SlideShare a Scribd company logo
1 of 12
Download to read offline
Real
Intelligence
Training
With extensive backgrounds in Australia’s intelligence
community, Need to Know – Real Intelligence Training provides
specialised training on practical, real-world skills designed
to tackle the toughest investigative, analytical, information
collection, deployment and situational awareness challenges
for companies and Government Departments that face threats.
Need to Know is not a typical training company. Rather than providing courses
designed to fit a generic need, Need to Know develops bespoke, tailored training
courses to fit a client’s training or skills gaps.
We bring proven capabilities in developing, delivering and reviewing training to
professional intelligence and security services, military and police.
Our tried and tested training methodology is critical for organisations needing
something more than that offered by traditional training companies.
Real Intelligence
Training
Are your employees ever put in
risky or uncertain situations?
Do your people know how to identify,
assess and measure threats, risks and
priorities? Do they know the indicators
to look for?
Would it help if employees had a better
understanding of the insider threat and
the damage one person can cause?
Is your organisation’s security
culture based on a commitment and
adherence to strong policies and
procedures, or hopeful thinking?
Should an attack occur, who in
your company deals with the
consequences?
Do your investigators know
how to strategically analyse tactical
information to quickly and confidently
identify information gaps?
Have you had, or could you have,
an incident at or near your workplace
that has led to your employees
feeling threatened or scared?
Why
Need To Know
Need to Know training is
for government and industry that have
employees in the following sectors:
Security & Protection
Law Enforcement
Border Protection
Intelligence Agencies
Assessment, Strategic
& Tactical Analysis
Fraud & Investigation
Compliance
Legal
Customer Service
Finance & Insurance
Retail
Hospitality
Mining & Energy
Health & Safety
Media
Events Coordination
Who uses
our services
Our training is suitable for
organisations that:
need protection from the malicious
insider threat, or conduct internal
investigations;
have critical infrastructure assets;
conduct or review investigations;
analyse data or information;
assess threat, risk or priority;
provide front-line customer service;
are involved in sales;
interact with members of the public;
elicit information from vulnerable, deceptive or
uncooperative people;
deploy employees to remote, dangerous or unfamiliar
environments;
require employees to be alert and aware of their surroundings;
are susceptible to commercial espionage;
have or need internal security practices or policies;
require asset protection; or
use practical information collection skills.
Who our courses
are for
Insider Threat Awareness/
Malicious Insider Threat workshop
The inability to accurately predict if someone is
going to become a malicious insider is one
of the biggest security challenges faced by
government and business today. Most insider
attacks are deliberate, but some employees
compromise their organisation unwittingly
through poor judgement or a lack of security
understanding. The scale of harm one
individual can inflict is disproportionately
large, and organisations need to be alert
to the indicators of a potential threat. Early
detection is critical.
SKILLS DEVELOPMENT
Our insider threat will give you
the skills to:
identify indicators of a potential insider threat
understand behaviours and motivations
build a strong security culture
develop organisational resilience
better manage potential threats
What training
we offer
SAMPLE COURSES
Situational Awareness and Personal Safety
Using security awareness techniques developed by intelligence agencies and law
enforcement, the situational awareness skills we teach are practical and tailored to the
current security threat environment.
Effective personal security awareness and counter-surveillance techniques can help you
identify and take action against potential threats before they happen, whether they come
from a disgruntled customer or client, criminal elements, or those otherwise seeking to take
advantage of or intimidate your staff.
These skills are particularly important if you work in front-line customer service, roles
requiring public interaction (particularly with potentially violent or criminal elements), or
even in a role where your personal vehicle is parked in a non-secure location near your
workplace.
SKILLS DEVELOPMENT
Our situational awareness and personal safety training will give
you the skills to:
understand the current security environment
actively manage own personal safety and enhance
understanding
apply situational awareness and physical
security measures to your environment
identify and respond to perceived and real
threats to personal safety
build familiarity with surveillance
capabilities and counter-measures
understand and demonstrate the
fundamental principles of counter-
surveillance
demonstrate enhanced situational
awareness and the ability to interpret the
environment and people around you to
better ensure your personal safety
Continued
What training we offer
OTHER SAMPLE COURSES
Investigative Tools
and Techniques
We teach investigative processes that can be
practically applied using a range of analytic tools
and techniques. We examine different types of
creative and critical thinking and the impact the
human brain has on reasoning, investigations and
analysis. We look at identifying bias, mindset and
assumption issues and introduce methods for
overcoming them.
Our training introduces methods designed
exclusively by Need to Know on identifying,
