  Jeff Bardin, CISSP, CISM, NSA-IAM
  • Chief Intelligence Strategist
  • This email address is being protected from spambots. You need JavaScript enabled to view it.
  • 1.888.714.0071


Search Our Site

Treadstone 71 YouTube Channel 



The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio 

Online Cyber Intelligence Training Center for online courses

Jan 14-18, 2019 Cyber Intelligence - Amsterdam, NL

Cyber Intelligence Tradecraft Certification - Reston, VA March 4-8, 2019           

Cyber CounterIntelligence Tradecraft Certification - Reston, VA March 11-14, 2019

Intelligence Tradecraft - CounterIntelligence - Clandestine Cyber HUMINT  - Cyber Psyops - Persona Creation and Management - Cyber Influence Operations - Middle Eastern Cyber Warfare Tradecraft

Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly

Students and organizations taught (non-inclusively): AIB, American Express, Capital One, NATO, Belgian Military Intelligence, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, PenFED, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, Dutch Police, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA



"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely."

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”


Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.

Treadstone 71 Interview - Daily Mail on Industrial Control System Hacks



Treadstone 71 Cyber Intelligence Services

Treadstone 71 at Blackhat


Treadstone 71 New Services - Analysis as a Service

Cyber Jihad - 2008-2011 Compilation Part 1

Cyber CoiunterIntelligence Doctrine

Iran Cyber Proxies and Capabilities 

The Irari Report

Gaming as a Method of Jihadist Training

Treadstone 71 Keynote

Treadstone 71 Fox News

Treadstone 71 Hacktivity