Threat Intelligence Professional Services

On Demand Threat Intelligence Learning
Threat Intelligence Program Development
Threat Intelligence Strategy, Framework and Maturity Models
Certified Threat Intelligence Professional Certifications

About


Successful threat intelligence programs are the foundation of  security and risk management programs.

Your organization faces constant risks. Adversaries are sophisticated, clever and focused. Attacks are well planned, coordinated and use a variety tactics including cyber, physical, human and technical to accomplish their goals.

Center for Threat Intelligence benefits organizations by proven methodologies to create holistic, integrated and proactive intelligence programs. Our experienced consultants help you build successful threat intelligence programs to proactively identify who your adversaries are and where they are focused. Adding intelligence to your business decisions and risk management process, gives your organization cutting edge knowledge to create an early warning system to manage and mitigate risks before a strike.

Applied throughout an organization, our intelligence framework can benefit every business discipline including risk management, information security, legal, human resources, management and executive and board level positions.

We offer comprehensive consulting services, training and certifications to address the needs of our clients. From security practitioners developing basic knowledge to advance skills in threat intelligence, to executives looking for a high-level understanding on the benefits of early warning intelligence.

Contact us today!


About

ONLINE TRAINING


ON Demand: Threat Intelligence Fundamentals Training

ON Demand: Threat Intelligence Fundamentals Training

These valuable skills will help excel your career and begin your journey to the Certified Threat Intelligence Professional Certification. Center for Threat Intelligence is an approved provider for Department of Homeland Security’s (DHS) National Initiative for Cybersecurity Careers and Studies (NICCS) and the National Initiative for Cybersecurity Education (NICE).

Enhance your career now! Introductory offer $249.00

Threat intelligence skills are critical in identifying adversaries and proactively protecting an organization. The challenge is that there are not  many trained threat intelligence professionals available to hire.  Using threat intelligence skills and techniques allows you to proactively defend your environment by understanding adversarial strategy, identifying potential targets and ultimately eliminate surprise. These valuable skills will help excel your career and begin your journey to becoming a Center for Threat Intelligence Certified Threat Intelligence Professional. The first step in building a career in threat intelligence is Threat Intelligence Fundamentals.


What you will learn

This one-hour online training provides attendees with a foundational understanding of threat intelligence. 

*  Understand basic intelligence fundamentals and concepts

*  Understand the benefits of what an intelligence program can provide

*  Understand intelligence categories

*  Understand differences between data, information and intelligence

 

Who should take this class? 

Security and Threat Intelligence Professionals: Enhance your career and skills and learn to proactively identify insider threat activities.

Managers and Executives:  Understand insider threat indicators, motivation and tradecraft to prioritize and address risk. 

Risk, Compliance and Human Resource Professionals: Understand insider threats and enhance knowledge of potential risks before they happen.

Federal Agents and Law Enforcement: Master techniques to identify insider threats for advanced investigations and to improve job skills.

Attorneys: Enhance legal activities, investigations and interviewing skills by creating an awareness of insider motivation and techniques.

Sales:  All sales are final. No refunds are available.


Contact us at info@centerforti.com

Read More  
ONLINE: Demystifying Cyber Speak

ONLINE: Demystifying Cyber Speak

Three one-hour sessions: December 14, 16 and 18.  11 am PST.  

You know just about everything there is know about intelligence or physical security.  And then the cyber people show up. They talk in a way that's almost incomprehensible and what do those acronyms even mean?  


Their language is so weird that you're not even sure how to ask smart questions. That's not setting you up for success.


In this session, we'll explain cyber in ordinary language so you can navigate future cyber conversations without the road blocks, confusion, and false starts.

Register Now!  Space is limited for this exclusive interactive learning opportunity.  

Click on the "Register Now" button above and fill out the short registration form.  Course price is $295.00. Price includes all interactive sessions. 


