Take one seminar or earn your Certification in Cyber Intelligence through IWP's

2024 Cyber Intelligence Virtual Seminar Series

Take one seminar for CE credit or all to earn your Certification in Cyber Intelligence through IWP's

2024 Cyber Intelligence Virtual Seminar Series
 

2019 - 2020

Cyber Intelligence Seminars

Earn your Certification in Cyber Intelligence

You can now earn your Certification in Cyber Intelligence or take Continuing Education credits on your schedule and from your desk! The Institute of World Politics's Cyber Intelligence Initiative is a unique professional education program teaching business and government executives how to utilize intelligence tools and cyber capabilities to proactively protect their organizations. 

New in 2024: all seminars are delivered on your schedule!

Let us know which seminar(s) interest you and we will work with you to schedule a good time for you to meet with the instructor and take the seminar! Our seminars are delivered live via a virtual connection and you will have the opportunity to ask questions and interact with our expert instructors.

Our process is easy: contact us via this form and let us know which of our seminars interests you. Or register for the entire series to receive a 20% discount and your Certification in Cyber Intelligence.Each seminar will run 3 hours and the charge is $475 per seminar. Our seminars qualify as Continuing Education (CE) credits that you can take from your desk, on your schedule.

Choose 1 seminar or take them all for a 20% discount and your Certification in Cyber Intelligence

Schedule your seminars by completing this form, here

Counterintelligence Cyber Technology

Learn the main principles of cryptography to build a solid foundation - taught by Paul M. Davis is Vice President of Government Business Development at SecureDAM and Founder and President of JANUS Think.
Register Here

The seminar will cover some of the major technical pillars that rest on this foundation, including financial technology, Big Data, and Machine Learning. The seminar will later dive deeply into digital currencies and digital ledgers, computer viruses, Malware, and automation. The seminar will tie all this knowledge into a heuristic overview of the cyber intelligence industry, its major public and private players, and how they collaboratively work together to form defensive and, in some cases, offensive capabilities.

July 10, 2024

Cyber Intelligence Overview

The Cyber intelligence Overview presents the acquisition and analysis of information to identify, track, and predict cyber capabilities, intentions, and activities. – taught by Paul M. Davis is Vice President of Government Business Development at SecureDAM and Founder and President of JANUS Think.

Register Here

Learn how to add value to the information and to present courses of action, that can be acted upon, to the decision-maker. Understand the traditional intelligence tradecraft and how it is used in the cyber world to assess cyber threats, for intelligence analysis, and for counterintelligence. Learn about different types of cyber threat actors: state, non-state, and rogue actors. Get exposure to future innovations that are changing the cyber intelligence landscape.

Registration coming soon. 

July 17, 2024

Cyber Terrorism

Learn about Cyber Terrorism based on thorough knowledge of both practitioners and scholars of the subject matter – taught by Paul M. Davis, Vice President of Government Business Development at SecureDAM and Founder and President of JANUS Think.
Register Here

The primary purpose of this program is to be able to effectively provide national security and cyber intelligence professionals with a better understanding of cyber terrorism by compiling and extracting sound knowledge from scholars of the subject in an effort to analyze an appropriate, comprehensive definition of cyber terrorism. The webinar addresses motive, means, and opportunity as it applies to the use of cyber to cause terror and undermine national security. The program will also cover collections and cyber tactics, techniques, and procedures (TTPs) used by cyber terrorists, where bits and bytes could cause loss of life and destruction of critical infrastructure. 

Registration coming soon. 

July 24, 2024

Cyber Ethics

With technology playing a significant role in business, it is crucial to understand the ethical implications of the tools being used every day.  Featuring: Tommy Gardner, HP’s Chief Technology Officer for HP Federal, spanning the US Federal Agencies, Higher Education, K-12 Education, State, and Local government customer segments, as well as Federal Systems Integrators.
Register Here

With technology playing a significant role in business, it is crucial to understand the ethical implications of the tools being used every day. This seminar will help you to anticipate and identify ethical and legal issues and apply appropriate ethical reasoning. By using case studies and real-world examples, you will establish an ethical decision-making framework that can be adapted to your organizational context and applied in your day-to-day work.

