SlideShare una empresa de Scribd logo
1 de 20
Corporate Security Intelligence Just got Smarter Security Intelligence = Intelligent Security
Who Are We? The DICSE course is a joint venture between Security & Intelligence Solutions Ltd and Sibylline Intelligence Solutions. Stephen Phelps CPP MSyI is the owner and founder of Security & Intelligence Solutions Ltd.  He specialises in security intelligence with particular strengths in analysis and reporting, systems integration, solution design and capacity building.  With more than 30 years experience in both the government and private sectors, he currently focuses on Africa, maritime security and oil and gas. He has direct operational experience in designing, developing and managing intelligence in a range of challenging security environments in 20 countries spanning 4 continents and is an established conference speaker on West African maritime security.   Justin Crump is CEO of Sibylline Ltd, a specialist intelligence consultancy.  Formerly he was Director of Threat Intelligence at Stirling Assynt.  His experience has been gained from corporate finance, management consultancy, seventeen years in the British Army (mostly as a specialist reconnaissance officer) and roles in support of the security services.  He has worked in over thirty countries and is an expert on global jihadism, with regular exposure in the media, including a dedicated role with al-Jazeera.  He is also a regular conference speaker and trainer
What Do We Offer? Intelligence Management Training The Developing Intelligence in the Corporate Security Environment Course This course is unique in the training environment.   It allows managers to develop and exploit a capability that will generate significant improvements in delivery of security threat and risk mitigation.   It achieves this through promoting the concepts of Early Warning of threats and Intelligence-led solution design and delivery in a cost-effective manner which is compliantwith all relevant regulation, policy and standards Intelligence Practitioner    Training      The cutting edge Analysis Mechanics Course and the associated Intelligence Report Writers Course These courses are designed to be complementary to the DICSE course. They focus on the operators who deliver intelligence capability to the business. They are aimed at improving the delivery of both analysis and products in support of the business decision maker. They are built around more than 50 years of cumulative experience across military, government agency and commercial sector activity
Our Training Philosophy Interactive Learning Pre- Course reading Pre-Course exercise Audio visual delivery mode Responsive instruction Discussion sessions Modular delivery Confirmation exercises Fireside session with guest speaker (UK Only) Bespoke content (In-house courses only) Support to Delegates Extensive Course Manual Memory stick with relevant opens source documents Invitation to join DICSE Alumni group on Linkedin Continuous learning through the Alumni Group Option of post course consultancy support to clients
Our Intelligence Philosophy Add Value Generate intelligence that is timely, concise and relevant Focus on loss prevention and reduction (Mitigation) Support loss recovery (Investigation) Deliver a Return on Investment (Loss Prevention / Reduction) Demonstrate value for money Support Operations Reduce uncertainty by generating Situational Understanding Provide intelligence that will drive the risk mitigation strategy Inform solution design and delivery Notify the business of changes in the operating environment
Intelligence Management Training Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltdand is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.
The DICSE Course Who Should Attend? Course Modules Concepts of Intelligence  Intelligence Architecture, Organising and Positioning Direction and the Management Interface  Intelligence Function in the Business  Intelligence Support to Corporate Decision Makers Risk Analysis and Crisis Management  Collection Management & Intelligence Sources  Collation, Assessing / Grading Information  Databases and Processing Tools Principles, Processes and Psychology of Analysis  Dissemination Principles and Report Writing  Operational Management – The legal dimension (RIPA, Corporate, national and VPSHR)  Operational Management – OPSEC and Intelligence Liaison  Exercises  This programme is intended for security managers or security operators and advisors in a range of industry sectors which face significant threats from adversarial elements. It is designed to deliver capability enhancement and understanding of the advantages to be gained by using high-grade intelligence relating to threats to the People, Assets, Operations and Reputation of a company.  Using realistic scenarios drawn from experience gained in the corporate environment, the course will impart understanding of the value and effective employment of a security intelligence capability in the routine execution of business operations and corporate decision making.  Participants will benefit from having a thorough understanding of the full range of security threats facing business and also an insight into the manner in which security supports enterprise wide decision making. Pre Course materials will be provided.
