Building and Enhancing Your CTI Program with Strategic Intelligence Analysis - The Formula!

Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time

   Watch Promo

Building Your Cyber Intelligence Program

This online course teaches, instructs, guides, and aids students in building a proper cyber intelligence program. We begin from nothing supplying guidance proven through program build campaigns across different verticals and four continents.

This course goes live in February 2022. Watch this space for pricing options, add-on modules, and more information.

Contact us at https://treadstone71.com/index.php/contact to schedule a call or video conference.

We designed the course to guide organizations in their cyber and threat intelligence program builds through online lectures, demonstrations, and templates covering the full intelligence lifecycle at a minimum. After years of teaching intelligence courses and delivering intelligence programs to clients, Treadstone 71 now offers this step-by-step course. We take students through the strategic planning process, goals and objectives creation, stakeholder analysis, adversary targeting and threat matrices creation, priority intelligence requirements, collection planning, structured analytic technique usage, analysis, maturity assessments, SOP development, threat intelligence platform selection, analytic writing, and dissemination non-inclusively.

The program includes instructional videos tied to content with periodic direct access to Treadstone 71 for client deliverable reviews. We supply templates and examples that you can use, change, or get ideas from. Artifacts specifically designed for past clients. The peer-review process follows a standard cycle including comments, suggestions, recommendations, and examples of previously finished products. Treadstone71 also offers regular ‘professor’ office hours for Q&A as requested in Office Hour Packs.

The program follows proven methods established over the years while creating intelligence programs. Clients move at a regular pace that corresponds with their internal schedules that Treadstone 71 helps to set up with the client.

We offer the program in different definitive sections giving students time to work artifacts, ideas, and the program with their stakeholders. The program also offers the standard Cyber Intelligence Tradecraft Certification training as an add-on.

A brief overview of the program:

  • Strategic Plan development, acceptance, and dissemination
  • Mission
  • Vision
  • Guiding Principles
  • Roles and Responsibilities
  • Goals and Objectives
  • Roadmap
  • Cyber Intelligence Capability Maturity Model Assessment
  • Standard operating procedures
  • RACI(S)
  • Process flow diagrams
  • Associated metrics
  • Peer Reviews
  • Intelligence Functions
  • Communications, Responsibilities, Methods
  • Practices and Activities
  • Organizational interfaces
  • SOC and IR
  • Other intelligence groups
  • CISO/CSO and CIO
  • C-Suite
  • Department leadership
  • External groups
  • Vendors
  • Cyber Intelligence Lifecycle definition
  • Stakeholder Analysis
  • Collection Planning
  • Production
  • Structured analytic techniques
  • Analysis
  • Analytic Writing
  • Reporting and Briefing
  • Dissemination
  • Intelligence Information Sharing
  • Enterprise objectives
  • Communities of Interest
  • Your internal ISAC
  • Threat Intelligence Platforms
  • RFP and Selection process
  • Maturation
  • Vendor data feeds
  • Training and Knowledge Transfer

Clients subscribing to the program create program content undergoing Treadstone 71 review prior to leadership delivery. The intent is to share our vast ability in cyber intelligence strategies to aid organizations in the prompt building of their programs. We see this model as an effective and efficient way to extend our knowledge, share our standards-based program information while setting up an industry model rooted in intelligence community tradecraft. That tradecraft follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training, intelligence community directives (ICDs), content from the Sherman Kent School for Intelligence Analysis and Mercyhurst University as well as 30+ years of boots on the ground experience.

What do you have at the end of the program?

As clients carefully follow the training and timelines, executing the deliverables internally, clients will have built a complete cyber threat intelligence program. The program definition, strategy, policies, procedures, process flow diagrams, roles, responsibilities, templates, models, methods, tactics, techniques, reports, dissemination models, briefings, table-top exercises, as well as certified Cyber Intelligence Tradecraft professionals are all core components of what clients achieve.

We offer the standard model that follows the cyber intelligence lifecycle with standard office hours. We also offer added Office Hour Packs beyond the standard. Should you wish to certify staff during the training, we can upgrade you to the Certification module. Lastly, we also offer the most comprehensive add-on, the Strategic Intelligence Analysis upgrade. How do you know which is best for you? We take you through the first reviews and assessments to decide what best suits your culture, needs, and pricing model.

If you wish to learn more, contact us to schedule a review of this extensive and comprehensive assisted training program.

