Home  |  About Us   |   Be Our Speaker  |  Terms & Conditions  |  Connect With Us
Executive Education
Clariden Leadership Institute
Cyber Threat Intelligence Masterclass: Analyzing Evolving Threats and Countermeasures (NZ)
Chuck Easttom
Chuck Easttom Consulting
Chuck Easttom, Chuck Easttom Consulting

Chuck Easttom is a computer scientist, inventor, consultant, and author with over 25 years of professional experience in the IT industry. He holds the position of Chair of the Board of Information Security and Computer Forensics for the American College of Forensic Examiners as well as a Diplomat of the American College of Forensic Examiners. Chuck has been accredited with more than 40 professional industry certifications including prominent computer security certifications such as CISSP, ISSAP, CHFI, and CEH. In addition to his many certifications he is also a Microsoft Certified Trainer and EC Council certified instructor.


Chuck has authored more than 20 computer science and computer security books and articles. Several of his books are used as textbooks at universities all over the world, including graduate programs, and have been translated into multiple languages. Besides that, he has created 7 patented inventions on tools and methods within the IT industry. These achievements have earned him the Who’s Who in Science and Technology and Who’s Who in Education titles.


Throughout his professional career, he has had more than 15 years of teaching and training experience, and over 12 years in litigation support and expert witness work including testimony at trials, depositions, and hearings. He travels around the world teaching computer security and speaking on security-related topics for a wide range of audiences, including law enforcement officers, corporate organizations, and a variety of government agencies from around the world. He also speaks at numerous security and hacking conferences, including ISC2 Security Congress, SecureWorld, Hacker Halted, DefCon, Hakon Africa, Harvard Computer Society, and others.

Program Summary

This comprehensive 2-day Cyber Threat Intelligence: Analyzing Evolving Threats and Countermeasures Masterclass is designed for cyber security leaders to delve into Cyber Threat Intelligence and leverage this knowledge to harness their organization’s cyber security platform. Led by Chuck who has authored more than 20 computer security books and invented 7 patent invention, you will discover how to leverage Cyber Threat Intelligence to counter evolving cyber threats and incorporate it into your incident response process.


This interactive session will show you how to investigate the latest evolving cyber threats, and stay at the forefront of evolving cyber threat developments to possess the know-how to mitigate cyber risks in the future. Coupled with Cyber-attacks analysis, you will also learn how to analyze and categorize different types of cyber-attacks to grasp future solutions in response to such cyber-attacks.


In addition, learn proven Intelligence Analysis Techniques and effectively apply them to your organization's cyber threats countermeasures. You will also learn how to incorporate Cyber Threat Intelligence information to optimize your organization’s incident response plan.


Through hands-on exercises, case studies and interactive group discussion, Chuck will challenge and stretch your thoughts constructively throughout the program. At the end of the day, he will teach you how to analyze and attribute evolving cyber threats, generate Cyber Threat Intelligence to countermeasure cyber threats and incorporate it into your incident response plan to harness your organization’s cyber defense framework.

Programs, dates and locations are subject to change. In accordance with Clariden Global policy, we do not discriminate against any person on the basis of race, color, sex, religion, age, national or disability in admission to our programs.


In today’s cyber security landscape, many different cyber threats have been evolving within and beyond organizations and it is near impossible to prevent all cyber-attacks and security breaches. This issue is exacerbated with organizations moving rapidly towards digital transformation, with the vast amount of data proving to be a double-edged sword, providing both insights to decision makers and opportunities for threat actors. Therefore, it is absolutely essential to develop Cyber Threat Intelligence to analyze the changing environment and mitigate these risks from cyber-attacks.


Based on a study on Cyber Threat Intelligence by SANS, 75% of cyber security professionals indicated that Cyber Threat Intelligence is essential and should be embedded into an organization's detection and incident response systems. This highly interactive 2-day “Cyber Threat Intelligence Masterclass: Analyzing Evolving Threats and Countermeasures” program will equip IT security leaders with these very insights into leveraging the guidance of Cyber Threat Intelligence, and incorporating it in your organization’s incident response system, creating a solid firewall to future cyber threats.


Guided by Chuck Easttom, who has authored more than 20 computer security books and invented 7 patent invention, you will gain in-depth knowledge in leveraging Cyber Threat Intelligence in exploring the latest evolving cyber threats through threat analysis, and incorporate Cyber Threat Intelligence information into your incident response plan. Through proven best practices and interactive group discussions, this program will give you hands-on knowledge in investigating latest cyber threats and guide to enhance your IT disaster recovery.