Course Content Concepts and principles of Intelligence; What is Intelligence, Definitions, the Aim of Intelligence, The Development of Intelligence, The Data Intelligence Transition, Why Have Intelligence, Who Needs Intelligence, What Can Intelligence Deliver, What Intelligence Cannot Deliver, Factors, Constraints and Principles, Intelligence in a Hostile Security Operating Environment, The Intelligence Cycle.  Intelligence Architecture; Positioning the Intelligence Team in the Business, Lines of Authority and Reporting Chains, Doctrine, Standard Operating Procedures, Reporting Vehicles, Technological Infrastructure, The Human Element.  Direction and the Management Interface; Management Input - Direction, Resourcing, Intelligence Requirements, Requests for Information, The Intelligence Appreciation  The Intelligence Function in the Business; Mission Statements, Executive Decision Making, Intelligence Products, Corporate Constraints,  Intelligence Support to Corporate Decision Makers Risk Analysis and Crisis Management: Generation of Early Warning, The value of Intelligence to Security Managers, Support to Operational Decision Makers, The interface with Corporate Social Responsibility, Support to Corporate Communications Strategies,  Collection Management and Intelligence Sources; Information Requirements Management, Formulating the Collection Plan, Sources – Human Sources, Open Sources, Technical Sources, Corporate Data.  Collation, Assessing and Grading of Information; Data formats, Recording Principles, Data Management Tools, Data Entry Principles, Grading the Reliability and quality of the Information, Circular Reporting, Corroboration  Databases; Types of Databases, Spreadsheets, Relational Databases, Links and Relationships, Data Accuracy and Integrity  Principles, Processes and Psychology of Analysis; Cognitive Processes, Evaluation, Grading, Comparison, Integration, Synthesis, Generation of Hypotheses, Inference Development, The Importance of Challenging Hypotheses and Objectivity, Judgement, Experience, Group Think.  Dissemination Principles and Report Writing; Reporting Vehicles and Formats, Visualisation Platforms, Style, Content, Classifications, Sanitisation, Customer Portals and Dashboards, Layered Delivery  Operational Management – The Legal Dimension; VPSHR and Intelligence Operations, RIPA and Regulatory Environment, Corporate Constraints, The Host Nation and Espionage, Data Protection and Privacy Laws  Operational Management – OpSec and Intelligence Liaison; Responsibility of Managers and Recipients, Dissemination Management, Control Strategies & Auditing of delivery / Receipt, Briefing Customers, Intelligence Liaison Outside the Corporate Environment.  Exercises; Information Gathering, Extraction of Essential Elements of Information, Grading, Analysis, Report Writing and Briefing Preparation
Intelligence AnalysisTraining Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltdand is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.
The Analysis Mechanics Course Who Should Attend? Course Modules What is Analysis? Where does Analysis Fit into the Intelligence Cycle? Structured Analytical techniques  Unstructured Analytical Techniques  Developing and Testing Hypotheses  Scenario Generation Making Sense of Results – Presentation Options Exercises  This programme is intended for security intelligence operators who have direct responsibilityfor managing diverse and multiple sources of information in support of the security function.  It is suitable for operators from a range of industry sectors which face significant threats from adversarial elements. The course is designed to deliver capability enhancement in the field of activity associated with analysing and fusing all-source material that arrives in diverse formats.  The course will generate a capability enhancement for both new and more established analysts.   The course will draw on both real world examples of material and fictional information in order to illustrate and practice the principles studied on the course.
Course Content What is Analysis?; Why do analysis, What do we analyse, Sources of Information, What does analysis deliver, Who needs analysis, When should we do analysis, Who should do analysis (functional roles), What equipment and resources do we need.  Where Does analysis fit into the Intelligence Cycle; Tasking, collection management, Collation, reporting and product generation, responsiveness, feedback.  Structured Analytical Techniques; Taxonomies, Decomposition, Link Analysis Pattern analysis, Trend Analysis, Anticipation analysis, Probability Analysis, Anomaly Analysis, Cultural analysis, Semiotics analysis, Aggregation analysis, Statistical Analysis, Recomposition, Visualisation, Synthesis, Selection of structured techniques,  Unstructured Analytical Techniques; Fusion, Learning, Objective Reasoning, Logic, Judgement, Assumption, Probability, Separating fact from fiction, Creative thinking, Hypotheses Testing, Variables, Quantitative / Qualitative research, Variation Analysis  Developing and Testing of Hypotheses:  Brainstorming, Identifying Cause and Effect, Critical Thinking, Challenge Analysis, Force Field  analysis, Analysis of competing hypotheses Scenario Generation;  Making Sense of Results: Mind mapping, Concept mapping, Mental mapping, Semantic networks, Topic mapping, Spider diagrams, Swot analysis, PESTEL, Fishbone analysis, Pattern analysis (Temporal, Spatial and behavioural) Masking Analysis Useful - Visualisation and Dissemination; Graphs, Tables, Diagrams, Maps, Brevity, Relevance, Credibility, Comprehensiveness Enabling Analysis:  Selecting and Training Analysts, Skills and Qualities of an Analyst, Traps to avoid
Intelligence Report WritingSkills Development Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltdand is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.
The Report Preparation Course Who Should Attend? Course Modules What is an Intelligence Report? Formats Channels and Vehicles Structure and content Big 6  Drafting Rules – Syntax and Style Relevance and Clarity  Sanitisation and Security Getting the Recipient to Read the Product Layered Delivery Getting Feedback and Product Development Exercises  This programme is intended for security intelligence operators who have direct responsibilityfor generating a range of reports using various formats and vehicles.  It is suitable for operators from a range of industry sectors which face significant threats from adversarial elements. The course is designed to deliver capability enhancement in the field of activity associated with drafting and disseminating intelligence products to corporate decision makers.  The course will generate a capability enhancement for both new and more established analysis that will ensure incisive and accurate reporting of intelligence to the right customer at the right time The course will draw on both real world examples and fictional information in order to illustrate and practice the principles studied on the course.
