Threat Intelligence Program Development
Insider Threat Program Development and Training
Enterprise Threat Intelligence Assessments
Speaking Engagements
On Demand Training Courses
Certified Threat Intelligence Specialist Certification (CTIS)
Janet Lawless is the CEO and Founder of Center for Threat Intelligence. Collaborating with threat intelligence experts, Janet realized the need to help organizations design holistic threat intelligence programs which includes building resources through threat intelligence consulting, training and certifications for corporations and government organizations. Janet’s former roles in leadership positions at CI Security, Cisco and Microsoft brings a wealth of knowledge in security services and the need for threat intelligence.
David Aucsmith is a senior computer scientist and technology leader currently working as the Chief Scientist and Federal Practice Manager for DarkLight and as a Senior Principal Research Scientist at the Applied Physics Laboratory of the University of Washington. He is also an Affiliate Professor of Computer Science & Engineering at the University of Washington. He has worked in a variety of security technology areas including secure computer systems, secure communications systems, security architecture, random number generation, cryptography and cryptographic systems, steganography and network intrusion detection.
Collin Barry is a senior leader in Expedia Group's Security Enterprise responsible for building a next-generation cyber threat intelligence capability. Prior to Expedia Group, Collin was living in Singapore where he led Booz Allen Hamilton's cyber practice for the Asia-Pacific region. Mid-career, Collin worked as an Intelligence Analyst at the Central Intelligence Agency, where he garnered deep expertise in intelligence support to real-world mission operations.
David Gomez is a retired FBI executive, security consultant, and cybersecurity professional with practitioner experience in complex, high-risk, critical incident management and response. He is a former Senior Fellow at the George Washington University Center for Cyber and Homeland Security, and frequent media contributor on law enforcement, cybersecurity, and counterterrorism topics.
Bryan is a seasoned cybercrime, computer security and homeland security professional with over 20 years of experience. He is an accomplished organizational spokesperson, public speaker and advisor to CxO level and national level executives. Bryan’s unique ability to apply very positive and transparent leadership to direct teams of investigators, developers, data scientists, data visualization experts, and other professionals make him an excellent addition to the Center for Threat Intelligence Advisory Team.
Jim is currently a board member at Overlake Hospital Medical Center and is a past board chair of Seattle Children’s Hospital, the Washington Society of CPAs, and the Duke Alumni Association, among roles at many other boards. Previously Jim had a successful career at Deloitte, an international accounting and consulting firm, where he served as managing partner of the Seattle office, the Tokyo office, and worldwide human resources, along with important client assignments.
Oriah currently leads the cybersecurity and threat intelligence programs for SkOUT Secure Intelligence throughout the western United States. He also serves on several non-profit and private company boards in both a director and advisory capacity. Previously, he served in the U.S. Air Force for over 21 years on Active Duty and continues to serve part-time in the Air National Guard. He began his military career as an enlisted Communication Analyst overseas with the National Security Agency.
Greg currently leads the Uber cyber-threat intelligence team and developed the Uber global threat intelligence strategy. He supports multiple groups including legal, executive protection, incident response, third party risk and others. Greg developed and delivered a threat intelligence training program to extend threat intelligence capabilities across the enterprise.
Guy Shinnar is the Director of Sales US West, for Check Point Software Technologies, Ltd. Guy has unique experience in the security industry with US, and international executive roles. These include his roles as Co-Founder and VP of Sales at Eemago and Director of Sales at Panaya (acquired by Infosys) an internationally recognized start-up. Guy also co-founder and CEO at Gaash Security Training and Consulting LTD focusing on physical security solutions for government and civilian facilities. In the military, Guy served as Captain, Special Forces, Israel IDF.
Joel is currently a Principal Product Manager for Security and Risk Management at Veritas Technologies. He recently retired from active duty after 20 years as an Intelligence Officer in the United States Air Force. Over the course of his military career, Joel served in multiple intelligence and risk management leadership roles. Most recently as full-time faculty member in the College of Science and Technical Intelligence at the National Intelligence University in Washington DC. He taught graduate level courses on threat intelligence and cybersecurity.
