Fwd: Friday's Debate: Attribution vs. Narrative in Information Operations
I don’t know why I’m receiving this or if it’s legit but the concepts could be meaningful. ---------- Forwarded message --------- From: Threat Intelligence Academy <hub@threatintel.academy> Date: Mon, Nov 27, 2023 at 08:01 Subject: Friday's Debate: Attribution vs. Narrative in Information Operations To: <0xloem@gmail.com> Charity Wright will debate the importance of attribution and narrative in information operations analysis and defense. FRIDAY! Charity Wright Attribution or Narrative? Which is more important? [image: 2023-12-01 Guest Lecture Charity Wright] <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3m9W6bcySg7db5bpW2f-znj2_4PsyW3mGVqR76NYjlW3m4gKm7r1CSbW5sGQXq1qxmstW8sJt7f1-gd09W4w9f0X89FXsmW9130zL4L68_8V4Y5H05bZZcVW3JncKf4dr6BvV6Nzfp378grjW91xX8M8plFhXW4zx9WZ2Y5TxJW8hLvrf1WNJbtW8rvMY062MK-WW82Kvfc2mTxNvW2pxrvr9bqD7HW9h7wk54Gp3YLW4nPf-n7wjgfZMHyfl44g5gcW1xYPVF5n7mWWVrqV0d7MXnsYW5Phxql7y5VZFW7Jbg5h8T8lJGf1kMwLb04> On Friday, December 1st, Threat Intelligence Academy will host Charity Wright, Principal Threat Intelligence Consultant at Recorded Future, in the Advanced Cyber Threat Seminar with a lecture and debate on attribution vs. narrative in combatting information operations. About The Debate We will discuss the challenges of attribution in influence operations analysis, especially those campaigns on social media platforms. What changes will we see in Influence Operations over the next 5 to 10 years? What technologies might become obsolete? What new technological threats will we face in the future that could impact influence operations and audiences specifically? Should we continue analyzing IO the way we do today? What can we do to prepare for and defend against future IO? About Charity Charity Wright is a Principal Threat Intelligence Consultant at Recorded Future. Charity has over 17 years of experience in the US intelligence community, including a career in the US Army and the National Security Agency (NSA), where she served as a Chinese Linguist (35P) and Intelligence Analyst (35N). She has analyzed cyber threats in the private sector since 2015, focusing on Chinese state-sponsored threats, cybercrime, malign influence operations, and strategic intelligence. Charity