Threat Intelligence Professional Services

Proactive strategies for early-warning intelligence.
Predicting and mitigating threats before they strike.

About


Your organization faces constant risks. Adversaries are sophisticated, clever and focused. Attacks are well planned, coordinated and use a variety tactics including cyber, physical, human and technical to accomplish their goals.

Center for Threat Intelligence benefits organizations by using our years of experience to create integrated risk intelligence programs.  We use the best strategies, tactics and processes to help you proactively identify who your adversaries are and where they are focused.  Adding intelligence to your risk management process adds knowledge to create an early warning system to manage and mitigate risks before a strike.

Applied throughout an organization, our intelligence framework can benefit every business discipline including risk management, information security, legal, human resources, management and executive and board level positions.  
We offer comprehensive courses and consulting services to address the needs of our clients. From security practitioners developing basic knowledge to advance skills in threat intelligence, to executives looking for a high-level understanding on the benefits of early warning intelligence.

Contact us today!


About

Training


  • $795.00
  • 12/10/2019 09:00 AM
  • For information about registration, contact jlawless@centerforti.com

Threat intelligence continues to gain a more prominent role in enhancing organizational security and risk management. A critical part of threat intelligence is understanding how mindset and biases play a role in strategies, tactics and vital decisions that may ultimately prevent an attack from being successful. Perception and deception are effective adversarial tactics, knowing your own and your team’s mindsets and biases can assist in getting ahead of the game. Center for Threat Intelligence is an approved provider for Department of Homeland Security’s (DHS) National Initiative for Cybersecurity Careers and Studies (NICCS) and the National Initiative for Cybersecurity Education (NICE).

Read More
  • $895.00
  • 10/15/2019 08:30 AM - 10/15/2019 05:36 PM
  • 450 110th Avenue Northeast, Bellevue, WA, USA

Organizations are under attack from increasingly complex threats to their environments. Adversaries employ sophisticated attack strategies including cyber, physical, human and technology, often using a combination of these tactics. Using threat intelligence skills and techniques allows you to proactively defend your environment by understanding adversarial strategy, identifying potential targets and ultimately eliminate surprise. These valuable skills will help excel your career and begin your journey to becoming a Center for Threat Intelligence Certified Threat Intelligence Professional. The first step in building a career in threat intelligence is Threat Intelligence Fundamentals.

Read More
  • $695.00
  • 06/13/2019 09:00 AM - 06/13/2019 05:00 PM
  • BELLEVUE POLICE DEPARTMENT 450 110th Ave NE Bellevue, 98004, WA

Information is everywhere. With the proper training, the right information can be found and transformed into actionable intelligence and valuable insight to help companies and law enforcement detect and mitigate risks. In this course, and hands-on workshop, students will learn the tools and techniques used in the field of Open Source Intelligence (OSINT). With special emphasis on social media monitoring, the training is designed to enable security professionals and law enforcement to better discover and evaluate threats, and to conduct efficient and effective online investigations.

Read More
  • $995.00
  • 05/22/2019 09:00 AM - 05/22/2019 05:00 PM
  • Bellevue, WA

Today’s global threats by sophisticated actors, nation-states, organized crime and hacker groups, are highly complex. Many of these threats can be related to a variety of events that seem to have no correlation, yet are drivers and indicators of an imminent attack on your organization. Understanding the next attack, where it will hit and when, are intelligence questions that simply have no black and white answers. These complex problems, also called “wicked problems”, need advance thought processes, techniques and tools, they need “Sensemaking”.

Read More
  • $495.00
  • 05/16/2019 09:00 AM - 05/16/2019 05:00 PM
  • WASHINGTON STATE CRIMINAL JUSTICE TRAINING COMMISSION 19010 1st Ave South Burien, WA 98148

With new expectations and responsibilities being placed on law enforcement and organizations, understanding the fundamentals of threat intelligence is critical to every situation. Using processes within the threat intelligence framework allows you to proactively defend your environment and understand adversarial strategy and potential targets. This knowledge will also assist in making decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence.