Leading edge interactive learning 

This course is broken up into three one-hour courses.  We will provide 30 minutes of content and allow 30 minutes for questions and comments so you can tell us what  challenges you face and we will focus our content on what you need to know in the next session. At the end of these three sessions you will:

*  Understand basic language of cyber

*  Know what basic acronyms mean and their use

*  Apply cyber speak from your perspective

*  Be able to ask questions of the cyber folks so you understand

 

Who should take this class? 

Physical Security and Threat Intelligence Professionals: Enhance your career and skills by stepping into the cyber world and understand the basics for intelligent conversations.

Managers and Executives:  Understand cyber terminology and use to better communicate and read cyber reports, understand potential cyber threats and more. 

Risk, Compliance and Human Resource Professionals:  Step into the world of cyber from a basic understanding to communicate effectively with cyber groups.   

Federal Agents and Law Enforcement: Master techniques to communicate with cyber groups for investigations and to improve job skills.



* Center for Threat Intelligence is an approved provider for Department of Homeland Security’s (DHS) National Initiative for Cybersecurity Careers and Studies (NICCS) and the National Initiative for Cybersecurity Education (NICE).


Your instructor

Kip Boyle is an experienced cyber risk manager. Before serving as the Chief Information Security Officer (CISO) of PEMCO Insurance in Seattle for 7 years, he was a captain on active duty in the US Air Force. During his military service, served as the director of enterprise network security for both the Combat Archer and F-22 Stealth Fighter programs. Over the course of his career, he's worked advised non-technical executives and physical security teams in both the defense and private sector. These days, he serves as virtual CISO for many customers, including a professional sports team and fast-growing FinTech and AdTech companies. And now, he's sharing his insider's perspective with you!


Contact us at info@centerforti.com





Read More  

Certifications


Certifications

APPLY FOR CERTIFICATION HERE


“A disturbing trend has developed in which foreign intelligence services, non-state actors, and criminals are using intelligence collection techniques against American companies to steal valuable trade secrets and assets… According to the FBI, the cost to U.S. industry is tens of billions of dollars each year.”
  - Office of the National Counterintelligence Executive


Organizations are under attack from increasingly complex threats to their environments. Adversaries employ sophisticated attack strategies including cyber, physical, human and technology, often using a combination of these tactics. Experienced threat intelligence professionals employ holistic strategies, skills and techniques to proactively mitigate risk and ultimately eliminate surprise. Recognition of these valuable skills help excel your career as a threat intelligence professional.

Center for Threat Intelligence’s Certified Threat Intelligence Professional (CTIP) Certification identifies highly skilled intelligence professionals that can bring together cyber, physical, human, and technical pillars of threat intelligence into a comprehensive and integrated strategy. The certification program was developed in collaboration with highly experienced intelligence experts with military, federal and corporate intelligence backgrounds in order to provide a vehicle to demonstrate valued experience and skills.

We are honored to be an education and training provider for the Department of Homeland Security's National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NICE Framework), published by the National Institute of Standards and Technology (NIST) in NIST Special Publication 800-181.

Why become a Certified Threat Intelligence Professional (CTIP)?
Certified Threat Intelligence Professional program benefits you by:
  • Recognizing your current knowledge: The certification identifies your years of unique experience and training to showcase your expertise. 
  • Enhancing your career: This certification demonstrates the necessary knowledge to enhance or start a career as a threat intelligence specialist and enhance your current skills into a holistic approach.  This may assist in current and future employment opportunities. 
  • Expanding your skills and knowledge: Take on added responsibilities and gain additional respect and opportunities from clients, peers and employers.
  • Becoming a part of a unique and highly respected intelligence community
  • Providing Opportunities to Meet Intelligence Experts- they are your instructors:  Our instructors have years of threat intelligence experience in military, federal agencies and corporate environments.  They have faced the challenges and have developed insight, tactics and strategies to address them.  They understand the skills need to do the job; this ensures the content prepares you for what is needed in the market.

