エピソード

  • From CTI Analyst to SANS Co-Author: Building a very active sharing community - Interview with Will T (S1E5)
    2025/11/26

    In this conversation, Freddy and Will delve into the world of Cyber Threat Intelligence (CTI) and sharing communities, exploring of Will T, the journey of a cybersecurity professional, the importance of training and community, the challenges faced in threat reporting, and the impact of AI on the field.

    They discuss the evolution of CTI, the necessity for critical thinking, and the ethical considerations surrounding the use of AI in intelligence work. The conversation emphasizes the need for collaboration and knowledge sharing within the cybersecurity community to enhance overall effectiveness against cyber threats.


    Takeaways

    • The importance of foundational knowledge in cybersecurity.
    • Real-world experience is crucial for developing analytical skills.
    • Training can significantly enhance an analyst's capabilities.
    • Community support is vital for sharing knowledge and resources.
    • AI can assist in summarizing and analyzing data but has limitations.
    • Ethical considerations are paramount when using AI in intelligence.
    • Critical thinking is essential in evaluating threat reports.
    • Transparency in threat reporting builds trust with stakeholders.
    • Continuous learning and adaptation are necessary in cybersecurity.
    • Collaboration within the community can lead to better threat mitigation.


    Resources & References Mentioned

    • Rob M. Lee - https://www.dragos.com/team/robert-m-lee/
    • SANS FOR578: https://www.sans.org/cyber-security-courses/cyber-threat-intelligence/
    • SANS FOR589: https://www.sans.org/cyber-security-courses/cybercrime-investigations/
    • Chainalysis Blockchain Intelligence: https://www.chainalysis.com/blockchain-intelligence/
    • SANS blog post on Admiralty Scale https://www.sans.org/blog/enhance-your-cyber-threat-intelligence-with-the-admiralty-system/
    • Oracle incident - https://www.csoonline.com/article/3953644/oracle-quietly-admits-data-breach-days-after-lawsuit-accused-it-of-cover-up.html
    • Flavio Queiroz's LinkedIn post - https://www.linkedin.com/posts/flavioqueiroz_threathunting-threatdetection-threatanalysis-activity-7310254153732141056-b-Ba/
    • Council of Experts: https://blog.bushidotoken.net/2024/04/strengthening-proactive-cti-through.html
    • Will's Projects: https://github.com/BushidoUK#-my-projects
    • Ransomware Tool Matrix: https://github.com/BushidoUK/Ransomware-Tool-Matrix
    • Curated Intelligence: https://www.curatedintel.org/
    • MITRE ATT&CK: https://attack.mitre.org/
    • Diamond Model of Intrusion Analysis: https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf?adlt=strict
    • Mapping TTPs: https://github.com/BushidoUK/MITRE-Mappings
    • Curated Intel website - https://www.curatedintel.org/
    • Microsoft Security Copilot: https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot


    Chapters

    00:00 Introduction to Cyber Threat Intelligence

    02:48 Career Journey in Cybersecurity

    06:08 Understanding Cyber Threat Intelligence

    09:06 The Role of Training in Cyber Intelligence

    11:57 Teaching and Sharing Knowledge in Cybersecurity

    15:08 The Importance of Community in Cyber Intelligence

    17:54 Challenges in Cyber Threat Reporting

    20:56 The Impact of AI on Cyber Threat Intelligence

    24:08 Future of AI in Cybersecurity

    26:47 Ethics and Challenges of AI in Intelligence

    29:57 Conclusion and Final Thoughts


    This conversation is a compressed edit of an interview Freddy has conducted as part of his PhD research. The interview happened on May 2nd, 2025 in Bournemouth, England.

    続きを読む 一部表示
    55 分
  • From the CIA to inspiring global intelligence communities - Interview with Kathy Pherson (S1E4)
    2025/11/26

    Step inside the real world of intelligence with Kathy Pherson, a pioneering CIA analyst whose career arc spans from a curious Kansas City upbringing to the highest levels of global intelligence. In this episode, Kathy reveals how she navigated the challenges of intelligence writing, honed her craft in security and Latin American analysis, and ultimately transformed the field with innovative structured analytic techniques.


    Listeners will hear her candid reflections on balancing data and practical countermeasures, adapting to the evolving demands of intelligence, and the crucial role of critical thinking in a world increasingly shaped by AI. Learn how Kathy’s work at the White House, her leadership of Pherson Associates, and her presidency at the International Association for Intelligence Education are shaping future intelligence professionals. With stories of teamwork, adaptation, and even a personal mission to fight rare diseases, this conversation promises to intrigue, inspire, and challenge your ideas about intelligence analysis, education, and the intersection with advanced technologies - Intelligence Tradecraft Podcast S1E4

    続きを読む 一部表示
    1 時間 46 分
  • From Cargo Theft to Cyber Threats: An Intelligence Journey - Interview with Scott Small (S1E3)
    2025/09/28

    In this conversation, Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber, shares his journey into the field of CTI, discussing his background, current responsibilities, and the importance of curiosity and empathy in intelligence analysis.