Course Outline:

Data Provenance - OPSEC Rules - Hunchly - Rules of Engagement - Cyber Personas

Getting Started

Hunchly Lecture - OPSEC Rules

Rules of Engagement and Cyber Personas

Documents you need

----

Strategic Intelligence Analysis Week 1

Strategic Intelligence Analysis - Part I

Strategic Intelligence Analysis - Part II

Readings - Tools

----

Building and Enhancing Your Program - Stakeholder Analysis

Stakeholder Analysis - Tracking

----

Strategic Intelligence Analysis Week 2 to 3

Strategic Intelligence Analysis - Part III

Strategic Intelligence Analysis - Part IV

Readings - Process Document

Assignment 1

Assignment 2

Quiz

----

Building and Enhancing Your Program - Adversary Targeting/Threat Matrices

Adversary Targeting Lecture

Assignment - Templates - Matrices - Handbook

Adversary Groups

Reference Documents

Readings and Support Documents

Intelligence Readings - NATO - CIA - Dutch Defense - Encyclopedia

Main Course Spreadsheet Templates

----

Building and Enhancing Your Program - Intelligence Requirements

Intelligence Requirements Lecture

Assignment - Templates and Tools

Reference Documents

----

Strategic Intelligence Analysis Weeks 3 to 5

Strategic Intelligence Analysis - Part V Plus Critical Thinking

Strategic Intelligence Analysis - Cognitive Bias

Readings - Tools

Assignment

----

Introduction to ACH

ACH Readings and Tools

Quiz

----

Collection and Analysis Assignment

Building and Enhancing Your Program - Collection Management

Source Evaluation and Collection Management

Assignment and Templates

OPSEC & Personas

Open-Source Tools, Browser Add-Ons Targeted Toolsets, Containers

Mitre ATT&CK

----

Strategic Intelligence Analysis Weeks 6 to 7

Strategic Intelligence Analysis - Analytic Writing Part 1

Strategic Intelligence Analysis - Analytic Writing Part 2

Readings - Tools

Assignment

Quiz

----

Strategic Intelligence Analysis - Structured Analytic Techniques - Week 8 to 9

Structured Intelligence Techniques - Lectures

Readings - Tools - Technique How To's

Additional Videos on Structured Analytic Techniques

Quiz

----

Building and Enhancing Your Program - STEMPLES Plus - Indicators of Change - Hofstede Principles

Lecture on STEMPLES Plus

Assignment - Templates - Examples

Strategic Intelligence Analysis Week 10

Strategic Intelligence Analysis - Reporting and Briefs

Report Template Examples

Quiz

----

Analyst Activities - Week 11

Strategic Intelligence Analysis - Analyst Activities-Cognitive Elements

Readings - Tools

Quiz

Threat Hunting - Lecture and Files

----

Strategic Intelligence Analysis - Looking at building your Cyber Intelligence Program Week 12

Vision-Mission-Goals-Objectives

Measuring your goals and objectives

Guiding Principles

Cyber Intelligence Maturity Model

Standard Operating Procedures Draft

Rules of Engagement Draft

Operational Security during OSINT

Core Competencies

The TIP Selection Process

Viable Metrics

Assembling the Fragments

Information or Disinformation - Talk given at IS2 - Prague December 2020

Tabletop Exercise

Argument Mapping

CTI Organizational Structure - Final


Your Instructor


Jeff Bardin
Jeff Bardin

Former adjunct professor of Cyber Intelligence, Counterintelligence, and Cybercrime (Utica College) and Information Security Risk Management (Clark University). Experienced in cyber intelligence lifecycle services and support, cyber counterintelligence services and analysis, active defense and cyber operations. Commercially teach Cyber Intelligence (Anonymity, Sockpuppets, Cyber Collection, Clandestine Cyber HUMINT, Socio-Cultural Aspects of Intelligence, Lifecycle, Critical Thinking, Cognitive Bias, Methods and Types of Analysis and Methods, Structured Analytic Techniques, Analytic Writing, BLUF/AIMS Delivery, and Dissemination), Jihadist Online Recruitment Methods, cyber influence operations, high-value target development, deception planning, deception operations management, Middle Eastern Cyber Warfare Doctrine, adversary dossier development and social-cultural analysis, jihadist training and gaming as a method of training, information and intelligence sharing, threat intelligence platform selection, non-inclusively.