Read More
  • $1095.00
  • 01/31/2019 08:30 AM - 01/31/2019 05:00 PM
  • Washington Technology University (WTU) - 200 112th Ave NE, Suite 200 Bellevue, WA 98004

This course provides an in-depth look at Structured AnalyticTechniques (SATs) for intelligence analysis. Analysts face many obstacles in developing intelligence, some of which are introduced through human mindsets and biases. Mindsets and biases further complicate the analysis process and often impact an analyst's judgement. SATs are a series of analytic techniques that help reduce mindset related problems with analysis and provide for a structured and organized process for evaluating and analyzing intelligence. The results are more accurate analysis, a way for an analyst to validate evidence, assumptions and analytic leaps and show how an analyst came to a certain judgement.

Read More
  • $995.00
  • 09/19/2018 08:30 AM - 09/19/2018 05:00 PM
  • Washington Technology University (WTU) - 200 112th Ave NE, Suite 200 Bellevue, WA 98004

Thinking processes play a key role in threat intelligence. Understanding how these processes impact the analysis can improve the effectiveness and outcome of the process. This course analyzes different thinking methods and teaches students how to apply these methods in intelligence analysis. Each thought process has pros and cons related to differing problem types and how problems, whether tame or wicked, are approached. Analysts will benefit by understanding which thought process is most effective for their style of thinking and how to best exploit each of the three methods as part of a problem-solving process.

Read More
  • $995.00
  • 08/17/2018 08:30 AM
  • Computer Classrooms In Seattle - 10604 NE 38th Place, Suite 118 Kirkland, Washington 98033

Threat intelligence can be affected by a number of factors. It is essential to understand how thinking processes play a key role in the effectiveness of intelligence analysis. This course analyzes different thinking methods and teaches students how to apply those methods in intelligence analysis. Each thought process has pros and cons related to differing problem types an example being problems that are tame or wicked. Analysts must also understand which thought process is most effective for their style of thinking and how to best exploit each of the three methods as part of a problem-solving process.

Read More
  • $895.00
  • 07/11/2018 08:30 AM
  • Bellevue City Hall: 450 110th Avenue Northeast, Bellevue, WA, USA

Threat intelligence allows you to take proactive measures in defending your environment and understand adversarial focus and what it means to an organization. This course will give you an understanding of mindsets and biases that can lead to incorrect judgements in intelligence analysis.

Read More
  • $895.00
  • 05/15/2018 08:30 AM
  • 450 110th Avenue Northeast, Bellevue, WA, USA

Threat intelligence continues to gain a more prominent role in enhancing organizational security and risk management. Using processes within the threat intelligence framework allows you to proactively defend your environment and understand adversarial strategy and targets. This knowledge will also assist in making decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence.

Read More

Advisors


CEO and Founder

Janet Lawless is the CEO and Founder of Center for Threat Intelligence. Collaborating with threat intelligence experts, Janet realized the need for threat intelligence training and consulting for corporations and government organizations. Janet’s former roles in leadership positions at CI Security, Cisco and Microsoft brings a wealth of knowledge in security services and the need for threat intelligence.

Read More

Advisor

David Aucsmith is the Chief Scientist at Root9 and President of Aucsmith Consulting LLC, a management-consulting firm specializing in computer and communications security, including risk management, cybercrime, cyber espionage and cyber warfare. His former roles include Senior Director of Microsoft’s Institute for Advanced Technology in Governments and as the Chief Security Architect for Intel Corporation.

Read More

Advisor

David Gomez is a retired FBI executive, security consultant, and cybersecurity professional with practitioner experience in complex, high-risk, critical incident management and response. He is a former Senior Fellow at the George Washington University Center for Cyber and Homeland Security, and frequent media contributor on law enforcement, cybersecurity, and counterterrorism topics.

Read More

Advisor

Jim is currently a board member at Overlake Hospital Medical Center and is a past board chair of Seattle Children’s Hospital, the Washington Society of CPAs, and the Duke Alumni Association, among roles at many other boards. Previously Jim had a successful career at Deloitte, an international accounting and consulting firm, where he served as managing partner of the Seattle office, the Tokyo office, and worldwide human resources, along with important client assignments.