Course Content What is an Intelligence Report:  Definitions, end user requirements, impact Formats, Channels and Vehicles:  Audio, Video, Hard Copy, Electronic Copy, Web-based delivery Structure and content:  Headers, Serial Number, Date, Title, Executive Summary, Details, Comments, Assessment, Recommendations Big 6: Who, What, Where, When, Why, How Drafting Rules – Syntax and Style:  Date formats, location names, personality names, grammar, sentence structure, paragraphs, size and readability Relevance and Clarity:  Business relevance, Impact on Operations, Justification of report, Cost effectiveness, Back-up reporting Sanitisation and Security; Source Protection, Corporate reputation, Operational Priorities Getting the Recipient to Read the Product:  Visual impact, message impact, reading time demands Layered Delivery; Optimisation of use, multiple version release Getting Feedback and Product Development Exercises
Networked Information Elicitation Training Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltd and is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.
The Networked Information Elicitation CourseWho Should Attend Course Modules   Debriefing and Elicitation, Networking and Assessment,  Case Development, Case Management,  Operational Foundation,  Basic Operational Tradecraft, Advanced Operational Tradecraft,  Surveillance Awareness and Detection,  Situation Awareness This programme is intended for persons in the Corporate Security function and Community Liaison Officers who have regular or occasional interaction with persons who might have information useful to the company. The course is delivered by a strategic partner and is designed to generate a capability enhancement in the business in order to enable information gathering and exploitation in a manner that will enhance the security risk mitigation and stakeholder engagement strategies in the business. The course is based on best practice developed over several decades of operating in hostile and harsh environments. The course has been previously run extremely successfully in a major West African country for a global extractive industry major.   Courses can be designed from 1 day to 12 weeks in duration and bespoke to the client operating environment.
Course Content Debriefing and Elicitation;   Systematic extraction of information from a willing subject in order to answer specific Information Requirements (IRs), Active Listening, Questioning Techniques and Strategies, Non Verbal Communications (Body Language)  Recording of information, Preparation and dissemination of reports and Case Documentation.   Networking and Assessment;  Detailed analysis of Motivation, Access, Point of Contact and Capability, Identification of potential Human Sources, Persuading them to provide information of potential intelligence interest, How to deal with ‘Information Volunteers’. Case Development;  How to develop the Source Case over time, Ensuring the full potential of every Source to answer Intelligence Requirements is achieved, Focussing on the long term potential rather than just the short term. Case Management;  Management oversight of the Case - Operational Security, Case Security, Finance, Welfare, Training, Exploitation of the information, Provision of clear direction to the Handlers. Operational Foundation;   Application of debriefing skills in an operational environment, Dealing with Official/Liaison Contacts, Concealment of the collection activity within routine activity,  Planning and executing a discreet reconnaissance meeting.    Basic Operational Tradecraft;  Tactics required to minimise risk associated with meeting and debriefing Sources (primarily in a relatively benign environment). Advanced Operational Tradecraft;  Builds on the previous module,  Encompasses the more complex tradecraft required to facilitate the conduct of discreet/covert Networked Information Elicitation operations in operational environments where either the physical or hostile intelligence threat is particularly high.   Surveillance Awareness and Detection;  Theoretical and practical surveillance training, Understanding the Surveillance Cycle,  Tactics employed by a surveillance team.   How can surveillance be defeated,  Correct application of Anti or Counter Surveillance drills.   Situation Awareness;   Operations in hostile physical environments, Personal risk assessment, defensive driving, residence security, vehicle search and operational risk assessment.  It can also include theatre specific, scenario based situation awareness training if required
Operating Principles Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltd and is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.
How We Operate Flexibility:  S & I Solutions and Sybilline can offer the above courses in a number of modes including: Open Courses with multiple companies attending In House Training for individual clients Through ARC Training International in UK Through ARC Training International’s regional partners Whatever your needs we will find a way to meet them. Bespoke Service:  If you opt for an in-house delivery, we will deliver training which includes scenarios and exercises that are specific to your company Discretion:  We will respect and protect the fact that your company is a recipient of these training courses.    The relationship between our companies and their respective partners will remain known only to the relevant parties. Integrity:  Our delivery and materials will be of the highest standard and will meet all required legislation.
For Further Information Contact: S & I Solutions Ltd Sibylline Ltd 72 New Bond St,  Mayfair,  London, W1S 1RR www.sibylline.co.uk   Telephone: +44(0)203 411 0697	 Mobile: +44 (0)7766 330 615	             Skype: Justincrump Email:  Justin.crump@sibylline.co.uk Delandale House,  37 Old Dover Road,  Canterbury, CT1 3JF Telephone: +44(0)1227 740695	 Mobile: +44 (0)7841 432516	             Skype: Steve.Phelps52 Email:  stephen.phelps@sisolutions.co.uk Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltd and is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.

