Skip to content

Repository to store the references and sources used in the presentation

Notifications You must be signed in to change notification settings

sfakiana/NIS-ENISA-Summer-School-2019

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 

Repository files navigation

NIS-ENISA-Summer-School-2019

Repository to store the resources used in the presentation on Intelligence Requirements and CTI Reporting:

Intelligence Requirements

  1. Miguel de Cervantes - Don Quixote
  2. Cliff Stoll - The Cuckoo'e Egg
  3. EclecticIQ - A Stakeholder-centric Approach to Building a Cyber Threat Intelligence (CTI) Practice
  4. FIRST CTI 2019 (Andreas Sfakianakis) - 5 years of applied CTI discipline: where should organisations put focus on?
  5. SANS - 2019 CTI Survey
  6. SANS (Robert M. Lee) - The Sliding Scale of Cyber Security
  7. SANS CTI Summit 2018 - Michael Rea - I Can Haz Requirements?: Requirements and CTI Program Success
  8. Intel471 (Mark Arena) - How to Build a Cyber Threat Intelligence Program
  9. SANS (Brian P. Kim) - Threat Intelligence: Planning and Direction
  10. Developing Priority Intelligence Requirements
  11. Scott J. Roberts - CTI SquadGoals — Setting Requirements
  12. Scott J. Roberts - Intelligence Collection Priorities
  13. Intel471 (Mark Arena) - Intelligence Requirements Template
  14. SANS (Pasquale Stirparo) - Defining Threat Intelligence Requirements
  15. FIRST CTI 2019 (Pasquale Stirparo) - Your Requirements are not my Requirements
  16. SANS CTI Summit 2018 - Intelligence Preparation of the Cyber Environment – Rob Dartnall
  17. INSA - Cyber Intelligence: Preparing Today’s Talent for Tomorrow’s Threats
  18. Grammarist - Tilting at windmills
  19. Wikipedia - Self-licking ice cream cone
  20. SANS (Katie Nickels) - The Cycle of Cyber Threat Intelligence
 

CTI Reporting

  1. CYINT Analysis - Write It, Or It Didn't Happen
  2. CTI Summit 2017 Keynote - Cliff Stoll - (Still) Stalking the Wily Hacker
  3. CTI Summit 2017 - Christian Paredes - Pen-To-Paper and The Finished Report: The Key To Generating Threat Intelligence
  4. US Military Joint Publication 2-0
  5. Richards J. Heuer - Psychology of Intelligence Analysis
  6. Richards J. Heuer - Structured Analytic Techniques for Intelligence Analysis
  7. Dragos (Sergio Caltagirone) - Industrial Control Threat Intelligence
  8. INSA - CYBER INTELLIGENCE: Preparing Today’s Talent for Tomorrow’s Threats
  9. CTI Summit 2017 - Dragos (Robert M. Lee) - Knowing When to Consume Intelligence and When to Generate It
  10. FIRST CTI 2019 (Andreas Sfakianakis) - 5 years of applied CTI discipline: where should organisations put focus on?
  11. Sergio Caltagirone - 15 Things Wrong with Today’s Threat Intelligence Reporting
  12. CIA - Fifteen Axioms for Intelligence Analysts
  13. CIA - Analytic Thinking and Presenting for Intelligence Producers
  14. Intelligence Community Directive (ICD) 203 - Analytic Standards
  15. Martin Petersen - What I Learned in 40 Years of Doing Intelligence Analysis for US Foreign Policymakers
  16. CIA - Words of Estimative Probability
  17. Weasel Words
  18. Analytic Confidence
  19. Winston Churchill's Writing Advice
  20. Style Manual and Writers' Guide for Intelligence Publications
  21. Admiralty Code
  22. US-CERT - Traffic Light Protocol (TLP) Definitions and Usage
  23. Intel471 (Mark Arena) - How to Build a Cyber Threat Intelligence Program
  24. Intel471 (Mark Arena) - Cyber Threat Intelligence - Maturity and Metrics
  25. SANS (Katie Nickels) - The Cycle of Cyber Threat Intelligence

About

Repository to store the references and sources used in the presentation

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published