has consulted on espionage and intelligence topics on C-SPAN, Bloomberg, NBC, CBS, and many more media outlets worldwide. Find Charity on LinkedIn <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3pSW5qZNYm33xZX8W8LQJ3X8MQ4YfVsMS583_n9-4N1q_DhjG6s9FMgLZpmdv023W1F3Y_n7rJJ8lN6W1nVVMbnQDW85yJgl2dBv_gW3C6TXS20k3kGW4n8vs41fC1mGW4M5TWv1nHHyzW4hnghJ59q-njW3jX5Ng9hlyCFW2-_x4182wQfwW2-K8S-1Hl3XWW2xLZ-L7kk9-2VjhW8F8ZfSdsW4dpPQ41Ndyq0W5sl7H35_skf3W8zxxr56XRw9XW3C_Nyw7VbZSVW6nDWZ64xLBPjW14CbKt2nPcYGW3k55Lr8tNkh4f6TMNx-04> Find Charity on Twitter @CharityW4CTI <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3nqW6lVQjD3JN2XKW6B8tdZ3-4S_GW4Xmtsg1HrWmZN6vKcNXS4-htW8D3QDM8fl-9CN2-HmkCWlhFlW1__VvH1s26B3W52d5ff7BzKqYN1qdc1SPf5HgW23m2LW4NXYh1W88rS2k4HM2cdW41nkWg8w-PksW6pxQTb2FJNnHW5MJl1T2DB7j4W3ZRlbD6ZKBpJW5qN-yK1Crj1lW8dKMm08v6753W4XbmFg5fpKTvW1NDMNs6pWY6yW7Z7LTl1rn3PmW2nDJ8x2bBnyMW3f3pyT1LDs2-W4B_7Lq89tqb_W67rskj1N_zhpd_Gtq004> Resources To prepare for the lecture, we recommend familiarizing yourself with the following selected resources from the Cyber Learning Library: <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFY3qn9gW7Y8-PT6lZ3pfN1fXZHsdWWJQW934Rgq1jcfc8W154lqW5SPyVhW6NmvrT3Js9FMVtkD-45fYVNbN2XPhQZsz7xNVDtst65HqVDDW6fzbBq2dWMryW5QxQlX1tWXghW5SGxCx7rmYD8W3v-RjQ4Jym2gVtL4Rv6rz_BYVBDYKt8hFwfmW2PldYp8Fj99CW9cZpQv6tpz5bW5dMxWC6v8VJ2W9j8bp38jB9RmW1SLyzm4H4zZ7W4yt_zW3p7b5PW3WmK2f8QNQxMN1wGgWjVnpSjN3DKGQbr5QpXW3w03ts68TkFbW39stn14JKnJ7N3WYdWQwSHg1W1SJhLy5dS6DQf7Gw1_q04> Frameworks for analyzing influence operations: SCOTCH Framework <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDM5nXHsW5BWr2F6lZ3nGW6FJXwP5JptG3W6h_11N2gLqcjW7FpBN61nynx5W8JYVSP3W38fMW2QQ-Rv9frRkHW5Gm_0Q4xShmMW99-dFd5r19WHN401L5NHHJM6W6QmLcm4rbgSlW44_GCD1sxN_CW5lY6C-84jmxRW79x3K24vY4cnW5rbq235l8SqCW4B_4Rz74zhy3N5JmlXpM-d6tW4fnWcz1hSGMWW9cp_MW31TbLZW5nrmYN3LfQqyW6MpgPL8Tbx_JW2bNk_t8CnLG2W1K2lsF3pGh_9W2GkhLl5NtMkYW8qjkXc7rNrsHW3Z--LN89v9GyN44g1q1KGfwbW8-5bhg7DCY-GW5dWvL27JH5F1W6qwfsv5SQrH0VxdlN_13yB_JW8chr3g7hWCdfN8BCW5wydF8jW1f_mbB3vXJt8W65NZwx3Lgkz6W7_-W0r3q8hP0f1jJwH404> DISARM Framework <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3l7N4381J6nyMPZW3-SV651HXq63W4_5rFC4lDkb5W7018q66B56TpW39BtPn3Qr1P9V8PgHm4RBd-zVbgnDq8_tr6MW65m0281v_tszW3-hS-X6l6jbKN8t06gBMf_vqW7dwn_G30YgvyLj2C4HYsVBW95ZrlT8DWRmKW97WBmx7D5sQLW1DcVzq702VMZW3kLPtq3vCG0FW1xZrbM3NZWyDW8R8x6s4pxjVbW3YxLt87p5KnKW2NwjF13ChzMGN2twBGXLFX5jW7qxyWJ1RTGtdN7Qv1kTc4d9_W42wxM09bMpfrf5-ndWW04> The