Skip to content

Repository to store the references and sources used in the presentations

Notifications You must be signed in to change notification settings

sfakiana/NIS-ENISA-Summer-School-2018

Repository files navigation

NIS-ENISA-Summer-School-2018

Repository to store the references and sources used in the presentations

Intelligence Requirements 101 Presentation:

  1. Jess  Garcia - Lessons Learned from Teaching CTI All Over the World
  2. Cliff Stoll - The Cuckoo'e Egg
  3. Scott J. Roberts & Rebekah Brown - Intelligence Driven Incident Response
  4. EclecticIQ - A Stakeholder-centric Approach to Building a Cyber Threat Intelligence (CTI) Practice
  5. SANS (Robert M. Lee) - The Sliding Scale of Cyber Security
  6. SANS CTI Summit 2018 - Michael Rea - I Can Haz Requirements?: Requirements and CTI Program Success
  7. Library of Cyber Resilience Metrics
  8. Intel471 (Mark Arena) - How to Build a Cyber Threat Intelligence Program
  9. Intel471 (Mark Arena) - Cyber Threat Intelligence - Maturity and Metrics
  10. SANS (Brian P. Kim) - Threat Intelligence: Planning and Direction
  11. Developing Priority Intelligence Requirements
  12. Scott J. Roberts - CTI SquadGoals — Setting Requirements
  13. Scott J. Roberts - Intelligence Collection Priorities
  14. Intel471 (Mark Arena) - Intelligence Requirements Template
  15. Intel471 - Threat intelligence program checklist
 

Intelligence Report Writing 101 Presentation:

  1. CYINT Analysis - Write It, Or It Didn't Happen
  2. CTI Summit 2017 Keynote - Cliff Stoll - (Still) Stalking the Wily Hacker
  3. CTI Summit 2017 - Christian Paredes - Pen-To-Paper and The Finished Report: The Key To Generating Threat Intelligence
  4. US Military Joint Publication 2-0
  5. Richards J. Heuer - Psychology of Intelligence Analysis
  6. Richards J. Heuer - Structured Analytic Techniques for Intelligence Analysis
  7. Dragos (Sergio Caltagirone) - Industrial Control Threat Intelligence
  8. INSA - CYBER INTELLIGENCE: Preparing Today’s Talent for Tomorrow’s Threats
  9. CTI Summit 2017 - Dragos (Robert M. Lee) - Knowing When to Consume Intelligence and When to Generate It
  10. Sergio Caltagirone - 15 Things Wrong with Today’s Threat Intelligence Reporting
  11. CIA - Fifteen Axioms for Intelligence Analysts
  12. CIA - Analytic Thinking and Presenting for Intelligence Producers
  13. Intelligence Community Directive (ICD) 203 - Analytic Standards
  14. Martin Petersen - What I Learned in 40 Years of Doing Intelligence Analysis for US Foreign Policymakers
  15. CIA - Words of Estimative Probability
  16. Weasel Words
  17. Analytic Confidence
  18. Winston Churchill's Writing Advice
  19. Style Manual and Writers' Guide for Intelligence Publications
  20. Admiralty Code
  21. Digital Shadows - WannaCry: An Analysis of Competing Hypotheses
  22. SANS CTI Summit 2018 - Rick Holland -There Is MOAR To Structured Analytic Techniques Than Just ACH
  23. US-CERT - Traffic Light Protocol (TLP) Definitions and Usage
  24. Intel471 (Mark Arena) - How to Build a Cyber Threat Intelligence Program
  25. Intel471 (Mark Arena) - Cyber Threat Intelligence - Maturity and Metrics
  26. Shadowserver - The Italian Connection: An analysis of exploit supply chains and digital quartermasters
  27. CYINT Analysis - What Analysts Can Learn From Shadowserver’s “Italian Connection” Report
CTI BAU Tips:
  1. RSS Reader:  Feedly  , Inoreader
  2. Twitter
  3. The CyberWire Daily Briefing
  4. The CyberWire Daily Podcast
  5. Nuzzel
  6. Economist Espresso
  7. Economist Intelligence Unit
  8. Council on Foreign Relations
  9. Team Cymru's Dragon News Bytes
  10. This Week in 4n6
  11. Github
  12. APTnotes
  13. APT & CyberCriminal Campaign Collection
  14. APT Search Engine
  15. Shodan
  16. Shadowserver Reports

About

Repository to store the references and sources used in the presentations

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published