Registration coming soon. 

July 31, 2024

Cyber Strategy Development

Plan for the intersection of cyberspace, intelligence, strategy, planning, and applications –  taught by Joe Billingsley, Founder of the Military Cyber Professionals Association (MCPA)

Register Here

The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence. Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.

Registration coming soon. 

Artificial Intelligence

Discussion of computer systems able to perform tasks that normally require human intelligence, and practical examples of how this technology is used.   taught by Charles Pfaff who has had an extensive career and research interests including advising on cyber, regional military affairs, security cooperation, military ethics, and the Middle East.

January 24, 2024

Cyber Ethics

With technology playing a significant role in business, it is crucial to understand the ethical implications of the tools being used every day - taught by Tommy Gardner, HP’s Chief Technology Officer for HP Federal, spanning the US Federal Agencies, Higher Education, K-12 Education, State, and Local government customer segments, as well as Federal Systems Integrators.
Register Here

With technology playing a significant role in business, it is crucial to understand the ethical implications of the tools being used every day. This seminar will help you to anticipate and identify ethical and legal issues and apply appropriate ethical reasoning. By using case studies and real-world examples, you will establish an ethical decision-making framework that can be adapted to your organizational context and applied in your day-to-day work.

Register Here

This virtual seminar will provide a fundamental understanding of how artificial intelligence and cyber tools will affect the global battlefield in the years to come. The seminar will begin by exploring the current status of artificial intelligence technology, the published cyber capabilities of international actors, and the current United States cyber strategy. Then the seminar will take a look at the projected abilities of artificial intelligence and its implications for warfare, based on released statements by both the private sector and government actors.

Virtual Skills Analysis

Develop analytic skills in accordance with the standards and practices currently in use in the intelligence community – taught by Brian Lane, a Subject Matter Expert (SME) with more than fifteen years of experience in the maritime and intelligence communities.

Register Here

Vital Skills Analysis (VSA) introduces students to the skills required to conduct all-source cyber intelligence analysis, with emphasis on predictive techniques. It begins by introducing students to the basic principles of intelligence analysis, and then how those principles are applied using practical assignments. Students will select open-source cyber topics, research the information, and learn to write assessments. Through this methodology, students will apply the skills learned, gain experience writing one-page assessments, quick briefing of senior leaders, and defending their work. VSA serves as a common foundation for developing analytic skills in accordance with the standards and practices currently in use in the intelligence community.

International Law Governing Cyber Operations

This session is rich with information regarding what is legal when conducting cyber operations and distinguishes between legal and morally correct.– taught by Ethan Burger, a Washington D.C.- based international attorney and educator with a background in cybersecurity, transnational financial crime, and Russian legal matters.

Register Here

This virtual seminar on "Introduction to the International Law Governing Cyber Operations" will address the international law appropriate to the evolving frontier of offensive cyber capabilities. In particular, the course is designed with an emphasis on Russian cyber activity and subsequent U.S. policy debates and responses. As the course progresses, students will be challenged and grapple with defining standards for the behavior of states in cyberspace that is in line with international law. Subsequently, students will examine tension areas in U.S.-Russian relations and learn how cyber capabilities affect interstate issues, both old and new.

Cyber Intelligence and Statecraft

The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence.  – taught by Joe Billingsley is Founder of the Military Cyber Professionals Association (MCPA).

Register Here

Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence. Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.

*Only U.S. citizens will be admitted to this event, and only after each has registered online in advance of the event beginning.

Insider Threat

Learn about identification, indicators, motives, methodologies and most importantly mitigation techniques designed to establish a proactive defensive posture – taught by Chris Kay, a Senior Policy Advisor to Naval Intelligence and a retired Naval Officer, with over 20 years of management expertise in strategy and policy

Register Here

Designed for the non-technical professional, this webinar is a basic review of cybersecurity issues pertinent to the study of insider threats. Learn about the various types of insider threats prevalent today – including state and non-state actors, as well as their motivations and methodologies (both technical and increasingly non-technical). See the policies and legal framework within which insider threat prevention and mitigation must operate. Explore the development of effective multi-disciplinary mitigation strategies as part of an overall risk management program leading to more effective anti-insider threat mechanisms.

