Stewart Bertram

About Stewart Bertram

Stewart Bertram is Head of Cyber Threat intelligence here at Elemendar. With more than 15 years experience in intelligence and security, Stewart ensures that our AI maintains superior capabilities in understanding CTI. Stewart’s experience within the Cyber Threat community spans both across the private and public sector. Highlights include involvement in leading some of the early threat led penetration testing projects under the UK’s CBEST, Netherland’s TIBER and Hong Kong’s iCAST programs. Similarly, developing one of the first online training courses for CREST accredited CTI qualifications and building and running a number of enterprise level CTI teams.

Analysing Disinformation: What Can Be Applied From CTI?

APT 28, APT 1, Conti, Lazarus Group and Anonymous are all names that have become ‘poster children’ for cyber threats over the past decade or so. Identifying, describing, and monitoring threat actors/groups is indeed a cornerstone of modern Cyber Threat Intelligence (CTI). Many security service providers differentiate themselves by the

By |2023-04-04T09:55:18+00:00March 31st, 2023|

Field Report, South Korea: Elemendar and the Department of International Trade Mission

Elemendar recently made our first official visit to the Republic of Korea (South Korea). We were part of the UK’s Department of International Trade mission, run during Cyber Week by the British Embassy in Seoul. South Korea has long been somewhat of a ‘promised land’ for Cyber Threat Intelligence (CTI).

By |2023-03-02T14:11:04+00:00March 2nd, 2023|

Let Slip The Dogs of (Cyber) War – Says The Kremlin (basically)

“Russia wants to legalise cybercrime for homeland [security]” – Oh My, that IS shocking! Was my initial reflection on this headline from a piece by Gintara Radauskas published in Cybernews. I then immediately thought this article was either A.) a case of sloppy reporting (I hoped) or B.) a further

By |2023-03-01T09:48:38+00:00February 28th, 2023|

MITRE ATT&CK: Useful or SOC Window Dressing?

No one can dispute that MITRE ATT&CK is now a cornerstone of modern Cyber Threat Intelligence. Many security programs have been built around the framework, including Elemendar’s flagship tool, READ. READ. uses machine learning to extract ATT&CK tactics, techniques, and procedures (TTPs) from text documents.  But despite its lauded status,

By |2023-01-16T11:18:18+00:00January 12th, 2023|

Analysing Disinformation: Defining The Capability Of A Threat

Disinformation is the new kid on the block of the threat and risk analysis community. Tricky to define and challenging to anticipate multiple frameworks are being developed to help analyse the disinformation capabilities of malicious actors. The Disarm framework offers a structure similar to the lauded MITRE ATT&CK framework. Charity

By |2023-01-09T17:20:26+00:00January 9th, 2023|

Cyber Threat Intel: Can Your SOC Afford To Lose It?

In the face of an economic downturn, if not outright recession, cyber-security budgets are being scrutinised right alongside everything else. Many CISOs question what’s being spent on Cyber Threat Intelligence (CTI). They’re forgetting – or maybe ignoring – the absolute necessity of CTI within a security operations center (SOC) environment.

By |2022-11-29T17:03:11+00:00November 29th, 2022|

Where Does AI Driven CTI Fit Within “Shields Up?”

“Shields Up” is a current initiative that was launched by the US Cybersecurity and Infrastructure Security Agency's (CISA) earlier this year. With the aim to protect the US and organisations from cyber threats spilling over amid the Russian Federation’s invasion of Ukraine, despite some confused assessment, the Russia/Ukraine conflict has proved

By |2022-10-04T17:10:55+00:00October 4th, 2022|
Go to Top