Pen-To-Paper and The Finished Report: The Key To Generating Threat Intelligence - CTI SUMMIT 2017
Knowing When to Consume Intelligence and When to Generate It - CTI SUMMIT 2017
Threat Intel for Everyone: Writing Like A Journalist To Produce Clear, Concise Reports
How to Use and Create Threat Intelligence in an Office 365 World - SANS CTI Summit 2019
Hack the Reader: Writing Effective Threat Reports with Lenny Zeltser - SANS CTI Summit
Cyber Threat Intelligence Report | September 2022 | Payatu
Analyzing Chinese Information Operations with Threat Intelligence
Using Intelligence to Heighten your Defense - CTI SUMMIT 2017
Are You Ready for Threat Intelligence: Behind the Scenes with FOR578
The Threat Intel Victory Garden: Threat Intelligence Using Open Source Tools - CTI SUMMIT 2017
Inglorious Threat Intelligence - SANS CTI Summit 2017
Why and How to Take the GCTI The Industry’s Cyber Threat Intelligence Certification
Cyber Threat Intelligence - Reports
Intelligence Analysis Skills: An Example of the Analysis of Competing Hypotheses Method
Bottom Line Up Front (B.L.U.F.) Formula - Mastering Mindset with Dr. Mat
2017 CTI Summit Highlight - Using CTI Against the World's Most Successful Email Scam
Legal Implications of Threat Intelligence Sharing - SANS CTI Summit 2018
From One Sec Guy to the Team that Saved the CISO’s Day | Threat Hunting & Incident Response Summit
Certified Threat Intelligence Analyst
Determining the Fit & Impact of CTI Indicators on Your Monitoring Pipeline - SANS CTI Summit 2018