Proactive strategies for early-warning intelligence.
Predicting and mitigating threats before they strike.
Threat intelligence continues to gain a more prominent role in enhancing organizational security and risk management. A critical part of threat intelligence is understanding how mindset and biases play a role in strategies, tactics and vital decisions that may ultimately prevent an attack from being successful. Perception and deception are effective adversarial tactics, knowing your own and your team’s mindsets and biases can assist in getting ahead of the game. Center for Threat Intelligence is an approved provider for Department of Homeland Security’s (DHS) National Initiative for Cybersecurity Careers and Studies (NICCS) and the National Initiative for Cybersecurity Education (NICE).Read More
Organizations are under attack from increasingly complex threats to their environments. Adversaries employ sophisticated attack strategies including cyber, physical, human and technology, often using a combination of these tactics. Using threat intelligence skills and techniques allows you to proactively defend your environment by understanding adversarial strategy, identifying potential targets and ultimately eliminate surprise. These valuable skills will help excel your career and begin your journey to becoming a Center for Threat Intelligence Certified Threat Intelligence Professional. The first step in building a career in threat intelligence is Threat Intelligence Fundamentals.Read More
Information is everywhere. With the proper training, the right information can be found and transformed into actionable intelligence and valuable insight to help companies and law enforcement detect and mitigate risks. In this course, and hands-on workshop, students will learn the tools and techniques used in the field of Open Source Intelligence (OSINT). With special emphasis on social media monitoring, the training is designed to enable security professionals and law enforcement to better discover and evaluate threats, and to conduct efficient and effective online investigations.Read More
Today’s global threats by sophisticated actors, nation-states, organized crime and hacker groups, are highly complex. Many of these threats can be related to a variety of events that seem to have no correlation, yet are drivers and indicators of an imminent attack on your organization. Understanding the next attack, where it will hit and when, are intelligence questions that simply have no black and white answers. These complex problems, also called “wicked problems”, need advance thought processes, techniques and tools, they need “Sensemaking”.Read More
With new expectations and responsibilities being placed on law enforcement and organizations, understanding the fundamentals of threat intelligence is critical to every situation. Using processes within the threat intelligence framework allows you to proactively defend your environment and understand adversarial strategy and potential targets. This knowledge will also assist in making decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence.Read More
This course provides an in-depth look at Structured AnalyticTechniques (SATs) for intelligence analysis. Analysts face many obstacles in developing intelligence, some of which are introduced through human mindsets and biases. Mindsets and biases further complicate the analysis process and often impact an analyst's judgement. SATs are a series of analytic techniques that help reduce mindset related problems with analysis and provide for a structured and organized process for evaluating and analyzing intelligence. The results are more accurate analysis, a way for an analyst to validate evidence, assumptions and analytic leaps and show how an analyst came to a certain judgement.Read More
Thinking processes play a key role in threat intelligence. Understanding how these processes impact the analysis can improve the effectiveness and outcome of the process. This course analyzes different thinking methods and teaches students how to apply these methods in intelligence analysis. Each thought process has pros and cons related to differing problem types and how problems, whether tame or wicked, are approached. Analysts will benefit by understanding which thought process is most effective for their style of thinking and how to best exploit each of the three methods as part of a problem-solving process.Read More
Threat intelligence can be affected by a number of factors. It is essential to understand how thinking processes play a key role in the effectiveness of intelligence analysis. This course analyzes different thinking methods and teaches students how to apply those methods in intelligence analysis. Each thought process has pros and cons related to differing problem types an example being problems that are tame or wicked. Analysts must also understand which thought process is most effective for their style of thinking and how to best exploit each of the three methods as part of a problem-solving process.Read More
Threat intelligence allows you to take proactive measures in defending your environment and understand adversarial focus and what it means to an organization. This course will give you an understanding of mindsets and biases that can lead to incorrect judgements in intelligence analysis.Read More
Threat intelligence continues to gain a more prominent role in enhancing organizational security and risk management. Using processes within the threat intelligence framework allows you to proactively defend your environment and understand adversarial strategy and targets. This knowledge will also assist in making decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence.Read More
Janet Lawless is the CEO and Founder of Center for Threat Intelligence. Collaborating with threat intelligence experts, Janet realized the need for threat intelligence training and consulting for corporations and government organizations. Janet’s former roles in leadership positions at CI Security, Cisco and Microsoft brings a wealth of knowledge in security services and the need for threat intelligence.
