Cyber Intelligence Collection Manager's Course - Certified Threat Intelligence Collection Manager
December 9-11, 2019 Fort Myers, FL


Tentative Date
December 9 - 11, 2019
7:45 AM


Where

Fort Myers, FL 33913


Open Map in new window

Already Registered?

Enter your Last Name and Confirmation ID to review your record.


Last Name or Email
ID




Registration Information - Treadstone 71 Cyber Intelligence Manager's Course
Certified Threat Intelligence Collection Manager

Course syllabus and content proprietary to Treadstone 71

2019 Course Dates - Locations 
Jan 14-18 Cyber Intelligence - Amsterdam, NL - Completed
March 4-8 Cyber Intelligence - Reston, VA - Completed
March 11-15 Cyber CounterIntelligence - Reston, VA - Completed

June 17-21 Cyber Intelligence - Herndon, VA

July 15-19  Cyber Intelligence - Hoboken, NJ
September 9-13 Cyber Intelligence - Zurich, Switzerland
October 7-11 Cyber Intelligence - Ft Myers, FL 
October 14-18 Cyber CounterIntelligence - Ft Myers, FL
November 11-15 Cyber Intelligence - Ft Myers, FL
December 9-11 Cyber Intelligence Collection Manager - Ft. Myers, FL

NEW COURSE - Cyber Intelligence Collection Manager - May 6-8, 2019 - Fort Myers, Florida
Intelligence for the C-Suite (On demand)



For questions on the course, contract Treadstone 71 at osint AT treadstone71 DOT com
All who sign up must agree to the Course EULA. Signing up for the course indicates click-through consent.
Three-day course

Treadstone 71 Cyber Intelligence Collection Manager’s Course
 
All too often we see organizations receive information on threat actors only to point-and-shoot when it comes to collection. There is little to no structure in this critical task that drives all intelligence production, analysis, and analytic writing.
 
This course prepares the organization’s designated intelligence professional as the person in charge of Managing collection planning, staffing, targeting, ensuring integrated, synchronized, and deconflicted  collection actions.  As information is received from internal requests for information, analysis of existing data, information, and intelligence on the subject in question, the collection manager correlates and determine gaps in preparing the collection plan. This course prepares students in the development of collection requirements, designed to maximize the effectiveness of your limited resources covering what may seem as vast areas of online targets. The course assists the collection manager in determining where to look, when to look, and what to look for. We provide students with situation and event templates, how to fill them out, how to manage the ever-changing problem iteratively, and how to establish collection priorities base on the courses of action the threat actor may likely adopt.
 
The collection manager works with the intelligence and priority intelligence requirements to develop the collection plan translating these into specific information requirements used to provide targeting while managing the availability and capabilities of the collection/research team.
 
The class includes:
 
Collection Planning Screening Sources
Interpretation of Stakeholder Needs Data Segmentation and Prioritization
Intelligence Requirements Establishing a program of record
Moving from intelligence requirements to priority intelligence requirements Intelligence Gaps
Essential elements of information Targeting
Indicators Cyber DECIDE, DETECT, DELIVER and ASSESS (D3A) framework
Specific information requirements Cyber FIND, FIX, FINISH, EXPLOIT, ANALYZE and DISSEMINATE (F3EAD) methodology
Analysis of requirements against the existing knowledge base Open Source Collection
What do you have? Tools, Methods, Resources
What do you not have? Using the TIP 
What is the gap? Vendor Report Reviews
Where and how will you acquire that data? Threat Intelligence Platform Use and Data Extraction 
How much time do you have? Tagging strategies
What resources are available to you? The Standard Desktop
What skills do you have to accomplish the task? Rules of Engagement
What skills do you not have? Escalation Guidelines and Rules
Mission and Requirements Management Passive Collection
Convert RFI’s to collection requirements Observables
Converting intelligence-related information requirements into collection requirements Strategic, Tactical, Technical
Establish priorities Iterative Approaches and Feedback Loop
Coordinate with other internal and external sources Data/Information dissemination
Iterative re-tasking Continuous monitoring of collection results
Anticipate collection requirements Meeting SIR requirements
Validate preplanned collection tasks Awareness of production and analysis status
Update adaptive collection plans Redirects and information reporting to
Collection Planning Forms and Tracking Collection plan effectiveness
The Collection Manager’s Matrix Feedback loop
Credibility / Validity / Relevance After action reviews – at any time
Probability Scoring Collection Operational Security
Data Provenance - Dates/Times Collection Planning Process Flow and Metrics
Types of Evidence Collection Manager Oversight
  Collection Manager Communications and Sharing
 
 
  • Learn how to drive integrated information gathering on a strategic, operational, and tactical topics
  • Explore methods of research and get publicly available information in response to intelligence gaps
  • Expand your ability to find relevant sources for data collection
  • Support internal cyber and threat intelligence develop, acquire, evaluate and/or implement collection tools and methodologies
  • Devise methods to develop information discoverability processes

Copyright 2019 Treadstone 71 LLC
 
Registration     Pay by November 20, 2019

Regular Registration     $2,490.00
 
Event Details

Monday-Wednesday December 9-11, 2019.  Laptops without corporate controls required.  Personal laptops allowed.  Administrative access required.  Pre-requisites - Strong understanding of the Internet and web browsers. MAC or PC is fine but PCs preferred. Tablets will not work.

All students need to take the below Myers-Briggs personality test prior to the class.  This may be performed here:  www.humanmetrics.com/cgi-win/jtypes2.asp

Target audience:  CISOs, SOC Managers, Cyber / Information Security VPs, Directors, Analysts, Intelligence analysts, law enforcement, Intelligence Community, and those wishing to learn proper methods of analysis.

No refunds allowed after April 1, 2019. Refunds are minus processing fees. Please read the course end user license agreement:

Course EULA


 
 



event registration software provided by: PlanetReg
2019 Hemko Systems Corp. All rights reserved. Unauthorized use prohibited.
Terms of Service | Privacy Policy | Security