Más contenido relacionado

La actualidad más candente

Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Shawn Tuma
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyFidelis Cybersecurity
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations♟Sergej Epp
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Resilient Systems
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Bloxx
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesGreenway Health
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanningVladimir Jirasek
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 

La actualidad más candente (20)

Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 

Similar a Corporate Security Intelligence Just Got Smarter All Courses Linkedin

IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
HLM Associates Brochure 2016
HLM Associates Brochure 2016HLM Associates Brochure 2016
HLM Associates Brochure 2016Michael Laverdure
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14Jock ANDRE
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityCyber Security Experts
 
Cyber Eleven flyer
Cyber Eleven flyerCyber Eleven flyer
Cyber Eleven flyerTimmy Chou
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Mahindra Special Services Group - Services
Mahindra Special Services Group - ServicesMahindra Special Services Group - Services
Mahindra Special Services Group - Servicesguestf29a63
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadsavassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersMighty Guides, Inc.
 
QI Security Framework_v2007_7
QI Security Framework_v2007_7QI Security Framework_v2007_7
QI Security Framework_v2007_7Hong Sin Kwek
 
Proofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpProofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpClaudia Toscano
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfkelyn Technology
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxinfosec train
 

Similar a Corporate Security Intelligence Just Got Smarter All Courses Linkedin (20)

IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
HLM Associates Brochure 2016
HLM Associates Brochure 2016HLM Associates Brochure 2016
HLM Associates Brochure 2016
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
PB CV v0.4
PB CV v0.4PB CV v0.4
PB CV v0.4
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
 
Cyber Eleven flyer
Cyber Eleven flyerCyber Eleven flyer
Cyber Eleven flyer
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Mahindra Special Services Group - Services
Mahindra Special Services Group - ServicesMahindra Special Services Group - Services
Mahindra Special Services Group - Services
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
 
QI Security Framework_v2007_7
QI Security Framework_v2007_7QI Security Framework_v2007_7
QI Security Framework_v2007_7
 
Proofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpProofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write Up
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdf
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 