Who should get certified?
  • Security and Intelligence Professionals: Enhance skills to understand adversarial focus, apply threat intelligence practices to current and future roles, understand how critical thinking enhances analysis, improve structured analytic techniques and sensemaking skills
  • Attorneys: Establish knowledge and understanding of how threat intelligence can enhance legal activities, such as investigation and your clients
  • Managers and Executives: Understand threat environments to prioritize and address risk. Helps communication with threat intelligence analysts to ensure communication is open and effective when communicating needs.
  • Risk, Compliance and Human Resource Professionals: Understand and prioritize insider threats and enhance knowledge of potential risks before they happen
  • Federal Agents and Law Enforcement: Master threat intelligence techniques for advanced investigations improving job skills
  • Students: Start a career as a Certified Threat Intelligence Professional

Certification Levels
Certified Threat Intelligence Professional (CTIP)
Requirements:
Minimum five years of threat intelligence experience
Pass CTIP Certification Examination
Agree to Certification Code of Professional Conduct

Associate Certified Threat Intelligence Professional (ACTIP)
Requirements:
Less than five years of threat intelligence experience
Pass CTIP Certification Examination
Agree to Certification Code of Professional Conduct

Eligibility Criteria
Due to the COVID-19 pandemic, all testing and training will be online until further notice.  
Thank you for your patience and support. 


In order to be eligible for the CTIP examination, an individual must: 
  1. Pay the Application Fee for the Examination or Retake Fee. All fees are non-refundable.
  2. Provide Required Documentation for Certification (see below)
  3. Agree to Center for Threat Intelligence's Certification Code of Professional Conduct
Process
Once application is paid, you will send your intelligence experience to “info@centerforti.com”. Our team will review your application and experience and get back to you within 2 weeks. The test is not sent to you within the application process. Upon acceptance of your application, we will notify you of the proctoring process to take the test. You will receive a pass or fail score. The test will not be returned to participants for review. Upon passing, Center for Threat Intelligence will send you your CTIP Certification Certificate.

Required Documentation for Certification
Candidates must provide a curriculum vitae (CV) or detailed resume that documents intelligence experience, and additional supporting documentation to identify work and skills in the intelligence area.

Examples of supporting documentation may include letters of verification of professional duties from employers or professional peers, or other materials which validate the candidate’s experience.

Threat Intelligence Experience 
Center for Threat Intelligence experience criteria is focused on individuals who understand the importance of a holistic approach to threat intelligence and have used their knowledge, training and experience to address these challenges. Our goal with this certification is to ensure a mastery and understanding of threat intelligence strategies, tactics, techniques and processes, combined with experience in the field of threat intelligence.

Experience includes, but is not limited to these categories:
  • Threat intelligence analyst in an organization or company
  • Military experience as an intelligence analyst
  • Federal agency or law enforcement as an intelligence analyst
Fees
All candidates are required to pay the $495.00 application fee to take the test. This fee includes one examination.
Retake fees: $100.00

Please review all the eligibility requirements before applying and paying the application fee.
All Fees are non-refundable.

Please note, the Application fee is only for the CTIP examination, training courses may be purchased separately. 

APPLY NOW! 

Certification Code of Professional Conduct
Center for Threat Intelligence (CTI) expects our certified members to adhere to and maintain the highest ethical and professional standards. To that end, CTI has professional standards that eligible candidates and current certified members must agree to as part of the certification criteria.

Certified and Associate Threat Intelligence Professionals applicants for certification must adhere to the Code of Professional Conduct, agreeing to:
  • Respect the Law and comply with all laws and regulations. Perform professional duties in accordance with the law and the highest moral and ethical principles.
  • Adhere to conduct of truthfulness, honesty, and integrity
  • Perform professional duties maintaining the highest standards of competence and knowledge
  • Respect and safeguard confidential and privileged information and exercise due care to prevent its improper and/or accidental disclosure
  • Respect the professional reputation or practice of colleagues, clients, or employees
  • Agree to abide by the Certification Code of Professional Conduct
Examination Details
The test is 100 questions. Applicants will have 2-hours to complete the examination in a proctored setting. Test questions are based on Center for Threat Intelligence training and suggested reading. A score of 70% of correct answers is considered a passing score. You will receive a pass or fail score. The test will not be returned to participants for review.