Kill Chain for Influence Operations <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDs5nXHsW50kH_H6lZ3kTW6bn89L59bmVDW8WK9Sk2JqK1mW92y2w34m81cFVYt9GV8wJ2lPW9d3PHH4ZwWGxW7b9TTp583g27W18r8Jd2YdQBkW2KlZCK3tQnFhW2v7WkS93JjVPW153dfS3GFP3tN6wFbdcP0B4SW4RDgVz5ng54kW5yV64g3Y_2nBW6FcLJ81rrXJrW6bNFzW94Mg4zW2gQg8C4BB4NcW6dLr6p8s_0MYW999Psr6wcm2sW7_GywT2h1_6VW2-DSdd3yMlx3W4lwWVY2czp56W88fzld3Rfq5qW4bHf2K6PtPf1W7Ny9PL4YD5XGN3bQ11C8rqgnW3MPJsj2nG3-WW8yZw9Q3-hGplVB7qYJ8v5-H3W8wF-Lz6-Wy5WW70zhb73jqnwPW1xvTPX7FlGD2W1Wy3sq3VJ6JSf4t79Z204> The Diamond Model for Influence Operations Analysis <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDs5nXHsW50kH_H6lZ3n0W5J_JCy30cj_NW1lcnpL3jt0WTW7CfC2X1fyP9YW5yJJtQ5TmNBbVwbZ3n6bT4p2W32B-Pk2mDgwTW51QCBd6WcZkbN1kvnFYNP2WWW2hpQjZ1ZjBBBN4X62JPhchGnW5lfC6v8B-fr7W4bdtMr2dBNTgW16nz252-spnHW8qnkmc117J2_W2t4Gg38-GtBfW6TRFH53k7BZsW5SBth74WKnlyW9fvMb58FpnXDN3kz230ZhrdNW7ml3mc4_BBHbW5gL7LT2Fs8TDW98tMs06K3GD8W3lZh9P8bFWJyW5crCNQ4rwsgJW8nDr7J8l0G_hN8NsjpNb0H8wW6Gz5YV6wHxpHVQJvVG75rKbVW1pr88-6BQ038W6GM5qh4KCFYfW93tYv0804pwnW8lyqGn8yY6P4f8z7ZjR04> Attribution in IO: Bellingcat Video <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3lgW7l-vHZ57Y4srW176x9d2Px-WzW4H_r1F8nLk7pW7X9l3X1cxv5BW3y9jCw4BNQMwW68Bqw16vPk_8W7m7M-15KdTy7W3qr0Dz84DLCKW3SPc1r5BSh56N1rcdH2J3dRbW2n_nm264kL-7V7qFPb6tJ07bW74GtMl9hWCbhW2T-BNM7B3PYGW21Vfqz3MJkBTVdWXg85Bw1JPW7lmWsq3N_BY8W88KDs94PtL_0W6yps-C1Lzjk_W8DcX122DLPFDN20P2hDjPL0WW2ZW1nd6mRy47N1NLHHcWP4pnW2RlLm98tfsHbf6jZWQK04> Microsoft White Paper <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDs5nXHsW50kH_H6lZ3k_W6SQQBt4Yq9tcW1gDFZR4C3xPCW8Z9wzP923bXnW6MFjHT7T8908N8n2nZLXy7jXW2HT_vZ2g8c79W38vZ1S2DJQrGW24YBs_2cmv4bW4ZR6jv49CPYHW7GQP6-3P0V42W4Zz-SG5B6cMSW4wN6hv8yTcPMW54w-DV18G8k2VHs4vM6vDgVLW7MRG7144Jms7W9911Q1109YlfW8Kt9Jd16zKX0N73d45l_xRPfW3cWtv_1MMK13W1GX_TK6czmWVVPdWHN16H6K7W193LNl2mB1qFW3XKNvf3QP9TXV30r6_7bwCV8W4nQh545Z244YW6rtWpj2Zf6HhW1cFpqg4LfcB0W5548Z66xVcVzW98r1wG2jtNHzW7-wksX2kbG2yW93WMmg2pRThYW4lZHDj8TbGhpf71HPd004> Examples of IO campaigns that may be useful in this lecture: Graphika: Spamouflage Dragon <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3nZVH5XjJ8R6Yk0W42vPl62_gSVmW3xw1z_1CHBBDW2GF63v6FmvKgW34htXK6Sn-FdW6d2qhf6X6QtLW3V-7mt7Fy2Z9W36fY7G5cbCf1W6XmTFY6g1sRXW3cm6fJ3qQGYsW4wJcMv6vjHDCW5TPkJT9c8Y_6W1pjDgH4cm734W8Pv4fQ6Cx_G_W17Hkr-3hngfDW6jqB-74mKCXqVwbZhx598tjBW8NG7mq4xWZwvW3gCXpD6jM_P-W7BlPs47ftCKWN5V5xZzFPgSdW98n7QG5G1cbjW1Rn_q42cbdHlW7CJKY-12C4qLf1PJmVY04> Google: Dragonbridge <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDs5nXHsW50kH_H6lZ3lHN3VvTg9FM8NJW4F-rTb507q51VKZJQ95cl_7KW1V98Jl8MtTqyW1PXV5y1Z7S04W727xfv5fRrnhW3rxZml5f2ry9W22M6sQ7VvP5sW3Bf4FF6gBY-dW15frnl25KqdQN3ThzJHpf9rvW4-4fgN3-JlW8W3FxpBG5K7YLXW4dvGkj6RjgPtW3HH5rK2WksSJW31llMX9gHbbPVNyQ-W7jxfVlW5vz_XJ4RlT5gW8vg7cg3RfZrhW3VjH-m1G4RBSVxDzdM81qFZ7W3956T99b4bTqW2TsM824DnrW4W47HvZ23X8gKxVMQx274JlqBxW311bm32qkNZ7W210Sf11zWSgNW1GJXnD8Ykj-nW8Pnfww6ysC3fW8shB3F3h9sdRW77hrTT6Yh4gNW20J1h77mz7PRf8JnF7g04> Recorded Future: Empire Dragon <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDM5nXHsW5BWr2F6lZ3mxN3G2GbHWVQnTW4bVPRF71SvGYW9d1VFg8JCknqVJnJC197XzzRW4c5pTy2WvBnmW9dZfVh87V453W34FwBN6h3BmCTgJKl1PVgrwW8smJp651xtzyW2x0Vvm9lmmmyVGPf705CLYc7N41p9ZLr698WW2H_lmK8hYyjmW1T2_CT43whmcW4xMjHY9ggV1sW1tQ47K9ckWh0W59r1S41rMt9kVZysg81nx2NbW26GZ3P7bGL7nW3KBK9r7hdMjjW7c-4ZS4Pn6p-W3p4p6S4wjshsW98PGFz6TlHC0W2sDMn_169W5KW8RYVfq1T3hBBW94Y-mZ1g1GsNW8bNRFJ6hP_22W3TJn__7qpxL6W94Dhdr6d91fyW5hgmrX6DbZS5W1-DHcS8Tt5Y9W7Z-FMK2M7CghVzYh8_2jwpmbW96C3g31mqSRtf7KCW_l04> Recorded Future: Maui Wildfire Influence Operations <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDs5nXHsW50kH_H6lZ3p9W8rdQQV1RXvV4N91-PNZDYxMqW6Bc3RZ2QBZWWN44PkwPGss9pW4PhGVM74G_t5W6GxrjC8lxRJDW599c_S8GrT96W8_2qrj2W7DqsVHF8zt59mGvsW3QLqW337C7rzW1zm3ms72YsjbW6TtKS-3MBDRsW9dMWH_64kvqJW7qTzQ85PWcN1W22RFrC2wp5pbW1j3vZy38XPFBW1WNlqJ2f1zFlW7bZGZ84F8wHBW6qYWzD5bdwbVW2rSKR97KSs8PW4Nxh-t4yx7G1W5ShqM-6KZP7pN4jfC-HnY1N1W8qRMqS63Gcx2VjPrZZ4p0HDWW5Ql0tF8NRHLjW4d2h6C8D5HBNVhfsY08CkTz1VHWCcn1MnDFSW3XlVwh9dQmplW1qX0ly3Q06tNW6FB-mt3lQ6bWf5BYP0s04> Recorded Future: JokerDPR and the Information War <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqGd3qn9gW8wLKSR6lZ3pVN15RvWD9hHjSW29Nnbg2dxsBzW5Sq7RQ9dw0SrW6P06F546R_9zN2ls--sXbTv-W7Hvtxs8Hm7F5W6c5dDz4vPk9ZW2mnW936zKbRPW55JHQh2Dxh_MW2g6xgH8nkWz2W4YPPPG53xXRcW8m89rd80vQ-ZW7515dt2gH14mW6RtSPV7lDr3jW6_nP1t3RvZrcN7Mj2JVVtGFkW79j1DH64_qx8W28bTlc7BGZ51W1HCJbF3Sk7XtW7t7sCm4kz_HCW5LFK4J4-m20-W7TwtGb2fPg__W86dn3y6wvfLHW91QkZV6QJpVYW2jcMq25-XDkkW6xv7zw14vnjLW1G839K2fLX4yW7LvD-Y3_lL0Jf4bCfCd04> The