The Treadstone 71 Intelligence Roadmap

HALF MOON BAY, Calif., July 11, 2019/PRNewswire/ -- Treadstone 71, the leading cyber and intelligence tradecraft company, today announced the Treadstone 71 Intelligence Roadmap. The new education program includes in-depth training along the cyber threat intelligence and counterintelligence lifecycles covering each phase in detail. Cyber Threat Intelligence professionals seeking skill enhancements and unique capabilities while adding boundless value to their organizations should take a hard look at this roadmap.
The Treadstone 71 Intelligence Roadmap focuses on two tracks:

  • Certified Cyber Intelligence Professional
  • Certified Cyber CounterIntelligence Professional

The program outlines a roadmap unlike any other in the cyber intelligence industry. Building on our 12th year offering cyber and threat intelligence training, Treadstone 71 now delivers two 1-year programs that include comprehensive study in the following

Certified Cyber Intelligence Professional (5 modules plus the capstone):

  • Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
  • Open Source Intelligence, Adversary Targeted OSINT
  • Collection Management
  • Structured Analytic Techniques
  • Critical Thinking/Cognitive Bias
  • Analytic Writing, Reporting, & Dissemination
  • Capstone Skills Evaluation


This track takes 21 days over (up to) 1-year blending in-person training with online narrative video with hands-on exercises. Students receive 164 CPE for program completion.


Certified Cyber CounterIntelligence Professional (5 modules plus capstone):

  • Operational Security (OPSEC)
  • Persona Development and Management
  • CounterIntelligence Tools
  • Persuasion, Manipulation, and Propaganda
  • The Denial and Deception Lifecycle
  • Influence Operations
  • Capstone Skills Evaluation


This track takes 17 days over (up to) 1-year blending in-person training with online narrative video with hands-on exercises. Students receive 136 CPE for program completion.


For cyber and threat intelligence professionals seeking full-scope lifecycle skills in intelligence and counterintelligence, this is the program for you. The roadmap is also perfect for those looking to break into the program. The Intelligence Roadmap uses the Cyber Intelligence and CounterIntelligence Common Body of Knowledge created by Treadstone 71.


About Treadstone 71 See the Intelligence Roadmap
Treadstone 71's Certified Threat Intelligence and CounterIntelligence Analyst training and the Intelligence Roadmap are the gold standards in the industry today derived from both academia, the intelligence community, and from Treadstone 71's experience in building cyber and threat intelligence programs at Fortune 500 organizations worldwide. Treadstone 71 is delivering the only complete cyber threat intelligence lifecycle management solution enabling information sharing, internal intelligence communities of interest while empowering lifecycle management with an iterative feedback loop.
More information: See the Intelligence Roadmap

 

  • Hits: 228

Treadstone 71 Unveils Cyber Intelligence Lifecycle Solution

HALF MOON BAY, Calif., June 10, 2019 (SEND2PRESS NEWSWIRE) -- Treadstone 71, the leading cyber and threat intelligence tradecraft company, today announced the availability of a new offering: Cyber Intelligence Lifecycle. The new module will enable teams to organize their cyber threat intelligence program, publish their strategic plans, build stakeholder models, establish collection plans, rate and verify data and sources, use structured techniques, and prepare for analytic writing peer reviews.

The module drives continuous feedback loops throughout the lifecycle engaging users to follow structured methods of collection, data organization, production, analysis, and management. The Cyber Intelligence Lifecycle solution captures stakeholder needs including intelligence requirements, their prioritization, collection planning and tracking while focusing on evidence-based intelligence analysis. The solution enables organizations to track how they got from A to B in the lifecycle, what worked and what did not while incorporating iterative methods of analysis.CyberIntelLifecycleExample1

“No longer will cyber threat intelligence teams have to kludge together methods of managing the cyber threat intelligence lifecycle,” said Jeff Bardin, Chief Intelligence Officer for Treadstone 71. “The ability to have continuous access to priority intelligence requirements, open source intelligence actions in various stages of collection, the development of new hypotheses based on usable data, directly input to structured analytic techniques as some of the final steps before analytic writing and review are huge.”

  • The module integrates and manages cyber threat intelligence lifecycle functions in a contextually focused environment that helps author intelligence advisors, situation reports, and forecasts.
  • The ability to manage and track historical trends of adversaries and their campaigns with full data transparency, from your own perspective and not that of generic data feeds, minimizes cycle time while reducing overhead and operational risk.
  • The cyber intelligence lifecycle module enables collectors and analysts to work together on company-specific intelligence requirements, giving collection management the ability for continuous oversight supporting relevancy and rapidly redirect collection targets as needed.
  • We see this as speeding the decision making on threats helping to estimate possible next steps.

“We plan to start offering the solution in August with a full rollout by mid-October,” continued Bardin. “Our training solutions enable this module providing organizations with the intelligence community skills necessary to more than adequately manage collection operations, analysis, and analytic writing. The need for this in the market is great.”

  • Data verification is a hidden calculation in data and threat intelligence feeds. Bayesian algorithms aid in the process, but human interaction is still a core capability that most organizations do not have.
  • Skills in this area are lacking.
  • The combination of Treadstone 71 training and education with the cyber intelligence lifecycle solution enables historical pattern and trend analysis while creating clear pictures of adversary tendencies.

"For a long time, CyberIntelLifecycleExample2we described threat intelligence as the core solution for cyber threat intelligence teams. What is missing are the core functions of intelligence that goes well beyond indicators of compromise and technical details, collected after a breach occurs,” added Bardin. “We know that intelligence is for warning and prevention. We know that intelligence forecasting and estimates are the keys to prevention. Something that is missing in organizations today. We are shifting the paradigm to mature intelligence programs assisting in your digital transformation the reduces risk.”

The solution is not meant to replace threat intelligence platforms but to provide an integrated series of modules that manages your intelligence program. We intend to enable the integration of strategic intelligence plans, policies, procedures, process flows, questionnaires, diagrams, presentations, reports, and briefs to managing the cyber threat intelligence lifecycle.

 

About Treadstone 71

Treadstone 71's Certified Threat Intelligence and CounterIntelligence Analyst training are the gold standard in the industry today derived from both academia, the intelligence community, and from Treadstone 71’s experience in building cyber and threat intelligence programs at Fortune 500 organizations worldwide. Treadstone 71 is delivering the only complete cyber threat intelligence lifecycle management solution enabling information sharing, internal intelligence communities of interest while empowering lifecycle management with an iterative feedback loop.

More information: https://www.treadstone71.com/

cyber intelligence,, lifecycle

  • Hits: 2746

BRIEF POPUP TEST

High Level Benefits of the Cyber and Threat Intelligence Program Build Service

Our training examines Sherman Kent's Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services.

Download Brief

High Level Benefits of the Cyber and Threat Intelligence Program Build Service

Our training examines Sherman Kent's Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services.

Download Brief

Read more: BRIEF POPUP TEST

  • Hits: 438

TreadStone 71 Sitemap

Last updated: 2019, May 4
Total pages: 82
www.treadstone71.com Homepage

  • Hits: 725

Contact Treadstone 71 Today for all your Cyber Intelligence needs.

CONTACT US TODAY