Starting your own CTI Program
Maintaining a Cyber Threat Intelligence (CTI) Program
Starting or maintaining a CTI program can be a daunting task in todays information age. This workshop will help walk you through starting your own CTI program, ensure you are asking the right questions, and make sure that you only take in the information you want and NEED. Come join us as we strive to make threat intelligence useful for you. In this workshop students will:
🦄 Learn about the Different Types of CTI
🦄 Get hands on Practicing Threat Modeling
🦄 Practice gathering information and writing a threat report for a fictitious organization.
📆When: 29 January 2025
🕐Time: 1-4 PM (ET)
Workshop Delivered By:
Trey Bilbrey
Lead Adversary Emulation Engineer at SCYTHE
Tyler Casey
Detection Engineer at SCYTHE
Trey Bilbrey
Lead Adversary Emulation Engineer at SCYTHE
Trey Bilbrey is a Lead Adversary Emulation Engineer at SCYTHE, specializing in Purple Team Exercises, Threat Emulation, Critical Infrastructure, and holistic cyber operations. Trey's 15 years of industry experience has allowed him to become an excellent educator, defender of networks, and a cultivator of cybersecurity professionals. Prior to joining SCYTHE, Trey held positions at notable organizations such as Hack The Box (HTB Academy content Developer), The Army Corps of Engineers (ICS/SCADA Penetration Testing), and a veteran of the United States Marine Corps ( Defensive and Offensive Cyber Operations). Current certifications include the CISSP, GICSP, GCIP, and K>FiveFour RTAC.
Tyler Casey
Detection Engineer at SCYTHE
Tyler Casey is a Detection Engineer at SCYTHE with nearly a decade of experience in Information Security, including nine years of service in the United States Marine Corps. As a Mission Element Lead for a Marine Corps Cyber Protection Team, he specialized in defending Department of Defense Information Networks (DODIN) across multiple government agencies internationally. Over the past four years, Tyler has focused on defensive cyber operations, including threat hunting, data analysis, SIEM utilization, and mentoring junior analysts. Holding certifications such as Security+, GCIH, GCFA, GRID, and CEH, as well as Cyber Mission Force pipeline training, Tyler brings a highly motivated and solutions-oriented approach to tackling complex cybersecurity challenges.