assessing and measuring threat, risk and
priority. If your organisation deals with multiple
investigations or needs to measure threat and
risk, this unique, powerful tool is perfect for you.
SKILLS DEVELOPMENT
Our investigative tools and techniques
training will give you the skills to:
identify the components of an investigation
generate considered and prioritised
information requirements
prepare information collection plans
apply a range of analytical tools and
techniques to work more effectively and
efficiently
collect, assess and judge information
assess and measure threat, risk and
priority
avoid common investigative pitfalls and
work to reduce the impact of bias
Introduction
to Intelligence
In our work and daily lives we are often
confronted with incomplete, incorrect
or deliberately misleading information.
Information can come in any form –
written, spoken, audio, visual, open
source or classified. It is just information
until it is collated, evaluated and
assessed for its meaning. We focus
on understanding information and how
it becomes intelligence, how it differs
from evidence and how it can be used
to identify security threats and protect
commercial interests.
SKILLS DEVELOPMENT
Our sessions introducing
intelligence will give you the skills to:
identify the differences between
information, intelligence and
evidence
understand how information is
collected, handled and assessed
understand and apply knowledge
of the Intelligence Cycle
identify the significance and
urgency of specific information
critically assess and evaluate raw
intelligence
Continued
What training we offer
OTHER SAMPLE COURSES
Continued
What training we offer
Interview Tradecraft
We can help you develop the skills required
to conduct difficult or complex interviews
focusing on information collection
in a hostile environment or with
uncooperative subjects. Our training will
help you to prepare for and understand
the skills necessary to conduct effective
interviews and make clear, accurate
and supported assessments. We
will show you how to communicate
your findings, construct a defendable
argument and be able to make logical
and sustainable recommendations based
on the information you have collected. We
can teach you to identify deception, to ask
the right questions at the right time, and to
build rapport in order to get the information you
need from an interview.
SKILLS DEVELOPMENT
Our interviewing tradecraft training will give
you the skills to:
prepare for and conduct complex
interviews and debriefings
use effective verbal and non-verbal
communication skills
apply your perception to achieve interview
objectives
understand and detect deception and lies
employ effective strategies to
communicate with uncooperative or
hostile interview subjects
understand and use influence and
persuasion techniques
OTHER SAMPLE COURSES
With a proven track record
in developing the skills and
competencies of officers in
intelligence roles, we stand
by our training – both its
content and delivery. We are
not interested in presenting
a course that does not
produce results and we
believe our training speaks
for itself.
Our material is constantly revised,
tested, evaluated and critiqued.
The content is cutting edge and
presented with a focus on real-world,
practical outcomes. The tools and
techniques we provide have been
taught to, and are used by, more
than 100 international agencies
responsible for critical investigations.
By working with you to develop
tailored content, we set firm
deliverables for the training provided,
and measure against these at the
conclusion.
Contact us today for our training
methodology and approach.
Our approach
We have over 27 years combined experience as professional
intelligence officers in Australia’s intelligence community.
Our tradecraft has been learnt in counter-terrorism, investigative analysis,
counter-espionage, and security assessments, and we have been deployed to
some of the most unforgiving and high threat environments around the world.
We are skilled facilitators and our unique expertise comes from working
in Australia with domestic security and intelligence agencies and training
international intelligence, military and police services. We keep our content
current and our methods bench marked against new theory and emerging
concepts.
Our workshops are highly engaging and interactive. We involve participants
immediately through facilitated discussions and by bringing our own
personal experiences into the training to show relevance and demonstrate
principles.
We also use syndicated small group activities and realistic scenario exercises
based on Australian case studies to highlight lessons learnt and show how
industry manages developing risks and threats.
As former intelligence officers, we have a range of professional contacts in the
security, law enforcement, intelligence and military around the world. To deliver
the best outcomes for our clients, we ensure our trainers are appropriately
experienced, qualified and motivated to deliver our material. We engage subject
matter experts and skilled practitioners to ensure our clients receive techniques
and methods that are proven to be effective
Our trainers have delivered their courses to the intelligence community, military
and police across Australia. They have also deployed their training across the
Middle East, East Asia, the Sub-continent, Africa, Europe and the Pacific.
We train the professionals – and now we bring it to you.
Our founders
Further information
Our courses are affordable, accessible and
directly relevant.
Courses start from $500 per day per person.
Please contact Paul McLeay for more
information and to discuss your needs.
P. 02 9223 7717
M. 0418 610 489
E. admin@needtoknowtraining.com.au
PO Box 5228 Braddon ACT 2612 Australia