Future of IO: Stanford Internet Observatory: Generative Language Models and Automated Influence Operations: Emerging Threats and Potential Mitigations <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3kLW6hYKsM6fRwSyN31HkP31_vy4W3R8qxk1jKwX6W18D52S1Tz4WbW5PTp_x8-GB-1W42d7rY75VZZRW8yGgG24VcD1bW5y9qv87RSCLCW93nFdQ7M4pcSN7m7v1P5dGStW8RVS6W3cLtnlW8pkJf14MjnyLN38TXc2qtjKqW3YxL8K4rDRh7W7W4wmK633pp-W6hzNN22GFqFYW8vR5Vs7F_ZpVN1g6w521JqzWW2201jZ7lQJj0W93B48477tNh5W2Rr_rY7NF5f5W1WkyBp7cTlRYW92bmHR39bjchW3trK1M4b31n7f1mdvyb04> Missed a Debate and Want to Watch? All of our lectures and debates are recorded Students of TIA-811 can watch all previous debates and continue the discussion in our community. Not yet a student? Join here <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3kJM2frDb_-006VpwwmS19nLM8W19BHp72mwWRPW8xvNHn4Q88TpW87z3F77SzJyHW2r0b1f9fvdpvW1YTBS_8mC_3GW2j1py_3hJf3RW23kjBG3sJ-McW5J7NB-3h-tt8W7ZXchz4fFPClW7Cg76n3ynF3mW1fG3sN2-7zqcVGjH5W7MXk0qW8wh6gp5L-_c-W491-cc91lrlTV2g32c97nCl4W1z81pR2Spcq0W2ppjNg7PKzHnW4r_6gr4k_bXhW6TZMC66hfy-wW6DS6b61FxStQW1-1d-28fPNd-N5WmBmthPsn0f5k-RDb04> . Students can view debates here: - Robert M. Lee on Attribution <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDM5nXHsW5BWr2F6lZ3ntW4TG9Yy2sQD2rW7kgtn15ZLfCcW4XqwTB7J193BW1JRM-h422LVwW8fGCs-7zNP_PW6d5YZ65VRSK3W7G_k1V4Cf633W3ZMrmY7rXfgBW5cdn_c3k7Z2HW1yXn-2159ZCbW7RbLl-3JvsbLW74pw3n39T-RxW5x1mJD6dn-V1N5Zlk23RShmCW4tZ2-L19QnG7W3wF7wq5nqsJyW5PSN6t5sr10mW41rPCN5xcmDLW2Wb7B-8w7STvN8jkKzCQZkQNW7BxcP245Z7RJW1Y-Ktq5CdD_1W2t2P7t7PYjK0W82Xjk17YcdGgW2qZt1K2gpHVbW1bBmnF9dkz_PW2-y3Yj5D-KS6VLT7H18HK5w3W61c-sV1hljs3N8DZKX57x5RjW1pWwzl35mR-DW9jFVVM38fVb_W3px36b1-LSYLV8sKVS67JV_yf4ctJVv04> - Dr. Thomas Rid on Deception <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDM5nXHsW5BWr2F6lZ3p5W92B3n43D4KGsW2zsBjS3NMR_WW2Xc-WJ5--q-XW67NcK48pc4xHMBPmKrBgryRN4JpxfcCqJmhW7kqYfp2hkw_sW3sSqpN94vbt5W8vXjd74XvZFxW1tnQYM8vGl9QW2drgcr6Z8DhmW7pxX5B8qW5Z3N2f9tcNCJwRmN1ZL1-Wt0THhW3w7xYV7G1CkQW5cpkp166hmkMW4DJySQ4dKh9YW1pw9tC1lhDz4W1mgHcG52sq8MW8HNmM33lY_vLW5l5m6x6WWyvNW30t17X1NKvdDW2Ml40S9cWHtPW93c9YM1jV_VjW2x6XHP5_KTZwW1Jj5Jb2CFw5LW1mZq3p6x4G5BW4YgKrb7fn6qTV_WffS46cdmzW6ks3Pt1KMV3QVJgMWg98J88mN9hdslmBQjrJW7x2lz95g0DjlW5-_R7g7nSdJrf5WGBT804> - Rick