Jeff Bardin is the Chief Intelligence Officer for Treadstone 71 with clients on 4 continents. In 2007, Jeff received the RSA Conference award for Excellence in the Field of Security Practices. His team also won the 2007 SC Magazine Award – Best Security Team. Jeff sits or has sat on the Board of Boston Infragard, Content Raven, Journal of Law and Cyber Warfare, and Wisegate and was a founding member of the Cloud Security Alliance. Jeff served in the USAF as a cryptologic linguist and in the US Army / US Army National Guard as an armor officer, armored scout platoon leader.

Mr. Bardin has extensive experience in cyber intelligence lifecycle services, program builds, targeted research and support, cyber counterintelligence services and analysis, deception planning, and cyber operations. He teaches Cyber Intelligence and Counterintelligence (Anonymity, Cyber Personas, Collection management, Clandestine Cyber HUMINT, Socio-Cultural Aspects of Intelligence, Critical Thinking, Cognitive Bias, Methods and Types of Analysis, Mitre ATT&CK, Structured Analytic Techniques, Analytic Writing, Briefings, and Dissemination), open source intelligence, strategic intelligence, operational/tactical/technical intelligence, and methods in media manipulation identification.

He has BA in Special Studies - Middle East Studies & Language from Trinity College and an MS in Information Assurance from Norwich University. Jeff also attended the Middlebury College Language School for additional language training. Mr. Bardin also spent two+ years studying Russian history, literature, political systems, and language. He lived and worked in the Mediterranean area, Europe, Australia, Singapore, Malaysia, the Persian Gulf Region, and the Kingdom of Saudi Arabia. Jeff was an adjunct instructor of master’s programs in cyber intelligence, counterintelligence, cybercrime and cyberterrorism at Utica College. Mr. Bardin has also appeared on CNN, CBS News Live, FoxNews, BBCRadio, i24News, BBN, and several other news outlets and has contributed bylines to Business Insider non-inclusively.

We started teaching these courses in 2009 and have continued to update and hone them while maintaining true to the intelligence community standards. We have since built cyber threat intelligence programs for Fortune 500 firms and government organizations on four continents while providing targeted research against adversaries and nation-states.

Treadstone 71:

We founded the company in 2002 and started creating cyber personas and infiltrating al-Qaeda sites collecting information and sharing it with various US-based organizations in 2004. In 2009-10, we started teaching Cyber Intelligence, Cyber CounterIntelligence and Cyber Crime courses at the master’s level at Utica College where we established the intelligence program. After three years of teaching at the academic level, we switched to the commercial space honing the courses to CIA/DIA style tradecraft as aligned to the cyber environment using the skills acquired in 2004. Since that time, we have continued to update the courses using real-world case studies as part of the training.

We have kept the company purposely small and now offer the training courses (www.treadstone71.com/cyber-intelligence-trainingan... www.cyberinteltrainingcenter.com) as well as Cyber Threat Intelligence maturity assessments, strategic and program planning, active research, collection, and reporting. We also perform Threat Intel Platform assessments, selection, and rollout activities for clients. We have clients in the US, EU, Australia, and Asia with active proposals in the Middle East. My personal background is as an Arabic Linguist (USAF / NSA), Russian Linguist, and CISO financial services, government contracts, insurance, and cybersecurity vendors. We have also acted as a critical resource for government CISOs in the past authoring their agency strategic plans, program plans and responding to Congressional inquiries on their behalf.

Jeff has spoken at RSA, NATO CyCon (Estonia), the US Naval Academy, the Air Force Institute of Technology, the Johns Hopkins Research Labs, Hacker Halted, Malaysian Cyberjaya, Secureworld Expo, Hacktivity (Budapest), IS2 Prague, London (RSA), ISSA, Security Camp (Cairo), and several other conferences and organizations.

Mr. Bardin has authored books and contributed chapters to several other books most recently Current and Emerging Trends in Cyber Operations from George Washington University. Recently edited and provided content for Understanding Computers: Today and Tomorrow by Deborah Morley, Charles S Parker - 11th edition (March 2006 release). Reviewer for Building an Information Security Risk Management Program from the Ground Up (Evan Wheeler), Author Chapter 33 Computer Information Security Handbook 5th Edition - SAN Security. Author Chapter on Satellite Security - Computer Information Security Handbook 6th Edition. Author - The Illusion of Due Diligence - Notes from the CISO Underground (April 2010 release).