More Related Content

Similar to Need to Know - Real Intelligence Training

Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Faxoc Jobs and Hrms
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Faxoc3
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Faxoc Jobs and Hrms
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Faxoc Jobs and Hrms
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Faxoc Jobs and Hrms
 
HSCG - Who We Are - What We Do
HSCG - Who We Are - What We DoHSCG - Who We Are - What We Do
HSCG - Who We Are - What We Dothommcelroy
 
How to Create a Security-Aware Culture in Your Company
How to Create a Security-Aware Culture in Your CompanyHow to Create a Security-Aware Culture in Your Company
How to Create a Security-Aware Culture in Your CompanyDavid McHale
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityCyber Security Experts
 
HSCG Overview 2010
HSCG Overview 2010HSCG Overview 2010
HSCG Overview 2010Tom_McElroy
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital Worldcyberprosocial
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14Jock ANDRE
 
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...CXO 2.0 Conference
 
Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109Shannon Gregg, MBA
 
Worldwide Pres
Worldwide PresWorldwide Pres
Worldwide PresDetJoeF
 

Similar to Need to Know - Real Intelligence Training (20)

Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
 
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
Cultivating a Culture of Data Security and Privacy_ Empowering Employees at F...
 
HSCG - Who We Are - What We Do
HSCG - Who We Are - What We DoHSCG - Who We Are - What We Do
HSCG - Who We Are - What We Do
 
Brochure - About Rook
Brochure - About RookBrochure - About Rook
Brochure - About Rook
 
How to Create a Security-Aware Culture in Your Company
How to Create a Security-Aware Culture in Your CompanyHow to Create a Security-Aware Culture in Your Company
How to Create a Security-Aware Culture in Your Company
 
Pln9 presentation
Pln9 presentationPln9 presentation
Pln9 presentation
 
Pln9 presentation
Pln9 presentationPln9 presentation
Pln9 presentation
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
 
HSCG Overview 2010
HSCG Overview 2010HSCG Overview 2010
HSCG Overview 2010
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14
 
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...
 
Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109
 
Worldwide Pres
Worldwide PresWorldwide Pres
Worldwide Pres
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 
Grupo 4 - TEMA II.pptx
Grupo 4  - TEMA II.pptxGrupo 4  - TEMA II.pptx
Grupo 4 - TEMA II.pptx
 

More from Paul MCLEAY

Sexual Harassment and Unfair Dismissal Increase Significantly under COVID
Sexual Harassment and Unfair Dismissal Increase Significantly under COVIDSexual Harassment and Unfair Dismissal Increase Significantly under COVID
Sexual Harassment and Unfair Dismissal Increase Significantly under COVIDPaul MCLEAY
 
Role of the support person in mediation
Role of the support person in mediationRole of the support person in mediation
Role of the support person in mediationPaul MCLEAY
 
160222 labourfoce rwta presentation
160222 labourfoce rwta presentation160222 labourfoce rwta presentation
160222 labourfoce rwta presentationPaul MCLEAY
 
Steps to success hostage at the table george kohlreiser
Steps to success hostage at the table george kohlreiserSteps to success hostage at the table george kohlreiser
Steps to success hostage at the table george kohlreiserPaul MCLEAY
 
October 2014 cbfca annaul conference
October 2014 cbfca annaul conferenceOctober 2014 cbfca annaul conference
October 2014 cbfca annaul conferencePaul MCLEAY
 
Data linkage eis working group
Data linkage eis working groupData linkage eis working group
Data linkage eis working groupPaul MCLEAY
 
ImpEx Job Index launch at CBFCA by Paul McLeay
ImpEx Job Index launch at CBFCA by Paul McLeayImpEx Job Index launch at CBFCA by Paul McLeay
ImpEx Job Index launch at CBFCA by Paul McLeayPaul MCLEAY
 
Performance Audit Review presentation for Business Improvement
Performance Audit Review presentation for Business ImprovementPerformance Audit Review presentation for Business Improvement
Performance Audit Review presentation for Business ImprovementPaul MCLEAY
 
Effective parliamentary committees14feb2011
Effective parliamentary committees14feb2011Effective parliamentary committees14feb2011
Effective parliamentary committees14feb2011Paul MCLEAY
 
2010 boat show presentation
2010 boat show presentation2010 boat show presentation
2010 boat show presentationPaul MCLEAY
 