Enterprise Threat Modeling

This webinar will address Enterprise Threat Modeling from a broad policy and strategic level and then dive into the operational level where risk management has many components – taught by Charles Chen, the Director of Artificial Intelligence at U.S. Department of State.
Register Here

This virtual seminar will examine the concepts, techniques, and primary goals of threat modeling. The course will introduce the value of techniques and strategies within threat modeling and will complete an exercise to understand and implement a threat model based on the data and information collected. Threat models and techniques that will be introduced include: understanding the goals and strategic perspective in using threat models on an Enterprise System, a basic conceptual understanding of cybersecurity and data protection, a general understanding of the impact of data compromise from a statecraft and/or global perspective, and the primary goals of threat modeling.

International Law Governing Cyber Operations

This session is rich with information regarding what is legal when conducting cyber operations and distinguishes between legal and morally correct.– taught by Ethan Burger, a Washington D.C.- based international attorney and educator with a background in cybersecurity, transnational financial crime, and Russian legal matters.

Register Here

This virtual seminar on "Introduction to the International Law Governing Cyber Operations" will address the international law appropriate to the evolving frontier of offensive cyber capabilities. In particular, the course is designed with an emphasis on Russian cyber activity and subsequent U.S. policy debates and responses. As the course progresses, students will be challenged and grapple with defining standards for the behavior of states in cyberspace that is in line with international law. Subsequently, students will examine tension areas in U.S.-Russian relations and learn how cyber capabilities affect interstate issues, both old and new.

Technology Underpinning Cyber Intelligence

Technology Underpinning Cyber-Intelligence will begin by introducing the main principles of cryptography to initially build a solid foundation. – Charles Chen is the Director of Artificial Intelligence at U.S. Department of State.

Register Here

Slowly we will progress to develop some of the major technical pillars that rest on this foundation, including; financial technology, Big Data, Machine Learning and later diving deeply into digital currencies and digital ledgers, computer viruses, Malware and automation. Finally, we will tie all this knowledge into a heuristic overview of the cyber-intelligence industry and the major public and private players and how they collaboratively work together to form a defensive and in some cases offensive capabilities. 

May 15, 2024

Cyber Strategy Development

Plan for the intersection of cyberspace, intelligence, strategy, planning, and applications –  taught by Joe Billingsley, Founder of the Military Cyber Professionals Association (MCPA)

Register Here

The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence. Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.

December 1, 2021

Enterprise Threat Modeling

This webinar will address Enterprise Threat Modeling from a broad policy and strategic level and then dive into the operational level where risk management has many components – taught by Charles Chen, the Director of Artificial Intelligence at U.S. Department of State

Register Here

This virtual seminar will examine the concepts, techniques, and primary goals of threat modeling. The course will introduce the value of techniques and strategies within threat modeling and will complete an exercise to understand and implement a threat model based on the data and information collected. Threat models and techniques that will be introduced include: understanding the goals and strategic perspective in using threat models on an Enterprise System, a basic conceptual understanding of cybersecurity and data protection, a general understanding of the impact of data compromise from a statecraft and/or global perspective, and the primary goals of threat modeling.

June 17, 2020

Register Here

June 24, 2020

Introduction to the International Law Governing Cyber Operations

Explore the International Legal Constraints on Cyber Operations, taught by Ethan Burger, international legal consultant and educator

Introduction to the International Law Governing Cyber Operations will address the international law appropriate to the evolving frontier of offensive cyber capabilities. In particular, the course is designed with an emphasis on Russian cyber activity and subsequent U.S. policy debates and responses. As the course progresses, students will be challenged and grapple with defining standards for the behavior of states in cyberspace that is in line with international law. Subsequently, students will examine tension areas in U.S.-Russian relations and learn how cyber capabilities affect interstate issues, both old and new.