Recommended Training from Center for Threat Intelligence
  • Threat Intelligence Fundamentals
  • Mindset and Bias
  • Critical, Analytic and Creative Thinking
  • Fundamentals of Analysis
  • Developing Warning Intelligence
  • Structured Analytic Techniques
  • Sensemaking
Recommended Reading
  • Structured Analytic Techniques for Intelligence Analysis, Second Edition, by Richards J. Heuer Jr. and Randolph H. Person
  • Sensemaking A Structure for an Intelligence Revolution, David T. Moore, National Defense Intelligence College, Washington, DC, March 2011
  • Intelligence: From Secrets to Policy: Mark M Lowenthal



Main Categories


New Arrival


Advisors


CEO and Founder

Janet Lawless is the CEO and Founder of Center for Threat Intelligence. Collaborating with threat intelligence experts, Janet realized the need to help organizations design holistic threat intelligence programs which includes building resources through threat intelligence consulting, training and certifications for corporations and government organizations. Janet’s former roles in leadership positions at CI Security, Cisco and Microsoft brings a wealth of knowledge in security services and the need for threat intelligence.

Read More  

Advisor

David Aucsmith is a senior computer scientist and technology leader currently working as the Chief Scientist and Federal Practice Manager for DarkLight and as a Senior Principal Research Scientist at the Applied Physics Laboratory of the University of Washington. He is also an Affiliate Professor of Computer Science & Engineering at the University of Washington. He has worked in a variety of security technology areas including secure computer systems, secure communications systems, security architecture, random number generation, cryptography and cryptographic systems, steganography and network intrusion detection.

Read More  

Advisor

David Gomez is a retired FBI executive, security consultant, and cybersecurity professional with practitioner experience in complex, high-risk, critical incident management and response. He is a former Senior Fellow at the George Washington University Center for Cyber and Homeland Security, and frequent media contributor on law enforcement, cybersecurity, and counterterrorism topics.

Read More  

Advisor

Bryan is a seasoned cybercrime, computer security and homeland security professional with over 20 years of experience. He is an accomplished organizational spokesperson, public speaker and advisor to CxO level and national level executives. Bryan’s unique ability to apply very positive and transparent leadership to direct teams of investigators, developers, data scientists, data visualization experts, and other professionals make him an excellent addition to the Center for Threat Intelligence Advisory Team.

Read More  

Advisor

Jim is currently a board member at Overlake Hospital Medical Center and is a past board chair of Seattle Children’s Hospital, the Washington Society of CPAs, and the Duke Alumni Association, among roles at many other boards. Previously Jim had a successful career at Deloitte, an international accounting and consulting firm, where he served as managing partner of the Seattle office, the Tokyo office, and worldwide human resources, along with important client assignments.

Read More  

Advisor

Oriah currently leads the cybersecurity and threat intelligence programs for SkOUT Secure Intelligence throughout the western United States. He also serves on several non-profit and private company boards in both a director and advisory capacity. Previously, he served in the U.S. Air Force for over 21 years on Active Duty and continues to serve part-time in the Air National Guard. He began his military career as an enlisted Communication Analyst overseas with the National Security Agency.

Read More  

Advisor

Guy Shinnar is the Director of Sales US West, for Check Point Software Technologies, Ltd. Guy has unique experience in the security industry with US, and international executive roles. These include his roles as Co-Founder and VP of Sales at Eemago and Director of Sales at Panaya (acquired by Infosys) an internationally recognized start-up. Guy also co-founder and CEO at Gaash Security Training and Consulting LTD focusing on physical security solutions for government and civilian facilities. In the military, Guy served as Captain, Special Forces, Israel IDF.

