SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsDeveloping intelligence requirements is a recurring challenge often highlighted by the CTI community. Despite numerous great write-ups, discussions, and presentations on extracting and converting stakeholder needs into intelligence requirements, there is still plenty of room to explore practical ways of using requirements to evaluate and improve CTI lifecycles continuously.
One such method involves leveraging core concepts from the Diamond Model of Intrusion Analysis.
This presentation will examine and walk through how core principles from the Diamond Model can be integrated with cyber threat intelligence requirements. The overall goal is to demonstrate how Diamond Model-driven intelligence requirements enable CTI teams to continually assess and enhance the intelligence cycle, ultimately resulting in improved finished intelligence for stakeholders.
The audience can expect to learn how to practically layer their intelligence requirements with fundamental concepts from the Diamond Model of intrusion analysis. We will also break down how Diamond-model-driven intelligence requirements empower each phase of the intelligence lifecycle.


As the CTI lead for BlackRock, Sherman Chu focuses on applying threat-informed defense to empower security through systematic adversary analyses.
Read more about Sherman Chu