Register Here

July 1, 2020, 4:30

Cyber Intelligence and Statecraft

Step away from the stove-piped approaches of specific federal agencies and analyze international incidents which impact our national securityCyber Intelligence and Statecraft – taught by Sana Saleh, Director with the Department of Homeland Security

Cyber Intelligence and Statecraft steps away from the stove-piped approaches of specific federal agencies and provides a versatile toolkit for analyzing international incidents (both real-time incidents and potential future attacks) which impact our national security. The course addresses seminal works which drive current and future policy, discusses gaps in international law and agreements, and explores how the dearth of a common lexicon for engaging and speaking about global incidents is tantamount to a barrier for businesses, decision-makers, policy leaders, organization leads, media, and those service members and civilians on the daily front lines of both government and private industry cyber threat response and management.

Register Here

October 22, 2020

Cyber Intelligence and State Craft

Real world examples and discussion surrounding how cyber intelligence and statecraft are vital to the nation’s security. –  taught by Sana Saleh, a Director with the Department of Homeland Security

This virtual seminar steps away from the stove-piped approaches of specific federal agencies and provides a versatile toolkit for analyzing international incidents (both real-time incidents and potential future attacks) which impact our national security. The course addresses seminal works which drive current and future policy, discusses gaps in international law and agreements, and explores how the dearth of a common lexicon for engaging and speaking about global incidents is tantamount to a barrier for businesses, decision-makers, policy leaders, organization leads, media, and those service members and civilians on the daily front lines of both government and private industry cyber threat response and management.

Register Here

November 4, 2020

Register Here

April 7, 2021

April 21, 2021

Technology Underpinning Cyber Intelligence

This webinar is a heuristic overview of the cyber intelligence industry, its major public and private players, and how they collaboratively work together to form a defensive and, in some cases, offensive capabilities. – taught by Charles Chen, the Director of Artificial Intelligence at U.S. Department of State

The Cyber Intelligence Professional webinar develops the foundation of knowledge and competency across several disciplines in cyber intelligence that are necessary for success in this field. This interdisciplinary program addresses the knowledge, skills and competencies essential to for today's Cyber Intelligence Professional.

Registration link coming soon.

May 5, 2021

Cyber Strategy Development

Plan for the intersection of cyberspace, intelligence, strategy, planning, and applications –  taught by Joe Billingsley, Founder of the Military Cyber Professionals Association (MCPA)

Cyber Strategy Development begins by introducing students to various concepts and methods associated with strategy and plan development, as well as cyberspace, intelligence, and cyber intelligence. Through complementary study, interaction, and practice, students will then gain an understanding of the intersection between cyberspace, intelligence, strategy, planning, and application across diverse environments. The course culminates with each student producing a cyber strategy for an organization of their choosing. The strategy document serves as the final paper, and the strategy presentation (including Q&A) serves as the final exam.

Registration link coming soon.

May 19, 2021

Cyber Terrorism

Learn about Cyber Terrorism based on thorough knowledge of both practitioners and scholars of the subject matter – Instructor TBA

The primary purpose of this program is to be able to effectively provide national security and cyber intelligence professionals with a better understanding of cyber terrorism by compiling and extracting sound knowledge from scholars of the subject in an effort to analyze an appropriate, comprehensive definition of cyber terrorism. The webinar addresses motive, means, and opportunity as it applies to the use of cyber to cause terror and undermine national security. The program will also cover collections and cyber tactics, techniques, and procedures (TTPs) used by cyber terrorists, where bits and bytes could cause loss of life and destruction of critical infrastructure. 

Registration link coming soon.

June 2, 2021

November 29, 2023

Cyber Intelligence and Statecraft

The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence.  Larry Dietz has over 30 years of diversified military and commercial information and cyber security experience. 

Register Here

Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence. Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.

*Only U.S. citizens will be admitted to this event, and only after each has registered online in advance of the event beginning.

June 16, 2021

Cyber Intelligence and State Craft

Real world examples and discussion surrounding how cyber intelligence and statecraft are vital to the nation’s security. –  taught by Sana Saleh, a Director with the Department of Homeland Security

This virtual seminar steps away from the stove-piped approaches of specific federal agencies and provides a versatile toolkit for analyzing international incidents (both real-time incidents and potential future attacks) which impact our national security. The course addresses seminal works which drive current and future policy, discusses gaps in international law and agreements, and explores how the dearth of a common lexicon for engaging and speaking about global incidents is tantamount to a barrier for businesses, decision-makers, policy leaders, organization leads, media, and those service members and civilians on the daily front lines of both government and private industry cyber threat response and management.