Treadstone 71 is a pure play intelligence company focusing on targeted research of adversaries building in-depth dossiers recording methods, tactics, techniques, procedures, known associates, memberships and psychological profiles. We author Current, Research/Foundational, Advisories, STEMPLES Plus, and Estimative Intelligence reports. We create profiles of high value targets including ‘know your customer’ profiles delivering assessments and gaps in protections with recommendations and opportunities.

We are known for building Strategic Intelligence Programs from vision, mission, guiding principles, goals, objectives, 36-month plans, policies, procedures, process flows, SOPs, KPIs, CSFs, training and awareness programs for intelligence. We also help establish internal intelligence community programs from technical and tactical to operational and strategic including physical, competitive, business, and cyber.

We have taught classes to and/or worked with/for:

AIB, American Express, Capital One, NATO, Belgian Military Intelligence, Commonwealth Bank, Bank of America, ING, NCSC NL, American Electric Power, Nationwide, Battelle, Standard Chartered, Columbus Collaboratory, Anomali, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Cardinal Health, Huntington, L Brands, OhioHealth, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Davis Polk, Thrift Savings Plan, Discover, Equifax, Blackknight Financial Services, Schwab, GM, FRB, Intercontinental Exchange (ICE), Citizens Financial Group, Cleveland Clinic, Scottrade, MetLife, NY Life, Essent, Harvard University, Charles River Associates, Synchrony Financial, In-Q-Tel, TD Ameritrade, First Citizens Bank, M&T Bank, Western & Southern, American National Bank of TX, National Reconnaissance Office, OCBC Bank Singapore, Spentera, FBI, W.R. Berkley, F-Secure, People’s United Bank, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, Symantec, State of Florida, Deloitte, Ernst and Young, Mitsubishi UFG Trust and Banking Corporation, Target, Tri Counties Bank, Mass Mutual, Tower Research, Latham and Watkins LLP, Geller & Company, KeyBank, Northern Trust, Fannie Mae, BB&T, Blue Cross Blue Shield Michigan, Farm Credit Services of America, Aviation ISAC, Regions Financial Corporation, Intercontinental Exchange (The ICE), Vista Equity Partners, JP Morgan Chase, Archer Daniels Midland, Nacha, Barclays, Options Clearing Corporation (OCC), Expo2020, Abu Dhabi Smart Solution's and Services Authority, Merck & Co., Inc Nomura International, ING, Finance CERT Norway, iPipeline, BBVA, PenFED, Santander, Bank of America, Equifax, BNY Mellon, UBS Group, OCC, Verizon, Vantiv, Raymond James, Bridgewater Associates, Bank of America Merrill Lynch, BBVA, Promontory Interfinancial Network, Bank of Canada, Credit Suisse, HSBC, Church of Jesus Christ of Latter Day Saints, Ocean First Bank, International Exchange, Splunk, Vero Skatt, Ernst & Young, Relativity, Ultimate Software, Vista Equity Partners, Aetna, QBE Insurance Group, ACI Universal Payments, Betaalvereniging Nederland, Dutch Police, Motorola Solutions, Intel Corporation, Salesforce, Singapore Ministry of Defence, Australia and New Zealand Banking Group Limited (ANZ), National Australia Bank Limited, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Focus on targeted research of adversaries building in-depth dossiers recording methods, tactics, techniques, procedures, known associates, memberships and psychological profiles. Author Current, Research/Foundational, PESTELI, deception planning and operations, psychological operations, and Estimative Intelligence reports. Create profiles of high value targets including ‘know your customer’ profiles delivering assessments and gaps in protections with recommendations and opportunities.

Strategic Intelligence Program builds from vision, mission, guiding principles, goals, objectives, 36-month plans, policies, procedures, process flows, SOPs, KPIs, CSFs, training and awareness programs for intelligence. Building internal intelligence community programs from technical and tactical to operational and strategic including physical, competitive, business, and cyber.


Course Curriculum


  Data Provenance - OPSEC Rules - Hunchly - Rules of Engagement - Cyber Personas
Available in days
days after you enroll
  Start Building and Enhancing Your Program - Stakeholder Analysis
Available in days
days after you enroll
  Start Building and Enhancing Your Program - Adversary Targeting/Threat Matrices
Available in days
days after you enroll
  Building and Enhancing Your Program - Intelligence Requirements
Available in days
days after you enroll
  Building and Enhancing Your Program - STEMPLES Plus - Indicators of Change - Hofstede Principles
Available in days
days after you enroll
  Strategic Intelligence Analysis Week 10
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!