    He emphasizes the role of AI and open-source intelligence in enhancing threat detection and response, while also addressing the challenges of implementing threat-informed defense strategies. The discussion highlights stakeholder engagement, the value of writing in intelligence, and the need for continuous learning and networking within the cybersecurity community.


    Takeaways

    • Curiosity is essential for success in intelligence analysis.
    • Writing helps clarify thoughts and improve analytical skills.
    • AI is transforming the landscape of cybersecurity and threat intelligence.
    • Stakeholder engagement is crucial for effective intelligence sharing.
    • Open-source intelligence provides valuable insights for threat analysis.
    • Empathy allows analysts to understand diverse perspectives in intelligence.
    • Structured analytic techniques enhance the quality of intelligence analysis.
    • Networking within the cybersecurity community fosters collaboration and learning.
    • Trustworthy sources are vital for accurate intelligence gathering.
    • Incident-driven intelligence can lead to proactive security measures.


    Resources references mentioned

    • Tidal Cyber web site - https://www.tidalcyber.com/
    • What are TTPs - https://csrc.nist.gov/glossary/term/tactics_techniques_and_procedures
    • Cyber Kill Chain - https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
    • Unified Kill chain - https://www.unifiedkillchain.com/
    • my LinkedIn - https://www.linkedin.com/in/fmurre/
    • my GitHub - https://github.com/Errum/IntelArchitectureMap
    • Katie Nickels - CTI study plan 1 - https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a
    • Katie Nickels - CTI study plan 2 - https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36
    • Curated Intel CTI fundamentals - https://github.com/curated-intel/CTI-fundamentals
    • Intelligence Tradecraft Structured Analytic Techniques (SAT) training - https://inteltradecraft.com/sat-certifications
    • Workshop I teach at FIRST CTI - https://www.first.org/conference/firstcti25/program#pIntelligence-Collection-Planning-Workshop-How-to-Create-A-Plan-that-Synchronizes-Collection-with-Your-Stakeholders-Needs
    • NFCERT CTL - https://communication.nfcert.org/hubfs/CTL_Reports/2025%20TLP_CLEAR%20NFCERT%20Cyber%20Threat%20Landscape%20(CTL)%20Report%20v1.0.pdf


    Chapters

    00:00 Introduction to Cyber Threat Intelligence

    02:47 Scott Small's Background and Career Path

    06:10 Understanding Threat Informed Defense

    08:59 The Role of TTPs in Cybersecurity

    11:51 The Importance of Storytelling in Cyber Intelligence

    15:05 Challenges in Implementing Threat Informed Defense

    17:52 The Role of AI and Machine Learning in Cyber Intelligence

    21:01 Evaluating Open Source Intelligence (OSINT)

    23:56 Identifying Trustworthy Sources in Cyber Intelligence

    26:59 Lessons Learned from Mistakes in Cyber Intelligence

    29:44 Case Study: Analyzing the Akira Ransomware Group

    33:10 Future of Cyber Threat Intelligence

    38:06 Navigating the Landscape of Cyber Threat Intelligence

    43:37 The Path to Becoming a Cyber Intelligence Analyst

    46:08 The Importance of Writing in Cyber Intelligence

    49:31 Essential Skills for a Successful Analyst

    51:14 Structured Analytical Techniques in Cyber Intelligence

    54:30 Implementing Intelligence Tradecraft in Organizations

    58:02 Proactive vs. Reactive Intelligence

    01:01:33 The Role of AI in Cyber Threat Intelligence

    01:09:53 The Future of Automated Threats and Defenses

    01:15:15 The Value of Networking and Community in Cyber Intelligence

    This conversation is a compressed edit of an interview Freddy has conducted as part of his PhD research. The interview was recorded in April 23rd, 2025 during the FIRST CTI Conference in Berlin.