Registration link coming soon.

June 30, 2021

Artificial Intelligence

Discussion of computer systems able to perform tasks that normally require human intelligence, and practical examples of how this technology is used. - taught by Fritz Barth who currently supports the Undersecretary of Defense for Intelligence in the management of defense intelligence priorities.

This virtual seminar will provide a fundamental understanding of how artificial intelligence and cyber tools will affect the global battlefield in the years to come. The seminar will begin by exploring the current status of artificial intelligence technology, the published cyber capabilities of international actors, and the current United States cyber strategy. Then the seminar will take a look at the projected abilities of artificial intelligence and its implications for warfare, based on released statements by both the private sector and government actors.

Registration link coming soon

July 14, 2021

Enterprise Threat Modeling

This webinar will address Enterprise Threat Modeling from a broad policy and strategic level and then dive into the operational level where risk management has many components – taught by Charles Chen, the Director of Artificial Intelligence at U.S. Department of State

This virtual seminar will examine the concepts, techniques, and primary goals of threat modeling. The course will introduce the value of techniques and strategies within threat modeling and will complete an exercise to understand and implement a threat model based on the data and information collected. Threat models and techniques that will be introduced include: understanding the goals and strategic perspective in using threat models on an Enterprise System, a basic conceptual understanding of cybersecurity and data protection, a general understanding of the impact of data compromise from a statecraft and/or global perspective, and the primary goals of threat modeling.

Registration link coming soon.

October 7, 2020

Cyber Intelligence Professional

The webinar reviews the elements of cyber intelligence and how they are applied in the commercial and government space. The webinar develops an understanding of fundamentals and the integration of those fundamentals and the strategic, operational and tactical considerations required to implement a program. – taught by Charles Chen, the Director of Artificial Intelligence at U.S. Department of State

Technology Underpinning Cyber Intelligence will begin by introducing the main principles of cryptography and data security. Next you will learn about distributed ledgers, cryptocurrencies and reverse engineering. We will discuss what enables a country to become a cyber leader and have the capability for state sponsored terrorism, cyber conflict and cyber warfare. Learn about the Cloud and IoT (the Internet of Things) and why this improves an adversary’s opportunities to cause trouble. Finally, what can be done to mitigate this increased risk.

Register Here

January 13, 2021

Artificial Intelligence

Discussion of computer systems able to perform tasks that normally require human intelligence, and practical examples of how this technology is used. - taught by Fritz Barth who currently supports the Undersecretary of Defense for Intelligence in the management of defense intelligence priorities.

Register Here

This virtual seminar will provide a fundamental understanding of how artificial intelligence and cyber tools will affect the global battlefield in the years to come. The seminar will begin by exploring the current status of artificial intelligence technology, the published cyber capabilities of international actors, and the current United States cyber strategy. Then the seminar will take a look at the projected abilities of artificial intelligence and its implications for warfare, based on released statements by both the private sector and government actors.

July 28, 2021

Technology Underpinning Cyber Intelligence

Technology Underpinning Cyber-Intelligence will begin by introducing the main principles of cryptography to initially build a solid foundation. – Charles Chen is the Director of Artificial Intelligence at U.S. Department of State.

Register Here

Slowly we will progress to develop some of the major technical pillars that rest on this foundation, including; financial technology, Big Data, Machine Learning and later diving deeply into digital currencies and digital ledgers, computer viruses, Malware and automation. Finally, we will tie all this knowledge into a heuristic overview of the cyber-intelligence industry and the major public and private players and how they collaboratively work together to form a defensive and in some cases offensive capabilities

October 26, 2022

Artificial Intelligence

Discussion of computer systems able to perform tasks that normally require human intelligence, and practical examples of how this technology is used. - taught by Fritz Barth who currently supports the Undersecretary of Defense for Intelligence in the management of defense intelligence priorities.

