Time
3 hours 1 minute
Difficulty
Advanced
CEU/CPE
3

Video Description

A Breakdown of the course (part 2) This lesson continues where the previous one left off. The instructor continues to offer a breakdown of the course which goes as follows: Module 4: Analysis of Strategic Threat Intelligence

Video Transcription

00:04
to continue module three,
00:06
We can see that there's also some consideration for strategic sharing,
00:10
meaning there is a
00:14
a definite requirement to filter information to make sure that only the most actionable, the most
00:20
verified or dependable information
00:23
is sent to various decision makers or other analysts.
00:29
There's ah, challenge and defining the correct balance between having too much or too little information, too much or too little detail and so on.
00:37
So some methodology and some best practices will be discussed when we get into that area,
00:43
even things like what kind of language should be used.
00:46
Uh, how do you prevent losing your audience? For instance,
00:51
there's the old adage about, you know, making sure you know your audience when you're writing a reporter or making a speech or anything any kind of public communication.
00:59
So that's definitely something that will get into.
01:02
I'll also look at some more tools and websites. Some of the tools that are available are quite expensive,
01:07
And so, for those reasons,
01:11
uh,
01:11
I won't be able to demonstrate the tools
01:14
during this during this course. But you can certainly benefit from having a look at some of the documentation and the websites of the vendors. I'll do my best to give you an idea of how the tools operate so that you can probe further and decide if that's something that would be beneficial to your organization.
01:34
Go back into your rules.
01:36
Look at I was C extraction within the sticks framework. There's a whole bunch of different areas there where we can
01:42
explore some of the capabilities that are available in the marketplace.
01:48
And then the last module
01:51
is the analysis of Thea Strategic Threat Intelligence that we were just discussing.
01:56
How do you identify areas where there may be bias is where you may have made a factual errors or logical errors in your analysis,
02:06
Those air very important things to Thio take care of. His fire is fine to ing and proof reading,
02:14
because again, when you're sending information to higher levels within your organization,
02:20
it's extremely important for it to be accurate
02:23
and well verified. And so on.
02:25
That way you don't waste people's time, and you don't end up
02:30
in the embarrassing situation where you produce intelligence that turns out to be flawed.
02:36
We'll even get into the concept of the competing hypothesis.
02:40
This could be you know, two hypotheses from the same analyst or more likely, perhaps, would be
02:47
two hypotheses about some intelligence from two different analysts.
02:52
It could be that the, uh
02:54
to different conclusions were reached by looking at some evidence.
02:58
And now you've got to figure out exactly what you're dealing with and which of those hypotheses is more likely to be correct?
03:07
Well, even delve into some aspects of attribution,
03:12
whether it's people, human elements.
03:15
Uh,
03:16
the the concept of attribution can be very tricky, especially
03:22
during the most recent presidential election and very stories that have been in the news in 2017. We know that there's a lot of discussion about attribution in the public space, especially as it relates to Wikileaks, and they're CIA documents that they produced. So we could talk a little bit more about that
03:42
that also relates to the attribution to a nation state.
03:46
And based on some of those new stories and some of the events that have happened in 2017 we can see that
03:53
this is a very challenging area of threat intelligence
03:58
because of the different ways that the waters could be money and if you will,
04:03
and to wrap up module four, We'll have a U. S. Strategic overview or review of all the different things we talked about
04:11
in this in this module as it relates to attribution as it relates to the production and the consumption of intelligence.
04:19
And how does this actually relate to
04:23
your operations overall?
04:27
All right, so that's it for the introduction.
04:29
I look forward to seeing you in Module one.
04:31
Thank you.

Up Next

Advanced Cyber Threat Intelligence

The Cyber Threat Intelligence (CTI) course is taught by Cybrary SME, Dean Pompilio. It consists of 12 modules and provides a comprehensive introduction to CTI. The subject is an important one, and in addition to discussing tactics and methods, quite a bit of focus is placed on operational matters including the various CTI analyst roles.

Instructed By

Instructor Profile Image
Dean Pompilio
CEO of SteppingStone Solutions
Instructor