Read More  

Advisor

Joel is currently a Principal Product Manager for Security and Risk Management at Veritas Technologies. He recently retired from active duty after 20 years as an Intelligence Officer in the United States Air Force. Over the course of his military career, Joel served in multiple intelligence and risk management leadership roles. Most recently as full-time faculty member in the College of Science and Technical Intelligence at the National Intelligence University in Washington DC. He taught graduate level courses on threat intelligence and cybersecurity.

Read More  

Consulting


Adversarial attacks are focused and well planned. This sophistication is best addressed by a threat intelligence program that covers a variety of methodologies, strategies and tactics.  

An effective intelligence program must address potential attacks from all domains including cyber, physical, human, technical and more. At Center for Threat Intelligence we can assist you in building an effective threat intelligence program for starting with the basics, to reviewing your advanced threat intelligence programs and goals. We use our years of experience to develop programs that encompass the best strategy, tactics and processes for your organization.

Services include:
  • Threat Intelligence Maturity Evaluation
  • Program Evaluation 
  • Threat Analysis and Assessments
  • Strategy Development
  • Program Development 
  • Evaluation and maintenance of intelligence cycles
  • Threat Landscape Development
For more information on our consulting services, contact us.

Threat Intelligence Optimization Framework

A Holistic Approach to Corporate Wide Threat Intelligence 
Adversarial attacks are increasingly sophisticated, often using combinations of cyber, physical, technical and human tactics. To help companies address these evolving attack strategies, Center for Threat Intelligence created the Threat Intelligence Optimization Framework. Your adversaries have comprehensive strategies for your organization, you should too! We can help!

Benefits: 
  • Synchronizes organization’s risk management, cybersecurity, physical security and other threat intelligence processes to enhance identification, early detection and mitigate risk from well-coordinated attacks.
  • Provides coordinated communication to proactively inform management with critical, timely, contextual knowledge to assist in daily business decisions.
  • Establishes the foundation for establishing a corporate-wide intelligence program.
  • Increases ROI by decreasing duplication in security efforts, enhances communication for faster identification to stop credible threats and decreases costs associated with successful attacks.





Consulting Consulting

Training


  • $295.00
  •  12/14/2020 11:00 AM - 12/10/2020 11:00 AM
  • Online Event

You know just about everything there is know about intelligence or physical security. And then the cyber people show up. They talk in a way that's almost incomprehensible and what do those acronyms even mean? Their language is so weird that you're not even sure how to ask smart questions. That's not setting you up for success. In this session, we'll explain cyber in ordinary language so you can navigate future cyber conversations without the road blocks, confusion, and false starts. Training session are three one-hour courses starting December 14th, 16th and 18th at 11:00 am PST. Price includes all three sessions. Exclusive one-time introductory course pricing.

Read More
  • $249.00
  •  11/09/2020 12:30 AM
  • Online Event

Online training is on-demand and available now. Introductory offer ends November 30, 2020. The "Date" is the end date for the Introductory pricing. Organizations are under attack from increasingly complex threats to their environments. Adversaries employ sophisticated attack strategies including cyber, physical, human and technology, often using a combination of these tactics. Using threat intelligence skills and techniques allows you to proactively defend your environment by understanding adversarial strategy, identifying potential targets and ultimately eliminate surprise. These valuable skills will help excel your career and begin your journey to becoming a Center for Threat Intelligence Certified Threat Intelligence Professional. The first step in building a career in threat intelligence is Threat Intelligence Fundamentals.