Corporate Security Intelligence Just Got Smarter All Courses Linkedin

  • 1. Corporate Security Intelligence Just got Smarter Security Intelligence = Intelligent Security
  • 2. Who Are We? The DICSE course is a joint venture between Security & Intelligence Solutions Ltd and Sibylline Intelligence Solutions. Stephen Phelps CPP MSyI is the owner and founder of Security & Intelligence Solutions Ltd. He specialises in security intelligence with particular strengths in analysis and reporting, systems integration, solution design and capacity building. With more than 30 years experience in both the government and private sectors, he currently focuses on Africa, maritime security and oil and gas. He has direct operational experience in designing, developing and managing intelligence in a range of challenging security environments in 20 countries spanning 4 continents and is an established conference speaker on West African maritime security. Justin Crump is CEO of Sibylline Ltd, a specialist intelligence consultancy. Formerly he was Director of Threat Intelligence at Stirling Assynt. His experience has been gained from corporate finance, management consultancy, seventeen years in the British Army (mostly as a specialist reconnaissance officer) and roles in support of the security services. He has worked in over thirty countries and is an expert on global jihadism, with regular exposure in the media, including a dedicated role with al-Jazeera. He is also a regular conference speaker and trainer
  • 3. What Do We Offer? Intelligence Management Training The Developing Intelligence in the Corporate Security Environment Course This course is unique in the training environment. It allows managers to develop and exploit a capability that will generate significant improvements in delivery of security threat and risk mitigation. It achieves this through promoting the concepts of Early Warning of threats and Intelligence-led solution design and delivery in a cost-effective manner which is compliantwith all relevant regulation, policy and standards Intelligence Practitioner Training The cutting edge Analysis Mechanics Course and the associated Intelligence Report Writers Course These courses are designed to be complementary to the DICSE course. They focus on the operators who deliver intelligence capability to the business. They are aimed at improving the delivery of both analysis and products in support of the business decision maker. They are built around more than 50 years of cumulative experience across military, government agency and commercial sector activity
  • 4. Our Training Philosophy Interactive Learning Pre- Course reading Pre-Course exercise Audio visual delivery mode Responsive instruction Discussion sessions Modular delivery Confirmation exercises Fireside session with guest speaker (UK Only) Bespoke content (In-house courses only) Support to Delegates Extensive Course Manual Memory stick with relevant opens source documents Invitation to join DICSE Alumni group on Linkedin Continuous learning through the Alumni Group Option of post course consultancy support to clients
  • 5. Our Intelligence Philosophy Add Value Generate intelligence that is timely, concise and relevant Focus on loss prevention and reduction (Mitigation) Support loss recovery (Investigation) Deliver a Return on Investment (Loss Prevention / Reduction) Demonstrate value for money Support Operations Reduce uncertainty by generating Situational Understanding Provide intelligence that will drive the risk mitigation strategy Inform solution design and delivery Notify the business of changes in the operating environment
  • 6. Intelligence Management Training Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltdand is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.
  • 7. The DICSE Course Who Should Attend? Course Modules Concepts of Intelligence Intelligence Architecture, Organising and Positioning Direction and the Management Interface Intelligence Function in the Business Intelligence Support to Corporate Decision Makers Risk Analysis and Crisis Management Collection Management & Intelligence Sources Collation, Assessing / Grading Information Databases and Processing Tools Principles, Processes and Psychology of Analysis Dissemination Principles and Report Writing Operational Management – The legal dimension (RIPA, Corporate, national and VPSHR) Operational Management – OPSEC and Intelligence Liaison Exercises This programme is intended for security managers or security operators and advisors in a range of industry sectors which face significant threats from adversarial elements. It is designed to deliver capability enhancement and understanding of the advantages to be gained by using high-grade intelligence relating to threats to the People, Assets, Operations and Reputation of a company. Using realistic scenarios drawn from experience gained in the corporate environment, the course will impart understanding of the value and effective employment of a security intelligence capability in the routine execution of business operations and corporate decision making. Participants will benefit from having a thorough understanding of the full range of security threats facing business and also an insight into the manner in which security supports enterprise wide decision making. Pre Course materials will be provided.