Register Here

This virtual seminar will provide a fundamental understanding of how artificial intelligence and cyber tools will affect the global battlefield in the years to come. The seminar will begin by exploring the current status of artificial intelligence technology, the published cyber capabilities of international actors, and the current United States cyber strategy. Then the seminar will take a look at the projected abilities of artificial intelligence and its implications for warfare, based on released statements by both the private sector and government actors.

April 19, 2023

Enterprise Threat Modeling

This webinar will address Enterprise Threat Modeling from a broad policy and strategic level and then dive into the operational level where risk management has many components – taught by Charles Chen, the Director of Artificial Intelligence at U.S. Department of State

Register Here

This virtual seminar will examine the concepts, techniques, and primary goals of threat modeling. The course will introduce the value of techniques and strategies within threat modeling and will complete an exercise to understand and implement a threat model based on the data and information collected. Threat models and techniques that will be introduced include: understanding the goals and strategic perspective in using threat models on an Enterprise System, a basic conceptual understanding of cybersecurity and data protection, a general understanding of the impact of data compromise from a statecraft and/or global perspective, and the primary goals of threat modeling.

April 10, 2024

Cyber Intelligence and Statecraft

The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence. –  taught by Larry Dietz who has over 30 years of diversified military and commercial information and cyber security experience. 
Register Here

Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence. Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.

*Only U.S. citizens will be admitted to this event, and only after each has registered online in advance of the event beginning.

April 26, 2023

Counterintelligence Cyber Technology

This webinar is an introduction to the Technology that supports Cyber-Intelligence, what makes up a solid cybersecurity foundation, and a heuristic overview of the cyber-intelligence industry. – Paul Davis has over 30 years of combined business and intelligence operations experience.
Register Here

The seminar will cover some of the major technical pillars that rest on this foundation, including financial technology, Big Data, and Machine Learning. The seminar will later dive deeply into digital currencies and digital ledgers, computer viruses, Malware, and automation. The seminar will tie all this knowledge into a heuristic overview of the cyber intelligence industry, its major public and private players, and how they collaboratively work together to form defensive and, in some cases, offensive capabilities.

May 11, 2022

Cyber Terrorism

Learn about Cyber Terrorism based on thorough knowledge of both practitioners and scholars of the subject matter – taught by Paul M. Davis is Vice President of Government Business Development at SecureDAM and Founder and President of JANUS Think.

Register Here

The primary purpose of this program is to be able to effectively provide national security and cyber intelligence professionals with a better understanding of cyber terrorism by compiling and extracting sound knowledge from scholars of the subject in an effort to analyze an appropriate, comprehensive definition of cyber terrorism. The webinar addresses motive, means, and opportunity as it applies to the use of cyber to cause terror and undermine national security. The program will also cover collections and cyber tactics, techniques, and procedures (TTPs) used by cyber terrorists, where bits and bytes could cause loss of life and destruction of critical infrastructure.

May 3, 2023

Virtual Skills Analysis

Develop analytic skills in accordance with the standards and practices currently in use in the intelligence community – taught by Brian Lane, a Subject Matter Expert (SME) with more than fifteen years of experience in the maritime and intelligence communities.

Register Here

Vital Skills Analysis (VSA) introduces students to the skills required to conduct all-source cyber intelligence analysis, with emphasis on predictive techniques. It begins by introducing students to the basic principles of intelligence analysis, and then how those principles are applied using practical assignments. Students will select open-source cyber topics, research the information, and learn to write assessments. Through this methodology, students will apply the skills learned, gain experience writing one-page assessments, quick briefing of senior leaders, and defending their work. VSA serves as a common foundation for developing analytic skills in accordance with the standards and practices currently in use in the intelligence community.

May 10, 2023

International Law Governing Cyber Operations

This session is rich with information regarding what is legal when conducting cyber operations and distinguishes between legal and morally correct.– taught by Ethan Burger, a Washington D.C.- based international attorney and educator with a background in cybersecurity, transnational financial crime, and Russian legal matters.

Register Here

This virtual seminar on "Introduction to the International Law Governing Cyber Operations" will address the international law appropriate to the evolving frontier of offensive cyber capabilities. In particular, the course is designed with an emphasis on Russian cyber activity and subsequent U.S. policy debates and responses. As the course progresses, students will be challenged and grapple with defining standards for the behavior of states in cyberspace that is in line with international law. Subsequently, students will examine tension areas in U.S.-Russian relations and learn how cyber capabilities affect interstate issues, both old and new.

