2015 INSS: Intelligence & National Security Summit

Toward a Cyber Intelligence Certification Framework (Room Salon I)

Cyber threat intelligence can enable organizations to proactively identify, fingerprint, and prevent criminal and malicious nation state activity on their computer networks.  By using cyber threat intelligence, organizations can create the ability to “peer around the corner” and assess and predict adversary activity—all capabilities that are foundational to mitigating these threats.  In this session practitioners from industry, government and academia will explore methods for training and educating cyber professionals in this threat intelligence mindset and further develop requisite skillsets at scale. 

Focus Questions:

Can you identify and describe current and emerging education and career paths—including required levels of technical proficiency—that appear best suited for preparing professionals to enter the fields of cyber intelligence analysis and risk management? 

Should education and training institutions develop and use standardized course materials to ensure consistency in the credentialing of cyber intelligence professionals?  Does such a curriculum exist to your knowledge?  

If such a curriculum were developed or adopted, are there specific areas that the private sector should focus on in considering how to influence that development/adoption?

**Maintain Your DoD 8570.01-M Credentials

Attend designated Intelligence and National Security Summit sessions to help sustain your mandated certifications. Attendees may receive documentation for CompTIA CEUs and GIAC CPEs by attending qualified sessions. Event attendance may also satisfy other continuing education requirements. Please contact the appropriate oversight organization for determination. Some applicable organizations might include: National Contract Management Association (NCMA) and ISC2, Project Management Institute (PMI).