Protect your business and earn your Certification in Cyber Intelligence
2023-2024 Cyber Intelligence Virtual Seminar SeriesWould you like more information?
"*" indicates required fields
Earn your Certification in Cyber Intelligence
Each seminar will run 3 hours and the charge is $475 per date. Use the links below to register for our seminars individually or register for the entire series to receive a 20% discount and your Certification in Cyber Intelligence. Unless otherwise noted, our seminars will be recorded and available to registrants.December 6, 2023
Cyber Critical Infrastructure
Explore the human and technological components for an infrastructure that will support an organization’s mission – taught by Roman EtebarLearn the components of a successful cyber security program from a people, process, and technology perspective. Focusing on people, the student will learn how to address cyber security challenges from a business/mission perspective. The student will learn how to work with technical and business teams to address critical cyber hygiene issues. When addressing process, the student will learn how to develop policies, procedures, guidelines, and standards that are effective and support their organization’s mission.
January 9, 2024
Insider Threat
Learn about identification, indicators, motives, methodologies and most importantly mitigation techniques designed to establish a proactive defensive posture - taught by Chris KayDesigned for the non-technical professional, this webinar is a basic review of cybersecurity issues pertinent to the study of insider threats. Learn about the various types of insider threats prevalent today – including state and non-state actors, as well as their motivations and methodologies (both technical and increasingly non-technical). See the policies and legal framework within which insider threat prevention and mitigation must operate. Explore the development of effective multi-disciplinary mitigation strategies as part of an overall risk management program leading to more effective anti-insider threat mechanisms.
January 17, 2024
Cyber Terrorism
Learn about Cyber Terrorism based on thorough knowledge of both practitioners and scholars of the subject matter – taught by Paul M. Davis, Vice President of Government Business Development at SecureDAM and Founder and President of JANUS Think.The primary purpose of this program is to be able to effectively provide national security and cyber intelligence professionals with a better understanding of cyber terrorism by compiling and extracting sound knowledge from scholars of the subject in an effort to analyze an appropriate, comprehensive definition of cyber terrorism. The webinar addresses motive, means, and opportunity as it applies to the use of cyber to cause terror and undermine national security. The program will also cover collections and cyber tactics, techniques, and procedures (TTPs) used by cyber terrorists, where bits and bytes could cause loss of life and destruction of critical infrastructure.
January 24, 2024
Cyber Ethics
With technology playing a significant role in business, it is crucial to understand the ethical implications of the tools being used every day - taught by Tommy Gardner, HP’s Chief Technology Officer for HP Federal, spanning the US Federal Agencies, Higher Education, K-12 Education, State, and Local government customer segments, as well as Federal Systems Integrators.With technology playing a significant role in business, it is crucial to understand the ethical implications of the tools being used every day. This seminar will help you to anticipate and identify ethical and legal issues and apply appropriate ethical reasoning. By using case studies and real-world examples, you will establish an ethical decision-making framework that can be adapted to your organizational context and applied in your day-to-day work.
January 31, 2024
Cyber Intelligence Overview
The Cyber intelligence Overview presents the acquisition and analysis of information to identify, track, and predict cyber capabilities, intentions, and activities. – taught by Paul M. Davis is Vice President of Government Business Development at SecureDAM and Founder and President of JANUS Think.
Learn how to add value to the information and to present courses of action, that can be acted upon, to the decision-maker. Understand the traditional intelligence tradecraft and how it is used in the cyber world to assess cyber threats, for intelligence analysis, and for counterintelligence. Learn about different types of cyber threat actors: state, non-state, and rogue actors. Get exposure to future innovations that are changing the cyber intelligence landscape.
Registration coming soon.
February 7, 2024
Cyber Strategy Development
Plan for the intersection of cyberspace, intelligence, strategy, planning, and applications – taught by Joe Billingsley, Founder of the Military Cyber Professionals Association (MCPA)
The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence. Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.
Registration coming soon.
February 21, 2024
Artificial Intelligence
Discussion of computer systems able to perform tasks that normally require human intelligence, and practical examples of how this technology is used. – taught by Charles Pfaff who has had an extensive career and research interests including advising on cyber, regional military affairs, security cooperation, military ethics, and the Middle East.This virtual seminar will provide a fundamental understanding of how artificial intelligence and cyber tools will affect the global battlefield in the years to come. The seminar will begin by exploring the current status of artificial intelligence technology, the published cyber capabilities of international actors, and the current United States cyber strategy. Then the seminar will take a look at the projected abilities of artificial intelligence and its implications for warfare, based on released statements by both the private sector and government actors.
Registration coming soon.
March 6, 2024
Counterintelligence Cyber Technology
Learn the main principles of cryptography to build a solid foundation - taught by Paul M. Davis is Vice President of Government Business Development at SecureDAM and Founder and President of JANUS Think.The seminar will cover some of the major technical pillars that rest on this foundation, including financial technology, Big Data, and Machine Learning. The seminar will later dive deeply into digital currencies and digital ledgers, computer viruses, Malware, and automation. The seminar will tie all this knowledge into a heuristic overview of the cyber intelligence industry, its major public and private players, and how they collaboratively work together to form defensive and, in some cases, offensive capabilities.
Registration coming soon.
March 13, 2024
Virtual Skills Analysis
Develop analytic skills in accordance with the standards and practices currently in use in the intelligence community – taught by Brian Lane, a Subject Matter Expert (SME) with more than fifteen years of experience in the maritime and intelligence communities.
