Cyber Threat Intelligence – Intelligence Requirements

(Available April 29, 2020)

  1. Introduction
  2. Priority Intelligence Requirements (PIR) – What are they?
  3. During Webinar Exercise
  4. Intelligence Requirements
  5. Common Adversaries
  6. Information Requirements Process Flow
  7. Intelligence Requirements
  8. Essential Elements of Information
  9. Specific Information Requirements
  10. Indicators
  11. The Overall IR Process Flow
  12. Targeting – Intelligence Collection
  13. Information Required Prior to Intelligence Requirements
  14. Prioritization
  15. What is an Intelligence Requirement
  16. What is a Priority Intelligence Requirement
  17. Prioritization continued
  18. Collector/Analyst Need to Understand
  19. Stakeholder knowledge of their systems and data
  20. Intelligence Team Priority Intelligence Requirements Examples
  21. Get them to requirements
  22. Exercise Review
  23. Wrap-up and Q&A

Jeff Bardin is the Chief Intelligence Officer for Treadstone 71 with clients on 4 continents. In 2007, Jeff received the RSA Conference award for Excellence in the Field of Security Practices. His team also won the 2007 SC Magazine Award – Best Security Team. Jeff sits or has sat on the Board of Boston Infragard, Content Raven, Journal of Law and Cyber Warfare, and Wisegate and was a founding member of the Cloud Security Alliance. Jeff served in the USAF as a cryptologic linguist and in the US Army / US Army National Guard as an armor officer, armored scout platoon leader.

Mr. Bardin has extensive experience in cyber intelligence lifecycle services, program builds, targeted research and support, cyber counterintelligence services and analysis, deception planning, and cyber operations. He teaches Cyber Intelligence and Counterintelligence (Anonymity, Cyber Personas, Collection management, Clandestine Cyber HUMINT, Socio-Cultural Aspects of Intelligence, Critical Thinking, Cognitive Bias, Methods and Types of Analysis, Mitre ATT&CK, Structured Analytic Techniques, Analytic Writing, Briefings, and Dissemination), open source intelligence, strategic intelligence, operational/tactical/technical intelligence, and methods in media manipulation identification.

Intelligence Requriements Webinar pricing


Intelligence Requirements

Pre-Recorded Webinar