CIP 6 Point Plan

"Bridging the communication gap between technical cyber teams, intel analyst teams and executive decision makers should be a high-priority objective."  - Intelligence and National Security Alliance (INSA) White Paper 2015

OUR UNIQUE SOLUTION

“Cyber security is all too often thought of as an IT issue, rather than the strategic risk management issue that it actually is…”  NCSC-GCHQ

Cyber Intelligent Partner's (CIP) tailored workshops and seminars train professionals to think and act outside an IT-only cyber solution.

 

CIP’s unique programs focuses on 6 critical elements in our CIP 6-Point Plan©

CIP 6 point plan

 

CIP's unique Professional Education Platform (PEP) focuses on 6 critical elements in our CIP 6-Point Plan©:

 

 

1. CYBER IQ ASSESSMENT TOOL:

What is your Cyber IQ?  A proprietary Cyber Assessment Tool is given to each participant to fill out, allowing for an initial snapshot understanding of current skills, cyber plan, practices, procedures. This will become the foundation to build upon more effectively.

 

2. TRAINING WORKSHOPS:

CIP and Partner's present a tailored mix of cyber intelligence courses and concepts to upskill professionals and gain an integrated Tech Team-Intel Analyst Team-Decision Makers understanding and action plan.

 

3. "BRIDGE THE GAP":

How an organization’s Tech Teams-Intel Analyst Teams-Decision-Makers must work together to “Bridge the Gap” of understanding between the IT, Operational and Business perspectives of a cyber security action plan.

 

4. THREAT PROFILES:

Why is an organization a prime target to certain adversaries?  Understanding the Geopolitical realities of today will help identify Threat Actors.  We focus on the methods, motivations, and capabilities of likely adversaries.  Think like your adversaries, and anticipate, defend more effectively against future attacks. 

             

5. ANALYTICAL WAR GAME EXERCISES

A Cyber Intelligence war game simulation. A WDC proprietary software platform (AWG-C), presents an experiential training exercise incorporating the adversary methods and concepts an organization needs most.

 

6. CYBER CHANGE MANAGEMENT TOOL:

A “roadmap” including critical steps that enable executives and relevant employees to understand what actions are necessary to make and maintain desired changes, creating a lasting, more comprehensive, and effective cyber security program.

How can we train YOU?

Customize your Cyber Intelligence training, workshop or seminar by selecting from the list of courses we offer.

"Bridging the Gap” requires a more strategic and cross-functional approach among an organization’s three key groups: technical teams, intelligence analysts and decision makers.

Technical

Teams

intelligence

analysts

decision

makers

enhanced

communication

 
"Bridging the gap"
How can we train YOU?

Customize your Cyber Intelligence training, workshop or seminar by selecting from the list of courses we offer.

why is this important?

"Understanding WHY your organization was attacked is just as important, if not more important than knowing who attacked you and how." - Defense Intelligence Officer for Cyber, Defense Intelligence Agency (2015)

Understanding the key drivers motivating cyber threat actors is critical to identifying potential vulnerabilities, directing resources towards defending critical assets, and developing an effective cyber defense. 

 

A comprehensive security plan requires organizations to integrate their technical teams, intelligence analysts and decision makers to answer these fundamental questions:

© 2018 Cyber Intelligent Partners. All Rights Reserved.

1-202-792-8174
mwatson@cip-usa.com
1440 G Street NW
Washington, DC 20005

  • White LinkedIn Icon
  • White Facebook Icon
  • White Twitter Icon
  • White LinkedIn Icon
  • White Facebook Icon
  • White Twitter Icon