  • 8. Course Content Concepts and principles of Intelligence; What is Intelligence, Definitions, the Aim of Intelligence, The Development of Intelligence, The Data Intelligence Transition, Why Have Intelligence, Who Needs Intelligence, What Can Intelligence Deliver, What Intelligence Cannot Deliver, Factors, Constraints and Principles, Intelligence in a Hostile Security Operating Environment, The Intelligence Cycle. Intelligence Architecture; Positioning the Intelligence Team in the Business, Lines of Authority and Reporting Chains, Doctrine, Standard Operating Procedures, Reporting Vehicles, Technological Infrastructure, The Human Element. Direction and the Management Interface; Management Input - Direction, Resourcing, Intelligence Requirements, Requests for Information, The Intelligence Appreciation The Intelligence Function in the Business; Mission Statements, Executive Decision Making, Intelligence Products, Corporate Constraints, Intelligence Support to Corporate Decision Makers Risk Analysis and Crisis Management: Generation of Early Warning, The value of Intelligence to Security Managers, Support to Operational Decision Makers, The interface with Corporate Social Responsibility, Support to Corporate Communications Strategies, Collection Management and Intelligence Sources; Information Requirements Management, Formulating the Collection Plan, Sources – Human Sources, Open Sources, Technical Sources, Corporate Data. Collation, Assessing and Grading of Information; Data formats, Recording Principles, Data Management Tools, Data Entry Principles, Grading the Reliability and quality of the Information, Circular Reporting, Corroboration Databases; Types of Databases, Spreadsheets, Relational Databases, Links and Relationships, Data Accuracy and Integrity Principles, Processes and Psychology of Analysis; Cognitive Processes, Evaluation, Grading, Comparison, Integration, Synthesis, Generation of Hypotheses, Inference Development, The Importance of Challenging Hypotheses and Objectivity, Judgement, Experience, Group Think. Dissemination Principles and Report Writing; Reporting Vehicles and Formats, Visualisation Platforms, Style, Content, Classifications, Sanitisation, Customer Portals and Dashboards, Layered Delivery Operational Management – The Legal Dimension; VPSHR and Intelligence Operations, RIPA and Regulatory Environment, Corporate Constraints, The Host Nation and Espionage, Data Protection and Privacy Laws Operational Management – OpSec and Intelligence Liaison; Responsibility of Managers and Recipients, Dissemination Management, Control Strategies & Auditing of delivery / Receipt, Briefing Customers, Intelligence Liaison Outside the Corporate Environment. Exercises; Information Gathering, Extraction of Essential Elements of Information, Grading, Analysis, Report Writing and Briefing Preparation
  • 9. Intelligence AnalysisTraining Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltdand is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.
  • 10. The Analysis Mechanics Course Who Should Attend? Course Modules What is Analysis? Where does Analysis Fit into the Intelligence Cycle? Structured Analytical techniques Unstructured Analytical Techniques Developing and Testing Hypotheses Scenario Generation Making Sense of Results – Presentation Options Exercises This programme is intended for security intelligence operators who have direct responsibilityfor managing diverse and multiple sources of information in support of the security function. It is suitable for operators from a range of industry sectors which face significant threats from adversarial elements. The course is designed to deliver capability enhancement in the field of activity associated with analysing and fusing all-source material that arrives in diverse formats. The course will generate a capability enhancement for both new and more established analysts. The course will draw on both real world examples of material and fictional information in order to illustrate and practice the principles studied on the course.