An innovative, customized course designed to improve the de-escalation and decision-making skills of law enforcement within the framework of the Guardian mindset in situations characterized by ambiguity, uncertainty, unpredictability, changeability, time-pressure, competing or changing goals, and potential danger. Customized online learning to meet your individual training and scheduling requirements. Online course includes: • Introductory video explaining course objectives, themes, decision-making theory, and the ShadowBox methodology. • Eight experiential ShadowBox training exercises. Each exercise requires trainees to make and explain numerous challenging decisions before being exposed to insights from select Subject Matter Experts (SMEs) regarding those same decisions. • Flexible scheduling – Courses are online and on-demand to meet scheduling requirements.
The Center for Threat Intelligence has partnered with People Formula to bring you this intriguing course, we examine the behavioral psychology of the insider threat. We'll uncover critical signs, underlying motivations and dive into what makes a person become an insider. Insiders are motivated by many things. We'll discuss critical behavioral signs and the psychology that drives them. Most importantly, we will review how to identify and mitigate the potential insider threat.
Organizations are under attack from increasingly complex threats to their environments. Adversaries employ sophisticated attack strategies including cyber, physical, human and technology, often using a combination of these tactics. Using threat intelligence skills and techniques allows you to proactively defend your environment by understanding adversarial strategy, identifying potential targets and ultimately eliminate surprise. These valuable skills will help excel your career and begin your journey to becoming a Center for Threat Intelligence Certified Threat Intelligence Professional. The first step in building a career in threat intelligence is Threat Intelligence Fundamentals.
Check out our new On Demand Section for online courses.
You know just about everything there is know about intelligence or physical security. And then the cyber people show up. They talk in a way that's almost incomprehensible and what do those acronyms even mean? Their language is so weird that you're not even sure how to ask smart questions. That's not setting you up for success. In this session, we'll explain cyber in ordinary language so you can navigate future cyber conversations without the road blocks, confusion, and false starts. Training session are three one-hour courses starting December 14th, 16th and 18th at 11:00 am PST. Price includes all three sessions. Exclusive one-time introductory course pricing.
Insider threats can devastate an organization. These threats are often hard to detect and are caused by negligent insiders, malicious insiders and/or external actors who infiltrate an organization. Insiders may be current or former employees, contractors, vendors, or trusted third parties. Insider attack strategies including cyber, physical, human and technology, often using a combination of these tactics. Motivations can be anything from financial gain to wanting to disrupt operations to get back at the company because of a bad review or missed promotion. Using threat intelligence skills and techniques to understand insider threats allows you to proactively defend your environment. Center for Threat Intelligence is an approved provider for Department of Homeland Security’s (DHS) National Initiative for Cybersecurity Careers and Studies (NICCS) and the National Initiative for Cybersecurity Education (NICE).
Threat intelligence continues to gain a more prominent role in enhancing organizational security and risk management. A critical part of threat intelligence is understanding how mindset and biases play a role in strategies, tactics and vital decisions that may ultimately prevent an attack from being successful. Perception and deception are effective adversarial tactics, knowing your own and your team’s mindsets and biases can assist in getting ahead of the game. Center for Threat Intelligence is an approved provider for Department of Homeland Security’s (DHS) National Initiative for Cybersecurity Careers and Studies (NICCS) and the National Initiative for Cybersecurity Education (NICE).
Organizations are under attack from increasingly complex threats to their environments. Adversaries employ sophisticated attack strategies including cyber, physical, human and technology, often using a combination of these tactics. Using threat intelligence skills and techniques allows you to proactively defend your environment by understanding adversarial strategy, identifying potential targets and ultimately eliminate surprise. These valuable skills will help excel your career and begin your journey to becoming a Center for Threat Intelligence Certified Threat Intelligence Professional. The first step in building a career in threat intelligence is Threat Intelligence Fundamentals.
