All Episodes

Displaying 61 - 70 of 70 in total

Episode 61 — Measure intelligence impact with meaningful feedback

Measuring the true value of a threat intelligence program requires moving beyond vanity metrics, like the volume of reports produced, and focusing on the tangible impa...

Episode 62 — Share intelligence through trusted, auditable processes

Collaborative defense depends on the secure and auditable exchange of threat data with trusted partners, requiring a strict adherence to protocols that protect both th...

Episode 63 — Exchange intelligence using standards that travel

To achieve the speed and scale required for modern defense, intelligence must be exchanged using universal technical standards that allow disparate security tools to c...

Episode 64 — Handle sensitivities and caveats without friction

Managing the sensitivity of intelligence data is a non-negotiable professional requirement, necessitating the use of the Traffic Light Protocol (TLP) to ensure that ca...

Episode 65 — Close stakeholder feedback loops for iteration

The final stage of a mature intelligence lifecycle is the closing of the feedback loop, where stakeholder input is used to drive the continuous improvement and iterati...

Episode 66 — Deliver high-impact briefings under time pressure

The ultimate test of a senior intelligence professional is the ability to distill weeks of technical forensic work into a few moments of high-stakes communication. In ...

Episode 67 — Exam-day tactics to maximize your score

The transition from months of intense study to the actual day of the GCTI assessment requires a shift from learning mode to performance mode, where technical expertise...

Episode 68 — Essential terms: plain-language glossary for clarity

The mark of a senior analyst is the ability to translate specialized technical vocabulary into plain-language concepts that provide clarity for non-technical stakehold...

Episode 69 — Mega review: compress the course into mastery

We conclude our journey by reviewing the core principles of threat intelligence that ensure your long-term success as a defender of the enterprise. This mega review sy...

Welcome to the GIAC GCTI Audio Course

This course is designed to teach you how real-world threat intelligence actually works, from first signal to final decision. It focuses on turning raw technical data i...

Broadcast by