David Aucsmith is the Chief Scientist at Root9 and President of Aucsmith Consulting LLC, a management-consulting firm specializing in computer and communications security, including risk management, cybercrime, cyber espionage and cyber warfare. His former roles include Senior Director of Microsoft’s Institute for Advanced Technology in Governments and as the Chief Security Architect for Intel Corporation.
David Gomez is a retired FBI executive, security consultant, and cybersecurity professional with practitioner experience in complex, high-risk, critical incident management and response. He is a former Senior Fellow at the George Washington University Center for Cyber and Homeland Security, and frequent media contributor on law enforcement, cybersecurity, and counterterrorism topics.
Jim is currently a board member at Overlake Hospital Medical Center and is a past board chair of Seattle Children’s Hospital, the Washington Society of CPAs, and the Duke Alumni Association, among roles at many other boards. Previously Jim had a successful career at Deloitte, an international accounting and consulting firm, where he served as managing partner of the Seattle office, the Tokyo office, and worldwide human resources, along with important client assignments.
Oriah currently leads the cybersecurity and threat intelligence programs for SkOUT Secure Intelligence throughout the western United States. He also serves on several non-profit and private company boards in both a director and advisory capacity. Previously, he served in the U.S. Air Force for over 21 years on Active Duty and continues to serve part-time in the Air National Guard. He began his military career as an enlisted Communication Analyst overseas with the National Security Agency.
Greg Reith began his career with U.S. Army Special Forces with a specialty in Operations and Intelligence. Greg’s experience includes counter intelligence, analysis, collection at both tactical and strategic levels. At the end of his career in the military, he transitioned into Information Technology and was the Information Systems Security Officer. Greg also trained intelligence courses in the military. Most recently, Greg led the T-Mobile threat intelligence team as a Senior Security Engineer (Threat Intelligence) and developed the T-Mobile threat intelligence strategy.
Guy Shinnar is the Director of Sales US West, for Check Point Software Technologies, Ltd. Guy has unique experience in the security industry with US, and international executive roles. These include his roles as Co-Founder and VP of Sales at Eemago and Director of Sales at Panaya (acquired by Infosys) an internationally recognized start-up. Guy also co-founder and CEO at Gaash Security Training and Consulting LTD focusing on physical security solutions for government and civilian facilities. In the military, Guy served as Captain, Special Forces, Israel IDF.
Joel is currently a Principal Product Manager for Security and Risk Management at Veritas Technologies. He recently retired from active duty after 20 years as an Intelligence Officer in the United States Air Force. Over the course of his military career, Joel served in multiple intelligence and risk management leadership roles. Most recently as full-time faculty member in the College of Science and Technical Intelligence at the National Intelligence University in Washington DC. He taught graduate level courses on threat intelligence and cybersecurity.
Introduction to Threat Intelligence offers core knowledge and skills for professionals interested in better understanding threat intelligence and how to apply these skills and techniques to everyday responsibilities. Using processes within the threat intelligence framework allows an organization to proactively defend their environments, understand adversarial strategy and targets, and use this knowledge to make business decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence. This training provides attendees with a foundational understanding of threat intelligence. Students learn what intelligence is, the difference between information and intelligence and learn how to create actionable intelligence.Learn More
The manager and executive courses are specifically designed to introduce managers and executives to the important role intelligence plays in risk management and security.Learn More
A well trained team can provide the excellent skills and expertise to keep your organization secure. We provide customized training courses for your team's needs.Learn More
Our courses focus on critical threat intelligence skills. These skills include how to develop meaningful sign-posts, making sense of global threat trends and patterns, cyber-intelligence strategies, identifying and prioritizing risk and much more. See below for a list of available courses.Learn More