Read More

Advisor

Oriah currently leads the cybersecurity and threat intelligence programs for SkOUT Secure Intelligence throughout the western United States. He also serves on several non-profit and private company boards in both a director and advisory capacity. Previously, he served in the U.S. Air Force for over 21 years on Active Duty and continues to serve part-time in the Air National Guard. He began his military career as an enlisted Communication Analyst overseas with the National Security Agency.

Read More

Advisor

Greg Reith began his career with U.S. Army Special Forces with a specialty in Operations and Intelligence. Greg’s experience includes counter intelligence, analysis, collection at both tactical and strategic levels. At the end of his career in the military, he transitioned into Information Technology and was the Information Systems Security Officer. Greg also trained intelligence courses in the military. Most recently, Greg led the T-Mobile threat intelligence team as a Senior Security Engineer (Threat Intelligence) and developed the T-Mobile threat intelligence strategy.

Read More

Advisor

Guy Shinnar is the Director of Sales US West, for Check Point Software Technologies, Ltd. Guy has unique experience in the security industry with US, and international executive roles. These include his roles as Co-Founder and VP of Sales at Eemago and Director of Sales at Panaya (acquired by Infosys) an internationally recognized start-up. Guy also co-founder and CEO at Gaash Security Training and Consulting LTD focusing on physical security solutions for government and civilian facilities. In the military, Guy served as Captain, Special Forces, Israel IDF.

Read More

Advisor

Joel is currently a Principal Product Manager for Security and Risk Management at Veritas Technologies. He recently retired from active duty after 20 years as an Intelligence Officer in the United States Air Force. Over the course of his military career, Joel served in multiple intelligence and risk management leadership roles. Most recently as full-time faculty member in the College of Science and Technical Intelligence at the National Intelligence University in Washington DC. He taught graduate level courses on threat intelligence and cybersecurity.

Read More

Certifications


Certifications
“A disturbing trend has developed in which foreign intelligence services, non-state actors, and criminals are using intelligence collection techniques against American companies to steal valuable trade secrets and assets… According to the FBI, the cost to U.S. industry is tens of billions of dollars each year.”
  - Office of the National Counterintelligence Executive


Threat intelligence is a critical foundation for strategic business decisions, effective enterprise risk management and mitigating business risk. In order to protect corporate assets, experienced threat intelligence professionals are necessary to provide valuable insight to proactively identify and prevent threats. These activities lead to enhancing the overall security and well-being of all organizations. The challenge is that qualified threat intelligence professionals are difficult to find.

The Center for Threat Intelligence’s Certified Threat Intelligence Professional (CTIP) was created to address this challenge. The certification program was developed in collaboration with highly experienced intelligence experts with military, federal and corporate intelligence backgrounds. While cyber-attacks are the most publicized, threats by sophisticated adversaries incorporate many different domains including cyber, physical, human and technical, often in combination. The certification is a multi-level program to develop the tradecraft of intelligence to address the complex attacks of today’s threat landscape.

We are honored to be an education and training provider for the Department of Homeland Security's National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NICE Framework), published by the National Institute of Standards and Technology (NIST) in NIST Special Publication 800-181.

Why become a Certified Threat Intelligence Professional?

Threat intelligence includes a number of security disciplines which includes cyber, physical, human and technical domains. Too often the term ‘threat intelligence’ is siloed into specific threat domains when, in fact, sophisticated attacks incorporate multiple disciplines simultaneously to achieve their goal. The Certified Threat Intelligence Professional program benefits you by:
  • Enhancing your career: This certification provides the necessary knowledge to start a career as a threat intelligence specialist and enhance your current skills. This may assist in current and future employment opportunities.
  • Expand your skills and knowledge: Take on added responsibilities and gain additional respect with from clients, peers and employers.
  • Become a part of a unique and highly respected intelligence community
  •  Meet Intelligence Experts- they are your instructors: Our instructors have years of threat intelligence experience in military, federal agencies and corporate environments. They have faced the challenges and have developed insight, tactics and strategies to address them. They understand the skills need to do the job; this ensures the content prepares you for what is needed in the market.