Information is everywhere. With the proper training, the right information can be found and transformed into actionable intelligence and valuable insight to help companies and law enforcement detect and mitigate risks. In this course, and hands-on workshop, students will learn the tools and techniques used in the field of Open Source Intelligence (OSINT). With special emphasis on social media monitoring, the training is designed to enable security professionals and law enforcement to better discover and evaluate threats, and to conduct efficient and effective online investigations.
Today’s global threats by sophisticated actors, nation-states, organized crime and hacker groups, are highly complex. Many of these threats can be related to a variety of events that seem to have no correlation, yet are drivers and indicators of an imminent attack on your organization. Understanding the next attack, where it will hit and when, are intelligence questions that simply have no black and white answers. These complex problems, also called “wicked problems”, need advance thought processes, techniques and tools, they need “Sensemaking”.
With new expectations and responsibilities being placed on law enforcement and organizations, understanding the fundamentals of threat intelligence is critical to every situation. Using processes within the threat intelligence framework allows you to proactively defend your environment and understand adversarial strategy and potential targets. This knowledge will also assist in making decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence.
This course provides an in-depth look at Structured AnalyticTechniques (SATs) for intelligence analysis. Analysts face many obstacles in developing intelligence, some of which are introduced through human mindsets and biases. Mindsets and biases further complicate the analysis process and often impact an analyst's judgement. SATs are a series of analytic techniques that help reduce mindset related problems with analysis and provide for a structured and organized process for evaluating and analyzing intelligence. The results are more accurate analysis, a way for an analyst to validate evidence, assumptions and analytic leaps and show how an analyst came to a certain judgement.
Thinking processes play a key role in threat intelligence. Understanding how these processes impact the analysis can improve the effectiveness and outcome of the process. This course analyzes different thinking methods and teaches students how to apply these methods in intelligence analysis. Each thought process has pros and cons related to differing problem types and how problems, whether tame or wicked, are approached. Analysts will benefit by understanding which thought process is most effective for their style of thinking and how to best exploit each of the three methods as part of a problem-solving process.
Threat intelligence can be affected by a number of factors. It is essential to understand how thinking processes play a key role in the effectiveness of intelligence analysis. This course analyzes different thinking methods and teaches students how to apply those methods in intelligence analysis. Each thought process has pros and cons related to differing problem types an example being problems that are tame or wicked. Analysts must also understand which thought process is most effective for their style of thinking and how to best exploit each of the three methods as part of a problem-solving process.
Threat intelligence allows you to take proactive measures in defending your environment and understand adversarial focus and what it means to an organization. This course will give you an understanding of mindsets and biases that can lead to incorrect judgements in intelligence analysis.
Threat intelligence continues to gain a more prominent role in enhancing organizational security and risk management. Using processes within the threat intelligence framework allows you to proactively defend your environment and understand adversarial strategy and targets. This knowledge will also assist in making decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence.
Introduction to Threat Intelligence offers core knowledge and skills for professionals interested in better understanding threat intelligence and how to apply these skills and techniques to everyday responsibilities. Using processes within the threat intelligence framework allows an organization to proactively defend their environments, understand adversarial strategy and targets, and use this knowledge to make business decisions based on identifying real risks and prioritizing resources to address them. The first step in building a proactive security environment is creating a foundation for threat intelligence. This training provides attendees with a foundational understanding of threat intelligence. Students learn what intelligence is, the difference between information and intelligence and learn how to create actionable intelligence.
Learn MoreThe manager and executive courses are specifically designed to introduce managers and executives to the important role intelligence plays in risk management and security.
Learn MoreA well trained team can provide the excellent skills and expertise to keep your organization secure. We provide customized training courses for your team's needs.
Learn MoreOur courses focus on critical threat intelligence skills. These skills include how to develop meaningful sign-posts, making sense of global threat trends and patterns, cyber-intelligence strategies, identifying and prioritizing risk and much more. See below for a list of available courses.
Learn MoreThe Guardian Mindset: De-escalation and Tactical Decision Making is an innovative, customized course designed to improve the de-escalation and decision-making skills of law enforcement within the framework of the Guardian mindset in situations characterized by ambiguity, uncertainty, unpredictability, changeability, time-pressure, competing or changing goals, and potential danger.
Learn More