Holland on Strategic Intelligence <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqDM5nXHsW5BWr2F6lZ3nBW4Fc8Bk3PD7FYW7qXt0X7GP6W8W2p34341HHdwlN2td-TTLm5MSW8MHbqK95pcYVW5bQFcW8cqsYCW1hRCVT779DchVt3bd76Z78ghW8YtMFC80-CdgW8xH2G71-lDrCW8-qfbb2Dc8z4W592t7c63tWG5W8FwkWv4k0-VzW1xm2dl5X3dPvW5v924L9gSDXYN8DRlYQvmMcvVJFT7l7jg40DW105t8y2BCzdPW8BqK865GcqGwW160xKC748b_gW19Fp473JVjC5W5N4NDL7WG2FsW3XpC1t4_Dc3RW5YxMQW41SSS6VL76CT5c6SDXW5vJx2197VHXkW5qTZ3c8y8t6LW502mzq24G3cwW73z0Dy3JFSGzW44s_x84HhF-zW5wNYTQ4VycrmW4DZ7C166nb9mW5PJPpK3XXZLHN5XCS8qNV2jbf28KyCx04> - Matt Edmondson on OSINT and Artificial Intelligence <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFl5nXHsW6N1X8z6lZ3nLW8s0PtV8vl7p3W7BnfK93LFR79W4-yCd82RbLbdW814l_B3-sm_2W6zMnts92dBhqW6r8Qy51-hyRlW3yGSlg6DvcW8W5wSxs14KbFNRW8WJ59W3fXnWzW3f0Tnz5kwhZFW8T325v3CqgYmW3JT2C_5FnbXHW7yqz_J7VLs24W1zZyJ95ZC8pQW4CrnFy4k1c3jW2RF-1m1PZ6BcW9fq6LS968XX9W7GKSzf49dntyW3MLgR76Yn4BlW6ZNNHJ8wFPd_VrxZ6L5BnRN2W47XgFb7Dg1rzW594K8K2SSg2tW3lZvYV6D78j2W97lkLR4HSYlCW8dKfN32Qnn7zW1Rhf__14GVwjW7CF_r74hv1xQVCKGpZ3zJwrHW4MR23X3PC1bnW8wvz7w6NSQVXTNjhd5ZS8KQVqhwls1X7Jn9W3rMt9Y1J5XRGW8tTqV-31Rkt5W3vL05v64sZ_gW6t3rF47qMqtsW8fBTYt7lvbDQf8WpZVY04> - Kurt Waller on Cybersecurity Game Theory <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqF25nXHsW69t95C6lZ3mFW4NfdDr4Zl_LwW1G7GRj3Vf_wlVQS2mB3XRnmCVddlv83QBDH2W25Nfmm8lw0B3W4HVBwf5RBFvvN4p-XJQL1H8VMjwyh2F2XYfW8kVtRl153hPjW3J7t3N29T_SpW9bH4ny540M4DN2DxyQynGM8_W50x6Bx6b10YkW5HXszD1-NDqSW3sZq0t2scTKDN2p_FMB1HjRkW4BrN5V5T9LdtW2y8jM97_g0DZW8j3_7Q6qhhPDW4G27382QxLDFW62v_7d5BR2PfW52nQc24rL4y1W1fr76s9l47sZW129Bqk7dzrLwW7ShJJQ3FBdWrMFjn4MBXbM2W362hr38KPTBsW8Qfs734DL4fgW2Wv57S8k00zPN20R4stxnKXDVTzVTg3D1HfqW29-KJT5N81-yW4g4gM98Hm4xJN3BccPcF0bY2N8mdr2k50-GRW1nMjjk5Yn6dhf7XzX1K04> - Josiah Dykstra on Cybersecurity Metrics <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqF25nXHsW69t95C6lZ3p5W60GN018wNNNHW2bD1Zy3P3qzDW8W9zl62SrnBqW2zkKTJ7-44rHW1yRQzB4sC5J3W2-H9Xj4hgnDKW6WvjBT2SvYjFVcV_DY3qGMHWW9b0clW14GS2ZW5y06p96gJffdW8fHgHD2TJnFsW1NDt_C35dYlfW6qSd_C5cgWgJW6-qk3P1vZv5vVrXwNJ3pPXpQW8hYMjH6Lt4nwW7gcKRD6GckrhW617K1w1ltk9lW7Wc6pG2Y7sKBVjMlBG19pLMTW1JkRt-73sq5PW1Kxbwh26qW1RVJCbb49d7Yj6N10sWRMC63HKW7gGrnV3M344pW5QFN7l7X50ytW5_g0rH3gKHqyN4bq6kxwlBYmW1wrVB-2g_48jW3T0ny944XrYPV7C-101p-LmcW7CVWmF3vPQtbW5gS6yM4-T1WpW3-JWZX50lqMWW4mPlLW2S0bCZW3K4z_956CPMWdN1mPj04> Every