  • 11. Course Content What is Analysis?; Why do analysis, What do we analyse, Sources of Information, What does analysis deliver, Who needs analysis, When should we do analysis, Who should do analysis (functional roles), What equipment and resources do we need. Where Does analysis fit into the Intelligence Cycle; Tasking, collection management, Collation, reporting and product generation, responsiveness, feedback. Structured Analytical Techniques; Taxonomies, Decomposition, Link Analysis Pattern analysis, Trend Analysis, Anticipation analysis, Probability Analysis, Anomaly Analysis, Cultural analysis, Semiotics analysis, Aggregation analysis, Statistical Analysis, Recomposition, Visualisation, Synthesis, Selection of structured techniques, Unstructured Analytical Techniques; Fusion, Learning, Objective Reasoning, Logic, Judgement, Assumption, Probability, Separating fact from fiction, Creative thinking, Hypotheses Testing, Variables, Quantitative / Qualitative research, Variation Analysis Developing and Testing of Hypotheses: Brainstorming, Identifying Cause and Effect, Critical Thinking, Challenge Analysis, Force Field analysis, Analysis of competing hypotheses Scenario Generation; Making Sense of Results: Mind mapping, Concept mapping, Mental mapping, Semantic networks, Topic mapping, Spider diagrams, Swot analysis, PESTEL, Fishbone analysis, Pattern analysis (Temporal, Spatial and behavioural) Masking Analysis Useful - Visualisation and Dissemination; Graphs, Tables, Diagrams, Maps, Brevity, Relevance, Credibility, Comprehensiveness Enabling Analysis: Selecting and Training Analysts, Skills and Qualities of an Analyst, Traps to avoid
  • 12. Intelligence Report WritingSkills Development Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltdand is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.
  • 13. The Report Preparation Course Who Should Attend? Course Modules What is an Intelligence Report? Formats Channels and Vehicles Structure and content Big 6 Drafting Rules – Syntax and Style Relevance and Clarity Sanitisation and Security Getting the Recipient to Read the Product Layered Delivery Getting Feedback and Product Development Exercises This programme is intended for security intelligence operators who have direct responsibilityfor generating a range of reports using various formats and vehicles. It is suitable for operators from a range of industry sectors which face significant threats from adversarial elements. The course is designed to deliver capability enhancement in the field of activity associated with drafting and disseminating intelligence products to corporate decision makers. The course will generate a capability enhancement for both new and more established analysis that will ensure incisive and accurate reporting of intelligence to the right customer at the right time The course will draw on both real world examples and fictional information in order to illustrate and practice the principles studied on the course.
  • 14. Course Content What is an Intelligence Report: Definitions, end user requirements, impact Formats, Channels and Vehicles: Audio, Video, Hard Copy, Electronic Copy, Web-based delivery Structure and content: Headers, Serial Number, Date, Title, Executive Summary, Details, Comments, Assessment, Recommendations Big 6: Who, What, Where, When, Why, How Drafting Rules – Syntax and Style: Date formats, location names, personality names, grammar, sentence structure, paragraphs, size and readability Relevance and Clarity: Business relevance, Impact on Operations, Justification of report, Cost effectiveness, Back-up reporting Sanitisation and Security; Source Protection, Corporate reputation, Operational Priorities Getting the Recipient to Read the Product: Visual impact, message impact, reading time demands Layered Delivery; Optimisation of use, multiple version release Getting Feedback and Product Development Exercises
  • 15. Networked Information Elicitation Training Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltd and is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.
