-
Notifications
You must be signed in to change notification settings - Fork 4
1: Cyber Threat Intelligence and Requirements
Cyber threat intelligence is a rapidly growing field. However, intelligence was a profession long before the word "cyber" entered the lexicon. Understanding the key points regarding intelligence terminology, tradecraft, and impact is vital to understanding and using cyber threat intelligence. This section introduces students to the most important concepts of intelligence, analysis tradecraft, and levels of threat intelligence, and the value they can add to organizations. It also focuses on getting your intelligence program off to the right start with planning, direction, and the generation of intelligence requirements. As with all sections, the day includes immersive hands-on labs to ensure that students have the ability to turn theory into practice.
- E01-Using Structured Analytical Techniques
- E02-Consuming Along the Sliding Scale
- E03-Enriching and Understanding Limitations
- E04-Strategic Threat Modeling
Case-Study: Carbanak, "The Great Bank Robbery" Understanding Intelligence Intelligence Lexicon and Definitions Traditional Intelligence Cycle Sherman Kent and Intelligence Tradecraft Structured Analytical Techniques Understanding Cyber Threat Intelligence Defining Threats Understanding Risk Cyber Threat Intelligence and Its Role Expectation of Organizations and Analysts Four Methods of Threat Detection Threat Intelligence Consumption Sliding Scale of Cybersecurity Consuming Intelligence for Different Goals Enabling Other Teams with Intelligence Positioning the Team to Generate Intelligence Building an Intelligence Team Positioning the Team in the Organization Prerequisites for Intelligence Generation Planning and Direction (Developing Requirements) Intelligence Requirements Priority Intelligence Requirements Beginning the Intelligence Lifecycle Threat Modeling