Vital Skills Analysis (VSA) introduces students to the skills required to conduct all-source cyber intelligence analysis, with emphasis on predictive techniques. It begins by introducing students to the basic principles of intelligence analysis, and then how those principles are applied using practical assignments. Students will select open-source cyber topics, research the information, and learn to write assessments. Through this methodology, students will apply the skills learned, gain experience writing one-page assessments, quick briefing of senior leaders, and defending their work. VSA serves as a common foundation for developing analytic skills in accordance with the standards and practices currently in use in the intelligence community.
Registration coming soon.
March 27, 2024
International Law Governing Cyber Operations
This session is rich with information regarding what is legal when conducting cyber operations and distinguishes between legal and morally correct.– taught by Ethan Burger, a Washington D.C.- based international attorney and educator with a background in cybersecurity, transnational financial crime, and Russian legal matters.
This virtual seminar on "Introduction to the International Law Governing Cyber Operations" will address the international law appropriate to the evolving frontier of offensive cyber capabilities. In particular, the course is designed with an emphasis on Russian cyber activity and subsequent U.S. policy debates and responses. As the course progresses, students will be challenged and grapple with defining standards for the behavior of states in cyberspace that is in line with international law. Subsequently, students will examine tension areas in U.S.-Russian relations and learn how cyber capabilities affect interstate issues, both old and new.
Registration coming soon.
April 10, 2024
Cyber Intelligence and Statecraft
The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence. – taught by Larry Dietz who has over 30 years of diversified military and commercial information and cyber security experience.Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence. Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.
*Only U.S. citizens will be admitted to this event, and only after each has registered online in advance of the event beginning.
Registration coming soon.
April 16, 2024
Insider Threat
Learn about identification, indicators, motives, methodologies and most importantly mitigation techniques designed to establish a proactive defensive posture – taught by Chris Kay, a Senior Policy Advisor to Naval Intelligence and a retired Naval Officer, with over 20 years of management expertise in strategy and policy
Designed for the non-technical professional, this webinar is a basic review of cybersecurity issues pertinent to the study of insider threats. Learn about the various types of insider threats prevalent today – including state and non-state actors, as well as their motivations and methodologies (both technical and increasingly non-technical). See the policies and legal framework within which insider threat prevention and mitigation must operate. Explore the development of effective multi-disciplinary mitigation strategies as part of an overall risk management program leading to more effective anti-insider threat mechanisms.
Registration coming soon.
April 17, 2023
Cyber Critical Infrastructure
Explore the human and technological components for an infrastructure that will support an organization’s mission - taught by Roman Etebar.Learn the components of a successful cyber security program from a people, process, and technology perspective. Focusing on people, the student will learn how to address cyber security challenges from a business/mission perspective. The student will learn how to work with technical and business teams to address critical cyber hygiene issues. When addressing process, the student will learn how to develop policies, procedures, guidelines, and standards that are effective and support their organization’s mission.
Registration coming soon.
April 24, 2024
Cyber Ethics
With technology playing a significant role in business, it is crucial to understand the ethical implications of the tools being used every day. Featuring: Tommy Gardner, HP’s Chief Technology Officer for HP Federal, spanning the US Federal Agencies, Higher Education, K-12 Education, State, and Local government customer segments, as well as Federal Systems Integrators.With technology playing a significant role in business, it is crucial to understand the ethical implications of the tools being used every day. This seminar will help you to anticipate and identify ethical and legal issues and apply appropriate ethical reasoning. By using case studies and real-world examples, you will establish an ethical decision-making framework that can be adapted to your organizational context and applied in your day-to-day work.
Registration coming soon.
May 1, 2024
Cyber Terrorism
Learn about Cyber Terrorism based on thorough knowledge of both practitioners and scholars of the subject matter – taught by Paul M. Davis, Vice President of Government Business Development at SecureDAM and Founder and President of JANUS Think.The primary purpose of this program is to be able to effectively provide national security and cyber intelligence professionals with a better understanding of cyber terrorism by compiling and extracting sound knowledge from scholars of the subject in an effort to analyze an appropriate, comprehensive definition of cyber terrorism. The webinar addresses motive, means, and opportunity as it applies to the use of cyber to cause terror and undermine national security. The program will also cover collections and cyber tactics, techniques, and procedures (TTPs) used by cyber terrorists, where bits and bytes could cause loss of life and destruction of critical infrastructure.
Registration coming soon.
May 8, 2024
Cyber Intelligence Overview
The Cyber intelligence Overview presents the acquisition and analysis of information to identify, track, and predict cyber capabilities, intentions, and activities. – taught by Paul M. Davis is Vice President of Government Business Development at SecureDAM and Founder and President of JANUS Think.
Learn how to add value to the information and to present courses of action, that can be acted upon, to the decision-maker. Understand the traditional intelligence tradecraft and how it is used in the cyber world to assess cyber threats, for intelligence analysis, and for counterintelligence. Learn about different types of cyber threat actors: state, non-state, and rogue actors. Get exposure to future innovations that are changing the cyber intelligence landscape.
Registration coming soon.
May 15, 2024
Cyber Strategy Development
Plan for the intersection of cyberspace, intelligence, strategy, planning, and applications – taught by Joe Billingsley, Founder of the Military Cyber Professionals Association (MCPA)
The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence. Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.
Registration coming soon.