May 24, 2023

Cyber Critical Infrastructure

Explore the human and technological components for an infrastructure that will support an organization’s mission.
Register Here

Learn the components of a successful cyber security program from a people, process, and technology perspective. Focusing on people, the student will learn how to address cyber security challenges from a business/mission perspective. The student will learn how to work with technical and business teams to address critical cyber hygiene issues. When addressing process, the student will learn how to develop policies, procedures, guidelines, and standards that are effective and support their organization’s mission.

June 7, 2023

Cyber Intelligence Overview

Be exposed to current intelligence and counterintelligence methods as well as current and emerging technologies – taught by Paul Davis; with over 30 years of combined business and Intelligence operations, Paul is the owner of JANUSThink, a consulting firm

Register Here

The Cyber intelligence Overview presents the acquisition and analysis of information to identify, track, and predict cyber capabilities, intentions, and activities. Learn how to add value to the information and to present actionable courses of action to the decision-maker. Understand the traditional intelligence tradecraft and how it is used in the cyber world to assess cyber threats, for intelligence analysis, and for counterintelligence. Learn about different types of cyber threat actors: state, non-state, and rogue actors. Get exposure to future innovations that are changing the cyber intelligence landscape.

June 14, 2023

Cyber Strategy Development

Plan for the intersection of cyberspace, intelligence, strategy, planning, and applications –  taught by Joe Billingsley, Founder of the Military Cyber Professionals Association (MCPA).
Register Here

The Cyber Intelligence Initiative (CII) Cyber Strategy Development (CSD) seminar provides students with a broad exposure to concepts and practices in the fields of strategy, planning, cyberspace, and intelligence. Students will examine, evaluate, and discuss existing cyber strategies and learn how to craft their own.

June 21, 2023

Cyber Intelligence Professional

The webinar reviews the elements of cyber intelligence and how they are applied in the commercial and government space. The webinar develops an understanding of fundamentals and the integration of those fundamentals and the strategic, operational and tactical considerations required to implement a program. – taught by Charles Chen, the Director of Artificial Intelligence at U.S. Department of State.
Register Here

Technology Underpinning Cyber Intelligence will begin by introducing the main principles of cryptography and data security. Next you will learn about distributed ledgers, cryptocurrencies and reverse engineering. We will discuss what enables a country to become a cyber leader and have the capability for state sponsored terrorism, cyber conflict and cyber warfare. Learn about the Cloud and IoT (the Internet of Things) and why this improves an adversary’s opportunities to cause trouble. Finally, what can be done to mitigate this increased risk.

August 16, 2023

Technology Underpinning Cyber Intelligence

Technology Underpinning Cyber-Intelligence will begin by introducing the main principles of cryptography to initially build a solid foundation. – Charles Chen is the Director of Artificial Intelligence at U.S. Department of State.

Register Here

Slowly we will progress to develop some of the major technical pillars that rest on this foundation, including; financial technology, Big Data, Machine Learning and later diving deeply into digital currencies and digital ledgers, computer viruses, Malware and automation. Finally, we will tie all this knowledge into a heuristic overview of the cyber-intelligence industry and the major public and private players and how they collaboratively work together to form a defensive and in some cases offensive capabilities

September 20, 2023

Cyber Intelligence Professional

The Cyber Intelligence Professional webinar develops the foundation of knowledge and competency across several disciplines in cyber intelligence that are necessary for success in this field.  – taught by Charles Chen is the Director of Artificial Intelligence at U.S. Department of State.

Register Here

The webinar reviews the elements of cyber intelligence and how they are applied in the commercial and government space. The webinar develops an understanding of fundamentals and the integration of those fundamentals and the strategic, operational and tactical considerations required to implement a program. This interdisciplinary program addresses the knowledge, skills and competencies essential to for today’s Cyber Intelligence Professional.

