Skip to content
Repository to store the references and sources used in the presentation
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
README.md

README.md

NIS-ENISA-Summer-School-2019

Repository to store the resources used in the presentation on Intelligence Requirements and CTI Reporting:

Intelligence Requirements

  1. Miguel de Cervantes - Don Quixote
  2. Cliff Stoll - The Cuckoo'e Egg
  3. EclecticIQ - A Stakeholder-centric Approach to Building a Cyber Threat Intelligence (CTI) Practice
  4. FIRST CTI 2019 (Andreas Sfakianakis) - 5 years of applied CTI discipline: where should organisations put focus on?
  5. SANS - 2019 CTI Survey
  6. SANS (Robert M. Lee) - The Sliding Scale of Cyber Security
  7. SANS CTI Summit 2018 - Michael Rea - I Can Haz Requirements?: Requirements and CTI Program Success
  8. Intel471 (Mark Arena) - How to Build a Cyber Threat Intelligence Program
  9. SANS (Brian P. Kim) - Threat Intelligence: Planning and Direction
  10. Developing Priority Intelligence Requirements
  11. Scott J. Roberts - CTI SquadGoals — Setting Requirements
  12. Scott J. Roberts - Intelligence Collection Priorities
  13. Intel471 (Mark Arena) - Intelligence Requirements Template
  14. SANS (Pasquale Stirparo) - Defining Threat Intelligence Requirements
  15. FIRST CTI 2019 (Pasquale Stirparo) - Your Requirements are not my Requirements
  16. SANS CTI Summit 2018 - Intelligence Preparation of the Cyber Environment – Rob Dartnall
  17. INSA - Cyber Intelligence: Preparing Today’s Talent for Tomorrow’s Threats
  18. Grammarist - Tilting at windmills
  19. Wikipedia - Self-licking ice cream cone
  20. SANS (Katie Nickels) - The Cycle of Cyber Threat Intelligence
 

CTI Reporting

  1. CYINT Analysis - Write It, Or It Didn't Happen
  2. CTI Summit 2017 Keynote - Cliff Stoll - (Still) Stalking the Wily Hacker
  3. CTI Summit 2017 - Christian Paredes - Pen-To-Paper and The Finished Report: The Key To Generating Threat Intelligence
  4. US Military Joint Publication 2-0
  5. Richards J. Heuer - Psychology of Intelligence Analysis
  6. Richards J. Heuer - Structured Analytic Techniques for Intelligence Analysis
  7. Dragos (Sergio Caltagirone) - Industrial Control Threat Intelligence
  8. INSA - CYBER INTELLIGENCE: Preparing Today’s Talent for Tomorrow’s Threats
  9. CTI Summit 2017 - Dragos (Robert M. Lee) - Knowing When to Consume Intelligence and When to Generate It
  10. FIRST CTI 2019 (Andreas Sfakianakis) - 5 years of applied CTI discipline: where should organisations put focus on?
  11. Sergio Caltagirone - 15 Things Wrong with Today’s Threat Intelligence Reporting
  12. CIA - Fifteen Axioms for Intelligence Analysts
  13. CIA - Analytic Thinking and Presenting for Intelligence Producers
  14. Intelligence Community Directive (ICD) 203 - Analytic Standards
  15. Martin Petersen - What I Learned in 40 Years of Doing Intelligence Analysis for US Foreign Policymakers
  16. CIA - Words of Estimative Probability
  17. Weasel Words
  18. Analytic Confidence
  19. Winston Churchill's Writing Advice
  20. Style Manual and Writers' Guide for Intelligence Publications
  21. Admiralty Code
  22. US-CERT - Traffic Light Protocol (TLP) Definitions and Usage
  23. Intel471 (Mark Arena) - How to Build a Cyber Threat Intelligence Program
  24. Intel471 (Mark Arena) - Cyber Threat Intelligence - Maturity and Metrics
  25. SANS (Katie Nickels) - The Cycle of Cyber Threat Intelligence
You can’t perform that action at this time.