  • 16. The Networked Information Elicitation CourseWho Should Attend Course Modules   Debriefing and Elicitation, Networking and Assessment, Case Development, Case Management, Operational Foundation, Basic Operational Tradecraft, Advanced Operational Tradecraft, Surveillance Awareness and Detection, Situation Awareness This programme is intended for persons in the Corporate Security function and Community Liaison Officers who have regular or occasional interaction with persons who might have information useful to the company. The course is delivered by a strategic partner and is designed to generate a capability enhancement in the business in order to enable information gathering and exploitation in a manner that will enhance the security risk mitigation and stakeholder engagement strategies in the business. The course is based on best practice developed over several decades of operating in hostile and harsh environments. The course has been previously run extremely successfully in a major West African country for a global extractive industry major. Courses can be designed from 1 day to 12 weeks in duration and bespoke to the client operating environment.
  • 17. Course Content Debriefing and Elicitation; Systematic extraction of information from a willing subject in order to answer specific Information Requirements (IRs), Active Listening, Questioning Techniques and Strategies, Non Verbal Communications (Body Language) Recording of information, Preparation and dissemination of reports and Case Documentation. Networking and Assessment; Detailed analysis of Motivation, Access, Point of Contact and Capability, Identification of potential Human Sources, Persuading them to provide information of potential intelligence interest, How to deal with ‘Information Volunteers’. Case Development; How to develop the Source Case over time, Ensuring the full potential of every Source to answer Intelligence Requirements is achieved, Focussing on the long term potential rather than just the short term. Case Management; Management oversight of the Case - Operational Security, Case Security, Finance, Welfare, Training, Exploitation of the information, Provision of clear direction to the Handlers. Operational Foundation; Application of debriefing skills in an operational environment, Dealing with Official/Liaison Contacts, Concealment of the collection activity within routine activity, Planning and executing a discreet reconnaissance meeting. Basic Operational Tradecraft; Tactics required to minimise risk associated with meeting and debriefing Sources (primarily in a relatively benign environment). Advanced Operational Tradecraft; Builds on the previous module, Encompasses the more complex tradecraft required to facilitate the conduct of discreet/covert Networked Information Elicitation operations in operational environments where either the physical or hostile intelligence threat is particularly high. Surveillance Awareness and Detection; Theoretical and practical surveillance training, Understanding the Surveillance Cycle, Tactics employed by a surveillance team. How can surveillance be defeated, Correct application of Anti or Counter Surveillance drills. Situation Awareness; Operations in hostile physical environments, Personal risk assessment, defensive driving, residence security, vehicle search and operational risk assessment. It can also include theatre specific, scenario based situation awareness training if required
  • 18. Operating Principles Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltd and is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.
  • 19. How We Operate Flexibility: S & I Solutions and Sybilline can offer the above courses in a number of modes including: Open Courses with multiple companies attending In House Training for individual clients Through ARC Training International in UK Through ARC Training International’s regional partners Whatever your needs we will find a way to meet them. Bespoke Service: If you opt for an in-house delivery, we will deliver training which includes scenarios and exercises that are specific to your company Discretion: We will respect and protect the fact that your company is a recipient of these training courses. The relationship between our companies and their respective partners will remain known only to the relevant parties. Integrity: Our delivery and materials will be of the highest standard and will meet all required legislation.
  • 20. For Further Information Contact: S & I Solutions Ltd Sibylline Ltd 72 New Bond St, Mayfair, London, W1S 1RR www.sibylline.co.uk   Telephone: +44(0)203 411 0697 Mobile: +44 (0)7766 330 615 Skype: Justincrump Email: Justin.crump@sibylline.co.uk Delandale House, 37 Old Dover Road, Canterbury, CT1 3JF Telephone: +44(0)1227 740695 Mobile: +44 (0)7841 432516 Skype: Steve.Phelps52 Email: stephen.phelps@sisolutions.co.uk Intellectual Property Rights, Copyright Notice and Terms of Use All rights reserved. This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltd and is for limited use by the recipient and staff of the recipient company only. The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited. This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.