Mc Leay Web Democracy
Mc Leay Web DemocracyMc Leay Web Democracy
Mc Leay Web DemocracyPaul MCLEAY
 
Improving Public Financial Accountability2
Improving Public Financial Accountability2Improving Public Financial Accountability2
Improving Public Financial Accountability2Paul MCLEAY
 
Pac Performance Audits 0908
Pac Performance Audits   0908Pac Performance Audits   0908
Pac Performance Audits 0908Paul MCLEAY
 
Commonwealth Parliamentary Seminar 0905
Commonwealth Parliamentary Seminar   0905Commonwealth Parliamentary Seminar   0905
Commonwealth Parliamentary Seminar 0905Paul MCLEAY
 

More from Paul MCLEAY (15)

Sexual Harassment and Unfair Dismissal Increase Significantly under COVID
Sexual Harassment and Unfair Dismissal Increase Significantly under COVIDSexual Harassment and Unfair Dismissal Increase Significantly under COVID
Sexual Harassment and Unfair Dismissal Increase Significantly under COVID
 
Role of the support person in mediation
Role of the support person in mediationRole of the support person in mediation
Role of the support person in mediation
 
160222 labourfoce rwta presentation
160222 labourfoce rwta presentation160222 labourfoce rwta presentation
160222 labourfoce rwta presentation
 
Steps to success hostage at the table george kohlreiser
Steps to success hostage at the table george kohlreiserSteps to success hostage at the table george kohlreiser
Steps to success hostage at the table george kohlreiser
 
October 2014 cbfca annaul conference
October 2014 cbfca annaul conferenceOctober 2014 cbfca annaul conference
October 2014 cbfca annaul conference
 
Data linkage eis working group
Data linkage eis working groupData linkage eis working group
Data linkage eis working group
 
Gov camp
Gov campGov camp
Gov camp
 
ImpEx Job Index launch at CBFCA by Paul McLeay
ImpEx Job Index launch at CBFCA by Paul McLeayImpEx Job Index launch at CBFCA by Paul McLeay
ImpEx Job Index launch at CBFCA by Paul McLeay
 
Performance Audit Review presentation for Business Improvement
Performance Audit Review presentation for Business ImprovementPerformance Audit Review presentation for Business Improvement
Performance Audit Review presentation for Business Improvement
 
Effective parliamentary committees14feb2011
Effective parliamentary committees14feb2011Effective parliamentary committees14feb2011
Effective parliamentary committees14feb2011
 
2010 boat show presentation
2010 boat show presentation2010 boat show presentation
2010 boat show presentation
 
Mc Leay Web Democracy
Mc Leay Web DemocracyMc Leay Web Democracy
Mc Leay Web Democracy
 
Improving Public Financial Accountability2
Improving Public Financial Accountability2Improving Public Financial Accountability2
Improving Public Financial Accountability2
 
Pac Performance Audits 0908
Pac Performance Audits   0908Pac Performance Audits   0908
Pac Performance Audits 0908
 
Commonwealth Parliamentary Seminar 0905
Commonwealth Parliamentary Seminar   0905Commonwealth Parliamentary Seminar   0905
Commonwealth Parliamentary Seminar 0905
 

Recently uploaded

定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一s SS
 
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategyDIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategySouvikRay24
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxarsathsahil
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfEastern Online-iSURVEY
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDemandbase
 
Cost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesCost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesPushON Ltd
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)Jomer Gregorio
 
Best Persuasive selling skills presentation.pptx
Best Persuasive selling skills  presentation.pptxBest Persuasive selling skills  presentation.pptx
Best Persuasive selling skills presentation.pptxMasterPhil1
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garsiderobwhite630290
 
Content Marketing For A Travel Website On The Examples Of: Booking.com; TripA...
Content Marketing For A Travel Website On The Examples Of: Booking.com; TripA...Content Marketing For A Travel Website On The Examples Of: Booking.com; TripA...
Content Marketing For A Travel Website On The Examples Of: Booking.com; TripA...robertpresz7
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceDamien ROBERT
 
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptxBrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptxcollette15
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!dstvtechnician
 
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfDIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfmayanksharma0441
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingJuan Pineda
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx216310017
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guidekiva6
 
How To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot SetupHow To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot Setupssuser4571da
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies bruguardarib
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfarsathsahil
 

Recently uploaded (20)

定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
 
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategyDIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptx
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
 
Cost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesCost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surges
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)
 
Best Persuasive selling skills presentation.pptx
Best Persuasive selling skills  presentation.pptxBest Persuasive selling skills  presentation.pptx
Best Persuasive selling skills presentation.pptx
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
 
Content Marketing For A Travel Website On The Examples Of: Booking.com; TripA...
Content Marketing For A Travel Website On The Examples Of: Booking.com; TripA...Content Marketing For A Travel Website On The Examples Of: Booking.com; TripA...
Content Marketing For A Travel Website On The Examples Of: Booking.com; TripA...
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
 
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptxBrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptx
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!
 