Read More
  • $695.00
  •  02/06/2020 09:00 AM
  • Online Event
  • $695.00
  •  02/06/2020 09:00 AM - 02/06/2020 05:00 PM
  •   450 110TH AVE NE, Bellevue, WA 98004

Insider threats can devastate an organization. These threats are often hard to detect and are caused by negligent insiders, malicious insiders and/or external actors who infiltrate an organization. Insiders may be current or former employees, contractors, vendors, or trusted third parties. Insider attack strategies including cyber, physical, human and technology, often using a combination of these tactics. Motivations can be anything from financial gain to wanting to disrupt operations to get back at the company because of a bad review or missed promotion. Using threat intelligence skills and techniques to understand insider threats allows you to proactively defend your environment. Center for Threat Intelligence is an approved provider for Department of Homeland Security’s (DHS) National Initiative for Cybersecurity Careers and Studies (NICCS) and the National Initiative for Cybersecurity Education (NICE).

Read More
  • $795.00
  •  12/10/2019 09:00 AM
  •   For information about registration, contact jlawless@centerforti.com

Threat intelligence continues to gain a more prominent role in enhancing organizational security and risk management. A critical part of threat intelligence is understanding how mindset and biases play a role in strategies, tactics and vital decisions that may ultimately prevent an attack from being successful. Perception and deception are effective adversarial tactics, knowing your own and your team’s mindsets and biases can assist in getting ahead of the game. Center for Threat Intelligence is an approved provider for Department of Homeland Security’s (DHS) National Initiative for Cybersecurity Careers and Studies (NICCS) and the National Initiative for Cybersecurity Education (NICE).

Read More
  • $895.00
  •  10/15/2019 08:30 AM - 10/15/2019 05:36 PM
  •   450 110th Avenue Northeast, Bellevue, WA, USA

Organizations are under attack from increasingly complex threats to their environments. Adversaries employ sophisticated attack strategies including cyber, physical, human and technology, often using a combination of these tactics. Using threat intelligence skills and techniques allows you to proactively defend your environment by understanding adversarial strategy, identifying potential targets and ultimately eliminate surprise. These valuable skills will help excel your career and begin your journey to becoming a Center for Threat Intelligence Certified Threat Intelligence Professional. The first step in building a career in threat intelligence is Threat Intelligence Fundamentals.

Read More
  • $695.00
  •  06/13/2019 09:00 AM - 06/13/2019 05:00 PM
  •   BELLEVUE POLICE DEPARTMENT 450 110th Ave NE Bellevue, 98004, WA

Information is everywhere. With the proper training, the right information can be found and transformed into actionable intelligence and valuable insight to help companies and law enforcement detect and mitigate risks. In this course, and hands-on workshop, students will learn the tools and techniques used in the field of Open Source Intelligence (OSINT). With special emphasis on social media monitoring, the training is designed to enable security professionals and law enforcement to better discover and evaluate threats, and to conduct efficient and effective online investigations.

Read More
  • $995.00
  •  05/22/2019 09:00 AM - 05/22/2019 05:00 PM
  •   Bellevue, WA

Today’s global threats by sophisticated actors, nation-states, organized crime and hacker groups, are highly complex. Many of these threats can be related to a variety of events that seem to have no correlation, yet are drivers and indicators of an imminent attack on your organization. Understanding the next attack, where it will hit and when, are intelligence questions that simply have no black and white answers. These complex problems, also called “wicked problems”, need advance thought processes, techniques and tools, they need “Sensemaking”.

Read More
  • $495.00
  •  05/16/2019 09:00 AM
  •   WASHINGTON STATE CRIMINAL JUSTICE TRAINING COMMISSION 19010 1st Ave South Burien, WA 98148

With new expectations and responsibilities being placed on law enforcement and organizations, understanding the fundamentals of threat intelligence is critical to every situation. Using processes within the threat intelligence framework allows you to proactively defend your environment and understand adversarial strategy and potential targets. This knowledge will also assist in making decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence.

Read More
  • $1095.00
  •  01/31/2019 08:30 AM - 01/31/2019 05:00 PM
  •   Washington Technology University (WTU) - 200 112th Ave NE, Suite 200 Bellevue, WA 98004

This course provides an in-depth look at Structured AnalyticTechniques (SATs) for intelligence analysis. Analysts face many obstacles in developing intelligence, some of which are introduced through human mindsets and biases. Mindsets and biases further complicate the analysis process and often impact an analyst's judgement. SATs are a series of analytic techniques that help reduce mindset related problems with analysis and provide for a structured and organized process for evaluating and analyzing intelligence. The results are more accurate analysis, a way for an analyst to validate evidence, assumptions and analytic leaps and show how an analyst came to a certain judgement.