Who should become certified?

Security Professionals: Enhance skills to understand adversarial focus, apply threat intelligence practices to current and future roles, understand how critical thinking enhances analysis, improve structured analytic techniques and sensemaking skills.
Attorneys: Establish knowledge and understanding of how threat intelligence can enhance legal activities, such as investigation and your clients.
Managers and Executives: Understand threat environments to prioritize and address risk. Helps communication with threat intelligence analysts to ensure communication is open and effective when communicating needs.
Risk, Compliance and Human Resource Professionals: Understand and prioritize insider threats and enhance knowledge of potential risks before they happen.
Federal Agents and Law Enforcement: Master threat intelligence techniques for advanced investigations improving job skills.
Students: Start a career as a Certified Threat Intelligence Professional.

Certificate and Certification programs



Eligibility Criteria
There are two options for a candidate to be eligible for the CTIP examinations. The candidate must either:
1. Attend official Center for Threat Intelligence’s CTIP course(s).
  • All candidates are required to pay the $150.00 application fee. 
  • The application fee is non-refundable.
2. Challenge the exam by submit an application showing a minimum of required years and/or working experience (determined by level of certification) in threat intelligence*.
  • All candidates are required to pay the $150.00 application fee. 
  • The application fee is non-refundable.
*Threat intelligence experience includes, but is not limited to:
  • Intelligence analyst
  • Military experience in intelligence
  • Federal agency or law enforcement in intelligence services

Consulting


Adversarial attacks are focused and well planned. This sophistication is best addressed by a threat intelligence program that covers a variety of methodologies, strategies and tactics.  

An effective intelligence program must address potential attacks from all domains including cyber, physical, human, technical and more. At Center for Threat Intelligence we can assist you in building an effective threat intelligence program for starting with the basics, to reviewing your advanced threat intelligence programs and goals. We use our years of experience to develop programs that encompass the best strategy, tactics and processes for your organization.

Services include:
  • Threat Intelligence Maturity Evaluation
  • Program Evaluation 
  • Threat Analysis and Assessments
  • Strategy Development
  • Program Development 
  • Evaluation and maintenance of intelligence cycles
  • Threat Landscape Development
For more information on our consulting services, contact us.
Consulting

Courses


Introduction to Threat Intelligence

Introduction to Threat Intelligence offers core knowledge and skills for professionals interested in better understanding threat intelligence and how to apply these skills and techniques to everyday responsibilities. Using processes within the threat intelligence framework allows an organization to proactively defend their environments, understand adversarial strategy and targets, and use this knowledge to make business decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence. This training provides attendees with a foundational understanding of threat intelligence. Students learn what intelligence is, the difference between information and intelligence and learn how to create actionable intelligence.

Learn More

Managers and Executives

The manager and executive courses are specifically designed to introduce managers and executives to the important role intelligence plays in risk management and security.

Learn More

Customized Corporate Training

A well trained team can provide the excellent skills and expertise to keep your organization secure. We provide customized training courses for your team's needs.

Learn More

Course Offerings

Our courses focus on critical threat intelligence skills. These skills include how to develop meaningful sign-posts, making sense of global threat trends and patterns, cyber-intelligence strategies, identifying and prioritizing risk and much more. See below for a list of available courses.

Learn More

Contact


  • Seattle, WA, United States

Articles


Threat Intelligence Maturity Evaluation

Threat Intelligence Maturity Evaluation

Threat Intelligence Maturity Evaluation – TIME to change the game Organizations are under attack from increasingly complex threats to their environments. Adversaries employ a variety of attack tactics including cyber, physical, human and technology, often using a combination of these tactics. In order to get ahead of the game, businesses need to better their defenses in new ways and get ahead of potential threats and eliminate surprise. That’s where Center for Threat Intelligence’s TIME come in.

Read More