├── Andreas_Sfakianakis_FIRST_CTI_2019_v2.0.pdf └── README.md /Andreas_Sfakianakis_FIRST_CTI_2019_v2.0.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/sfakiana/FIRST-CTI-2019/2479b2d8afcdce1d785d40197cb548073a71817c/Andreas_Sfakianakis_FIRST_CTI_2019_v2.0.pdf -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # FIRST-CTI-2019 2 | References mentioned in FIRST CTI 2019 Symposium presentation "5 years of applied CTI discipline where should organisations put focus on?" 3 | 4 |
    5 |
  1. CTI Summit 2017 Keynote - Cliff Stoll - (Still) Stalking the Wily Hacker
  2. 6 |
  3. EclecticIQ - A Stakeholder-centric Approach to Building a Cyber Threat Intelligence (CTI) Practice
  4. 7 |
  5. SANS - 2019 CTI Survey
  6. 8 |
  7. US Military Joint Publication 2-0
  8. 9 |
  9. SANS CTI Summit 2018 - Michael Rea - I Can Haz Requirements?: Requirements and CTI Program Success
  10. 10 |
  11. Scott J. Roberts - CTI SquadGoals — Setting Requirements
  12. 11 |
  13. SANS (Brian P. Kime) - Threat Intelligence: Planning and Direction
  14. 12 |
  15. SANS (Pasquale Stirparo) - Defining Threat Intelligence Requirements
  16. 13 |
  17. FIRST CTI 2019 (Pasquale Stirparo) - Your Requirements are not my Requirements
  18. 14 |
  19. SANS CTI Summit 2018 - Intelligence Preparation of the Cyber Environment – Rob Dartnall
  20. 15 |
  21. CTI Summit 2017 - Christian Paredes - Pen-To-Paper and The Finished Report: The Key To Generating Threat Intelligence
  22. 16 |
  23. Intelligence Community Directive (ICD) 203 - Analytic Standards
  24. 17 |
  25. Recorded Future - How to Build a Cyber Threat Intelligence Team (and Why Technology Isn’t Enough)
  26. 18 |
  27. ENISA - Exploring the opportunities and limitations of current Threat Intelligence Platforms - Andreas Sfakianakis, Razvan Gavrila
  28. 19 |
  29. Virus Bulletin - Threat intelligence teams should consider recruiting journalists
  30. 20 |
  31. Chris Sanders - Effective Security Writing Training
  32. 21 |
  33. SANS SEC402 - The Secrets to Successful Cybersecurity Writing: Hack the Reader
  34. 22 |
  35. CIA - Analytic Thinking and Presenting for Intelligence Producers
  36. 23 |
  37. CIA - Compendium of Analytic Tradecraft Notes
  38. 24 |
  39. CIA - Style Manual and Writers' Guide for Intelligence Publications
  40. 25 |
  41. The Economist - Style Guide
  42. 26 |
  43. SANS CTI Summit 2019 - Analytic Tradecraft in the Real World - Amy R. Bejtlich
  44. 27 |
  45. Sergio Caltagirone - 15 Things Wrong with Today’s Threat Intelligence Reporting
  46. 28 |
  47. Lenny Zeltser - Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
  48. 29 |
  49. Martin Petersen - What I Learned in 40 Years of Doing Intelligence Analysis for US Foreign Policymakers
  50. 30 |
  51. INSA - Cyber Intelligence: Preparing Today’s Talent for Tomorrow’s Threats
  52. 31 |
  53. Carnegie Mellon SEI - Cyber Intelligence Workforce
  54. 32 |
  55. Sergio Caltagirone - 15 Knowledge Areas and Skills for Cyber Analysts and Operators
  56. 33 |
  57. EclecticIQ - On the Importance of Standard Operating Procedures in Threat Intelligence
  58. 34 |
  59. CIA - Making the Analytic Review Process Work
  60. 35 |
  61. CIA - Fifteen Axioms for Intelligence Analysts
  62. 36 |
  63. Jess Garcia - Lessons Learned from Teaching CTI All Over the World
  64. 37 |
  65. ComradeCookie - What is CTI and what makes a good CTI analyst?
  66. 38 |
  67. Richards J. Heuer - Psychology of Intelligence Analysis
  68. 39 |
  69. Richards J. Heuer - Structured Analytic Techniques for Intelligence Analysis
  70. 40 |
  71. Tali Sharot - The Influential Mind: What the Brain Reveals About Our Power to Change Others
  72. 41 | --------------------------------------------------------------------------------