    続きを読む 一部表示
    1 時間 17 分
  • Storytelling, Stakeholders, and Communicating CTI to the Board - Interview with Gert-Jan Bruggink (S1E2)
    2025/09/28
    In this conversation, Freddy and Gert-Jan delve into the complexities of cybersecurity and cyber threat intelligence (CTI), exploring the importance of decision-making informed by intelligence, the challenges of training and development in the field, and the significance of metrics in demonstrating value. They discuss the evolving role of AI in cybersecurity, the necessity of critical thinking, and the importance of mentorship and community support for aspiring professionals.TakeawaysThe journey into cybersecurity often starts with hands-on experience rather than formal education.Understanding the implicit decision-making processes in CTI is crucial for effective intelligence work.Training and continuous learning are essential in cybersecurity.Metrics should focus on impact rather than just activities to demonstrate value to stakeholders.AI is transforming the landscape of intelligence, but critical thinking remains vital.Source assessment and information evaluation are key components of effective intelligence generation.The importance of storytelling in conveying intelligence to different stakeholders cannot be overstated.Building a community and supporting others in their journey is a fundamental aspect of professional growth.Recognizing influential figures in one's career can provide valuable insights and direction.The future of CTI will require adaptability and a focus on explicit decision-making processes.Resources and references mentionedThe APT 1 report - https://services.google.com/fh/files/misc/mandiant-apt1-report.pdfVenation - https://venation.digital/Gert-Jan speaking at the FIRST conference - https://youtu.be/2pSjbSx8J1Q?t=5202CTI-CMM web site - https://cti-cmm.org/SANS FOR578 - https://www.sans.org/cyber-security-courses/cyber-threat-intelligenceIntelligence ans Structured Analytic Techniques (SATs) training - https://inteltradecraft.com/sat-certificationsArno's LI profile - https://www.linkedin.com/in/reuser/Admiralty Scale SANS Blog post - https://www.sans.org/blog/enhance-your-cyber-threat-intelligence-with-the-admiralty-system/MISP Admiralty Scale - https://www.misp-project.org/taxonomies.html#_admiralty_scaleSANS talk on metrics - https://www.youtube.com/watch?v=-d38C3992aQGert Jan's Metric GitHub - https://github.com/gertjanbruggink/metricsMy SANS talk on measuring success of CTI programs - https://www.youtube.com/watch?v=5agsRg6-L4oChapters00:00 Introduction to Gert-Jan and the CTI Conference02:50 Gert-Jan's Journey in Cybersecurity05:51 The Role of Intelligence in Decision Making08:50 Training and Development in Cyber Threat Intelligence12:06 Consultancy and the Importance of Storytelling14:46 Generating and Consuming Intelligence17:37 The Distinction Between OSINT and OSINF20:49 Prioritization and Decision Making in Intelligence23:54 The Art of Failure and Learning26:55 Navigating the Intelligence Cycle29:53 Responding to Incidents and Public Perception35:38 Critical Thinking in Source Assessment39:48 Understanding Source Reliability43:04 The Role of AI in Intelligence51:31 Metrics and Measuring Impact01:06:02 Advice for Aspiring CTI Professionals01:11:49 Reflecting on Influential FiguresThis conversation is a compressed edit of an interview Freddy has conducted as part of his PhD research. The interview was recorded in April 21st, 2025 during the FIRST CTI Conference in Berlin.
    続きを読む 一部表示
    1 時間 14 分
  • Insights into Cyber Threat Intelligence: From Government to Private Sector - Interview with Garrett Carstens (S1E1)
    2025/09/28

    Join us in the first episode of our podcast where we interview Garrett Carstens in beautiful Berlin.

    Garrett shares his extensive experience in cyber threat intelligence, from his beginnings at the US Department of Defense to his current role as VP of Intel Operations at Intel 471.

    We delve into the transition from government to private sector, the importance of critical thinking in cyber intelligence, the evolution of threat intelligence, and how to effectively measure success in this field. Garrett also discusses the role of artificial intelligence and machine learning in cyber intelligence and provides practical advice for those looking to make a similar career transition.


    Resources and references mentioned:

    • Intel471 - https://www.intel471.com/
    • SANS blog - https://www.sans.org/blog/enhance-your-cyber-threat-intelligence-with-the-admiralty-system/
    • FIRST CTI Conference Agenda - https://www.first.org/conference/firstcti25/program
    • LinkedIn post on "what makes something intelligence?" - https://www.linkedin.com/posts/fmurre_in-your-opinion-when-does-something-go-from-activity-7181221399561203712-mV-m
    • The Intelligence Architecture Mind Map on GitHub - https://github.com/Errum/IntelArchitectureMap
    • SANS courses FOR578 CTI - https://www.sans.org/cyber-security-courses/cyber-threat-intelligence
    • FOR589 Cybercrime Investigations - https://www.sans.org/cyber-security-courses/cybercrime-investigations
    • Intel471 Handbook - https://www.intel471.com/resources/cyber-underground-handbook
    • GitHub Repo - https://github.com/intel471/CU-GIR


    This conversation is a compressed edit of an interview Freddy has conducted as part of his PhD research. The interview was recorded in April 21st, 2025 during the FIRST CTI Conference in Berlin

    続きを読む 一部表示
    54 分