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfDIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO Copywriting
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guide
 
How To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot SetupHow To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot Setup
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdf
 

Need to Know - Real Intelligence Training

  • 2. With extensive backgrounds in Australia’s intelligence community, Need to Know – Real Intelligence Training provides specialised training on practical, real-world skills designed to tackle the toughest investigative, analytical, information collection, deployment and situational awareness challenges for companies and Government Departments that face threats. Need to Know is not a typical training company. Rather than providing courses designed to fit a generic need, Need to Know develops bespoke, tailored training courses to fit a client’s training or skills gaps. We bring proven capabilities in developing, delivering and reviewing training to professional intelligence and security services, military and police. Our tried and tested training methodology is critical for organisations needing something more than that offered by traditional training companies. Real Intelligence Training
  • 3. Are your employees ever put in risky or uncertain situations? Do your people know how to identify, assess and measure threats, risks and priorities? Do they know the indicators to look for? Would it help if employees had a better understanding of the insider threat and the damage one person can cause? Is your organisation’s security culture based on a commitment and adherence to strong policies and procedures, or hopeful thinking? Should an attack occur, who in your company deals with the consequences? Do your investigators know how to strategically analyse tactical information to quickly and confidently identify information gaps? Have you had, or could you have, an incident at or near your workplace that has led to your employees feeling threatened or scared? Why Need To Know
  • 4. Need to Know training is for government and industry that have employees in the following sectors: Security & Protection Law Enforcement Border Protection Intelligence Agencies Assessment, Strategic & Tactical Analysis Fraud & Investigation Compliance Legal Customer Service Finance & Insurance Retail Hospitality Mining & Energy Health & Safety Media Events Coordination Who uses our services
  • 5. Our training is suitable for organisations that: need protection from the malicious insider threat, or conduct internal investigations; have critical infrastructure assets; conduct or review investigations; analyse data or information; assess threat, risk or priority; provide front-line customer service; are involved in sales; interact with members of the public; elicit information from vulnerable, deceptive or uncooperative people; deploy employees to remote, dangerous or unfamiliar environments; require employees to be alert and aware of their surroundings; are susceptible to commercial espionage; have or need internal security practices or policies; require asset protection; or use practical information collection skills. Who our courses are for
  • 6. Insider Threat Awareness/ Malicious Insider Threat workshop The inability to accurately predict if someone is going to become a malicious insider is one of the biggest security challenges faced by government and business today. Most insider attacks are deliberate, but some employees compromise their organisation unwittingly through poor judgement or a lack of security understanding. The scale of harm one individual can inflict is disproportionately large, and organisations need to be alert to the indicators of a potential threat. Early detection is critical. SKILLS DEVELOPMENT Our insider threat will give you the skills to: identify indicators of a potential insider threat understand behaviours and motivations build a strong security culture develop organisational resilience better manage potential threats What training we offer SAMPLE COURSES
  • 7. Situational Awareness and Personal Safety Using security awareness techniques developed by intelligence agencies and law enforcement, the situational awareness skills we teach are practical and tailored to the current security threat environment. Effective personal security awareness and counter-surveillance techniques can help you identify and take action against potential threats before they happen, whether they come from a disgruntled customer or client, criminal elements, or those otherwise seeking to take advantage of or intimidate your staff. These skills are particularly important if you work in front-line customer service, roles requiring public interaction (particularly with potentially violent or criminal elements), or even in a role where your personal vehicle is parked in a non-secure location near your workplace. SKILLS DEVELOPMENT Our situational awareness and personal safety training will give you the skills to: understand the current security environment actively manage own personal safety and enhance understanding apply situational awareness and physical security measures to your environment identify and respond to perceived and real threats to personal safety build familiarity with surveillance capabilities and counter-measures understand and demonstrate the fundamental principles of counter- surveillance demonstrate enhanced situational awareness and the ability to interpret the environment and people around you to better ensure your personal safety Continued What training we offer OTHER SAMPLE COURSES