Read More
  • $995.00
  •  09/19/2018 08:30 AM - 09/19/2018 05:00 PM
  •   Washington Technology University (WTU) - 200 112th Ave NE, Suite 200 Bellevue, WA 98004

Thinking processes play a key role in threat intelligence. Understanding how these processes impact the analysis can improve the effectiveness and outcome of the process. This course analyzes different thinking methods and teaches students how to apply these methods in intelligence analysis. Each thought process has pros and cons related to differing problem types and how problems, whether tame or wicked, are approached. Analysts will benefit by understanding which thought process is most effective for their style of thinking and how to best exploit each of the three methods as part of a problem-solving process.

Read More
  • $995.00
  •  08/17/2018 08:30 AM
  •   Computer Classrooms In Seattle - 10604 NE 38th Place, Suite 118 Kirkland, Washington 98033

Threat intelligence can be affected by a number of factors. It is essential to understand how thinking processes play a key role in the effectiveness of intelligence analysis. This course analyzes different thinking methods and teaches students how to apply those methods in intelligence analysis. Each thought process has pros and cons related to differing problem types an example being problems that are tame or wicked. Analysts must also understand which thought process is most effective for their style of thinking and how to best exploit each of the three methods as part of a problem-solving process.

Read More
  • $895.00
  •  07/11/2018 08:30 AM
  •   Bellevue City Hall: 450 110th Avenue Northeast, Bellevue, WA, USA

Threat intelligence allows you to take proactive measures in defending your environment and understand adversarial focus and what it means to an organization. This course will give you an understanding of mindsets and biases that can lead to incorrect judgements in intelligence analysis.

Read More
  • $895.00
  •  05/15/2018 08:30 AM
  •   450 110th Avenue Northeast, Bellevue, WA, USA

Threat intelligence continues to gain a more prominent role in enhancing organizational security and risk management. Using processes within the threat intelligence framework allows you to proactively defend your environment and understand adversarial strategy and targets. This knowledge will also assist in making decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence.

Read More

Courses


Introduction to Threat Intelligence

Introduction to Threat Intelligence offers core knowledge and skills for professionals interested in better understanding threat intelligence and how to apply these skills and techniques to everyday responsibilities. Using processes within the threat intelligence framework allows an organization to proactively defend their environments, understand adversarial strategy and targets, and use this knowledge to make business decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence. This training provides attendees with a foundational understanding of threat intelligence. Students learn what intelligence is, the difference between information and intelligence and learn how to create actionable intelligence.

Learn More

Managers and Executives

The manager and executive courses are specifically designed to introduce managers and executives to the important role intelligence plays in risk management and security.

Learn More

Customized Corporate Training

A well trained team can provide the excellent skills and expertise to keep your organization secure. We provide customized training courses for your team's needs.

Learn More

Course Offerings

Our courses focus on critical threat intelligence skills. These skills include how to develop meaningful sign-posts, making sense of global threat trends and patterns, cyber-intelligence strategies, identifying and prioritizing risk and much more. See below for a list of available courses.

Learn More

Contact


  • Seattle, WA, United States

Articles


Threat Intelligence Maturity Evaluation

Threat Intelligence Maturity Evaluation

Threat Intelligence Maturity Evaluation – TIME to change the game Organizations are under attack from increasingly complex threats to their environments. Adversaries employ a variety of attack tactics including cyber, physical, human and technology, often using a combination of these tactics. In order to get ahead of the game, businesses need to better their defenses in new ways and get ahead of potential threats and eliminate surprise. That’s where Center for Threat Intelligence’s TIME come in.

Read More