December 6, 2023

Cyber Critical Infrastructure

Explore the human and technological components for an infrastructure that will support an organization’s mission – taught by Roman Etebar
Register Here

Learn the components of a successful cyber security program from a people, process, and technology perspective. Focusing on people, the student will learn how to address cyber security challenges from a business/mission perspective. The student will learn how to work with technical and business teams to address critical cyber hygiene issues. When addressing process, the student will learn how to develop policies, procedures, guidelines, and standards that are effective and support their organization’s mission.

January 9, 2024

Insider Threat

Learn about identification, indicators, motives, methodologies and most importantly mitigation techniques designed to establish a proactive defensive posture - taught by Chris Kay
Register Here

Designed for the non-technical professional, this webinar is a basic review of cybersecurity issues pertinent to the study of insider threats. Learn about the various types of insider threats prevalent today – including state and non-state actors, as well as their motivations and methodologies (both technical and increasingly non-technical). See the policies and legal framework within which insider threat prevention and mitigation must operate. Explore the development of effective multi-disciplinary mitigation strategies as part of an overall risk management program leading to more effective anti-insider threat mechanisms.

January 31, 2024

Cyber Intelligence Overview

The Cyber intelligence Overview presents the acquisition and analysis of information to identify, track, and predict cyber capabilities, intentions, and activities. – taught by Paul M. Davis is Vice President of Government Business Development at SecureDAM and Founder and President of JANUS Think.

Register Here

Learn how to add value to the information and to present courses of action, that can be acted upon, to the decision-maker. Understand the traditional intelligence tradecraft and how it is used in the cyber world to assess cyber threats, for intelligence analysis, and for counterintelligence. Learn about different types of cyber threat actors: state, non-state, and rogue actors. Get exposure to future innovations that are changing the cyber intelligence landscape.

February 6, 2024

Cyber Ethics

With technology playing a significant role in business, it is crucial to understand the ethical implications of the tools being used every day.  Featuring: Tommy Gardner, HP’s Chief Technology Officer for HP Federal, spanning the US Federal Agencies, Higher Education, K-12 Education, State, and Local government customer segments, as well as Federal Systems Integrators.
Register Here

With technology playing a significant role in business, it is crucial to understand the ethical implications of the tools being used every day. This seminar will help you to anticipate and identify ethical and legal issues and apply appropriate ethical reasoning. By using case studies and real-world examples, you will establish an ethical decision-making framework that can be adapted to your organizational context and applied in your day-to-day work.

 

Cyber Critical Infrastructure

Explore the human and technological components for an infrastructure that will support an organization’s mission - taught by Roman Etebar.
Register Here

Learn the components of a successful cyber security program from a people, process, and technology perspective. Focusing on people, the student will learn how to address cyber security challenges from a business/mission perspective. The student will learn how to work with technical and business teams to address critical cyber hygiene issues. When addressing process, the student will learn how to develop policies, procedures, guidelines, and standards that are effective and support their organization’s mission.

May 1, 2024

Cyber Terrorism

Learn about Cyber Terrorism based on thorough knowledge of both practitioners and scholars of the subject matter – taught by Paul M. Davis, Vice President of Government Business Development at SecureDAM and Founder and President of JANUS Think.
Register Here

The primary purpose of this program is to be able to effectively provide national security and cyber intelligence professionals with a better understanding of cyber terrorism by compiling and extracting sound knowledge from scholars of the subject in an effort to analyze an appropriate, comprehensive definition of cyber terrorism. The webinar addresses motive, means, and opportunity as it applies to the use of cyber to cause terror and undermine national security. The program will also cover collections and cyber tactics, techniques, and procedures (TTPs) used by cyber terrorists, where bits and bytes could cause loss of life and destruction of critical infrastructure. 

Protect your business and earn your Certification in Cyber Intelligence

2024 Cyber Intelligence Virtual Seminar Series
Read Seminar Descriptions

NEW in 2024: all seminars are offered on your schedule! Check which seminar(s) interest you in the form below and we will work with you to schedule a good time for you to meet with the instructor and take the seminar!

Would you like more information?

"*" indicates required fields

Your Name*
Which Cyber Intelligence Seminar Interests You?
Check all that apply
This field is for validation purposes and should be left unchanged.