week, we invite a recognized expert in their craft to discuss and debate an essential and timely topic in cybersecurity. Our Exciting Next Speaker [image: 2023-12-05 Guest Lecture Scott Small] <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3mrVMqCWN91sTKzW5K8T402NcKsPW8TL_SS6v05dMW5T-Rz35RpQzvW1_HSmg3tfC27W5mVkLj4KhGPQW1fCfx84TYCB-W2ZjyFg5gpdV6W53-6D65XMNkxW2z4RBl6vK-QJW4wcsMf2F6DhpW8H3Mlq7L4zkyW9bFxG246LnC0W8S2Sr25GSF_LW7_GTCn8BJ08FW56cckx7PzvYKW69194Q5FyJqfW2y46RM1Bx5HtW64v1_S8sLtT2N7y7-JjHllPjW4R5_dG5tMMFfW3wR24d4PmtXCW1SyYLK2dHg5JW1mYrHr7QDzb8f8wJQ9K04> *Join The Debate* <https://d2NGwC04.na1.hubspotlinks.com/Ctc/5G+113/d2NGwC04/VWTb__9hCR3LW5trlfB6RbqxvW3trWRD56mwyCN3ypqFF3qn9gW7lCdLW6lZ3nMW3zv2nR34-Nn8W8s-NCb2WKKCpW8tgTBk7879yYW71GXtX8vCvZVW19tTQj8ky_C4W55FVgW99P5ffW1JfDDF8cySptW2M1VQQ76qwgqV57yrf7KCYDyW82c_CB5skBd4N6Z4kmxDdbzRW1sD_YP8JHPT3W4PfhZC3dB9cHW2npX6q5KprTjW54mhd75R6zQyW2qyg474d6_vDW6Fr2Nd4ZtH-tVKbJfn8hLNW5W3g2Htp4DGdHcW8KFqzT2ltrVMW21LP2d47b93XW5whsJK57yMzCVPhSYh24HJ6lW56HPWS538z9Jf3qc73v04> Threat Intelligence Academy, 10809 Arrowtree Blvd, Clermont, FL 34715, USA Unsubscribe <https://hs-23565686.s.hubspotemail.net/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=VnbTNM6dFGysVBYXq443PTq4W3P3Q7w3ZsjYmW3_fTFj5x9VbVVmWFfN5rsFfmN6KjqDf25sdmW59Q7NJ65lR7rVX51m94XVDm-MXk_7Qbw1LzW2gTx4N16z-Z-W1q3yqM2RvG573nvD2&v=3&utm_campaign=TIA811%20First%20Year&utm_source=hs_email&utm_medium=email&utm_content=282323931&_hsenc=p2ANqtz-_7atbE7QyocjzvjfI9TAgQQMbPoSTNIXWfqQ9qQht0b7IrRU8qrWxw5OhYIAP5S_zAx1ssnPV7eokFPQgki2OgmbMhiQ&_hsmi=284022805> Manage preferences <https://hs-23565686.s.hubspotemail.net/hs/manage-preferences/unsubscribe?languagePreference=en&d=VnbTNM6dFGysVBYXq443PTq4W3P3Q7w3ZsjYmW3_fTFj5x9VbVVmWFfN5rsFfmN6KjqDf25sdmW59Q7NJ65lR7rVX51m94XVDm-MXk_7Qbw1LzW2gTx4N16z-Z-W1q3yqM2RvG573nvD2&v=3&utm_campaign=TIA811%20First%20Year&utm_source=hs_email&utm_medium=email&utm_content=282323931&_hsenc=p2ANqtz-_7atbE7QyocjzvjfI9TAgQQMbPoSTNIXWfqQ9qQht0b7IrRU8qrWxw5OhYIAP5S_zAx1ssnPV7eokFPQgki2OgmbMhiQ&_hsmi=284022805>
participants (1)
-
Karl Semich