  • 8. Investigative Tools and Techniques We teach investigative processes that can be practically applied using a range of analytic tools and techniques. We examine different types of creative and critical thinking and the impact the human brain has on reasoning, investigations and analysis. We look at identifying bias, mindset and assumption issues and introduce methods for overcoming them. Our training introduces methods designed exclusively by Need to Know on identifying, assessing and measuring threat, risk and priority. If your organisation deals with multiple investigations or needs to measure threat and risk, this unique, powerful tool is perfect for you. SKILLS DEVELOPMENT Our investigative tools and techniques training will give you the skills to: identify the components of an investigation generate considered and prioritised information requirements prepare information collection plans apply a range of analytical tools and techniques to work more effectively and efficiently collect, assess and judge information assess and measure threat, risk and priority avoid common investigative pitfalls and work to reduce the impact of bias Introduction to Intelligence In our work and daily lives we are often confronted with incomplete, incorrect or deliberately misleading information. Information can come in any form – written, spoken, audio, visual, open source or classified. It is just information until it is collated, evaluated and assessed for its meaning. We focus on understanding information and how it becomes intelligence, how it differs from evidence and how it can be used to identify security threats and protect commercial interests. SKILLS DEVELOPMENT Our sessions introducing intelligence will give you the skills to: identify the differences between information, intelligence and evidence understand how information is collected, handled and assessed understand and apply knowledge of the Intelligence Cycle identify the significance and urgency of specific information critically assess and evaluate raw intelligence Continued What training we offer OTHER SAMPLE COURSES
  • 9. Continued What training we offer Interview Tradecraft We can help you develop the skills required to conduct difficult or complex interviews focusing on information collection in a hostile environment or with uncooperative subjects. Our training will help you to prepare for and understand the skills necessary to conduct effective interviews and make clear, accurate and supported assessments. We will show you how to communicate your findings, construct a defendable argument and be able to make logical and sustainable recommendations based on the information you have collected. We can teach you to identify deception, to ask the right questions at the right time, and to build rapport in order to get the information you need from an interview. SKILLS DEVELOPMENT Our interviewing tradecraft training will give you the skills to: prepare for and conduct complex interviews and debriefings use effective verbal and non-verbal communication skills apply your perception to achieve interview objectives understand and detect deception and lies employ effective strategies to communicate with uncooperative or hostile interview subjects understand and use influence and persuasion techniques OTHER SAMPLE COURSES
  • 10. With a proven track record in developing the skills and competencies of officers in intelligence roles, we stand by our training – both its content and delivery. We are not interested in presenting a course that does not produce results and we believe our training speaks for itself. Our material is constantly revised, tested, evaluated and critiqued. The content is cutting edge and presented with a focus on real-world, practical outcomes. The tools and techniques we provide have been taught to, and are used by, more than 100 international agencies responsible for critical investigations. By working with you to develop tailored content, we set firm deliverables for the training provided, and measure against these at the conclusion. Contact us today for our training methodology and approach. Our approach
  • 11. We have over 27 years combined experience as professional intelligence officers in Australia’s intelligence community. Our tradecraft has been learnt in counter-terrorism, investigative analysis, counter-espionage, and security assessments, and we have been deployed to some of the most unforgiving and high threat environments around the world. We are skilled facilitators and our unique expertise comes from working in Australia with domestic security and intelligence agencies and training international intelligence, military and police services. We keep our content current and our methods bench marked against new theory and emerging concepts. Our workshops are highly engaging and interactive. We involve participants immediately through facilitated discussions and by bringing our own personal experiences into the training to show relevance and demonstrate principles. We also use syndicated small group activities and realistic scenario exercises based on Australian case studies to highlight lessons learnt and show how industry manages developing risks and threats. As former intelligence officers, we have a range of professional contacts in the security, law enforcement, intelligence and military around the world. To deliver the best outcomes for our clients, we ensure our trainers are appropriately experienced, qualified and motivated to deliver our material. We engage subject matter experts and skilled practitioners to ensure our clients receive techniques and methods that are proven to be effective Our trainers have delivered their courses to the intelligence community, military and police across Australia. They have also deployed their training across the Middle East, East Asia, the Sub-continent, Africa, Europe and the Pacific. We train the professionals – and now we bring it to you. Our founders
  • 12. Further information Our courses are affordable, accessible and directly relevant. Courses start from $500 per day per person. Please contact Paul McLeay for more information and to discuss your needs. P. 02 9223 7717 M. 0418 610 489 E. admin@needtoknowtraining.com.au PO Box 5228 Braddon ACT 2612 Australia