Explore proper methods to conduct Cyber Threat Intelligence Gathering and Cyber Threat Intelligence Analysis to assist cyber security professionals to make critical and strategic business decisions. At the end of the day, you will be able to establish and incorporate the acquired Cyber Threat Intelligence into your incident response plans successfully. Furthermore, you will be equipped with various methods and tools for Cyber Threat Intelligence Projects, allowing you to adopt the best fit and adapt them to your organization’s business objective and position for tangible results.

What You Can Expect

  • GAIN INSIGHTS on solutions to investigate the latest evolving cyber threats
  • GENERATE Cyber Threat Intelligence to detect, respond and counter cyber threats
  • ANALYZE and attribute cyber-attacks to stay ahead of an IT disaster
  • INCORPORATE Cyber Threat Intelligence information into your incident response plan
  • EMPLOY and apply proven Intelligence analysis techniques to cyber threats
  • LEVERAGE hands-on tools in Cyber Threat Intelligence to your cyber defense

Who Will Benefit Most

This program is designed for, but not limited to, mid to senior level professionals who are involved in cyber security management and practice, including security administrators, network administrators, and IT management who strive to harness their organization’s cyber security system through the benefit of cyber threat intelligence to defend their networks, proprietary data and organizations.

Program Outline

08:30 - 18:00 / 3 April 2017

Day 1


Cyber Threat Intelligence Comprehensive Insight

  • Intelligence Lexicon and Definitions
  • Defining threats
  • Cyber tradecraft
  • Tactical vs Strategic Intel
  • Threat Modelling
  • Diamond model


Cyber Threat Intelligence Gathering

  • IOC (Indicators of Compromise)
  • The Kill Chain and Intrusion Analysis
  • Event Recording and Incident Sharing (VERIS)
  • Validation
  • Attribution


Insights of Types of Cyber Threats

  • Economically motivated actors
  • Nation-state sponsored actors
  1. Cyber warfare
  2. Cyber espionage
  3. Cyber terrorism
  • Hactivism
  • Other actors


Strengths and Limitations of Threat Intelligence

  • How to conduct Cyber Threat Intelligence Gathering
  • How to conduct Cyber Threat Intelligence Analysis
  • The use of Open Source Intelligence (OSING)



08:30 - 18:00 / 4 April 2017

Day 2


Methods and Tools for Cyber Threat Intelligence Projects

  • Cybox
  • Maltego
  • OpenIOC


More tools and methods

  • YARA
  • TLP (Traffic Light Protocol)
  • TAXII (Trusted Automated eXchange of Indicator Information)


Leveraging Cyber Threat Intelligence into Incident Response

  • Incorporating intelligence into incident response
  1. IDS
  2. SEIM
  3. IR Reports
  • The role of forensics in incident response
  • Malware analysis and cyber threat intelligence
  • Zero Day Exploits


Cyber Threat Intelligence Common Mistakes

  • Failure to use the correct method or tool
  • Failure to confirm
  • Inaccurate attribution

CFOs Leadership :
Experience Clariden
Discover how our leadership program has shaped the perspectives of CFOs across Asia
Venue: Stamford Plaza, Auckland
Date: 3 - 4 April 2017
Faculty: Chuck Easttom
Early Bird 1: NZ$2,695 (by 13 February 2017)
Early Bird 2: NZ$2,895 (by 13 March 2017)
Regular Fee: NZ$2,995
Group Discount: 2nd participant get 10%, or register 3 participants and 4th participant get a complimentary seat
(1 discount scheme applies)
Contact: zachariah@claridenglobal.org
More Programs
M&A for Board of Directors (CND)
- Thomas Kessler
Financial Modelling for Financial Analysis, Forecasting and Budgeting in Excel (Switzerland)
- Alan Brooke
FATCA and CRS Compliance and Reporting (UK)
- Eugene O'Connell
Developing Influential Presentation and Public Speaking for Directors and Senior Management (HK)
- Deborah Torres Patel
Advanced Predictive Analytics (Sydney)
- Richard Boire
View All Programs >
Home | About Us | Be Our Speaker | Press Release | Terms & Conditions | Connect With Us
Copyright © 2011 Clariden Global, all rights reserved.