SlideShare a Scribd company logo
1 of 227
Download to read offline
Audience manual.
Please:
- Do not try to read all the content
- ‘Skim absorb’ the slides quickly (~3s)
- Refer back to this deck later if useful
- Sit back and enjoy the ride!
Opinions were
shared. Mistakes
were made.
@CxOSidekick
Where we’d like to be
vs
Where we find ourselves
If we’re making all the
right moves, and we’re
not winning, we need to
change the game.
If we’re making all the
right moves, and we’re
not winning, we need to
change the game.
understand what the games are,
where to play what game, and when.
How should we think
about this problem?
Everyone is a security
architect. Some people
just aren’t aware of it.
Identify
Protect
Detect
Respond
Recover
Identify
Protect
Detect
Respond
Recover
As downstream as it gets of
conscious and unconscious
architecture decisions.
But architecture of what?
Give up thinking about "Defense" and "Offense" and
start thinking about what is being controlled by
what, or in other words what thing is being informed
or instrumented or manipulated by what other thing.
- Dave Aitel
https://cybersecpolitics.blogspot.com/2017/04/0-12-and-some-duct-tape.html
Security is a complex
system (controls)
operating in a complex
system (the business).
- Where are we and what are the conditions?
- What are the patterns of play available to us?
- Which do we select and how do we apply them?
- How do we track progress to target and trajectory?
The mission?
Protection
Too much Impossible.
Find and reduce
control friction.
Reduce spend. Find
and reduce control
friction.
Just right Impossible. Target
Deliver efficiency
gains to reduce
spend.
Too little
Build business
aligned strategy
and efficient
operations, then
raise spend.
Optimise control
design, delivery and
operationalisation.
Reduce spend.
Solve gaps / failures
in strategic and / or
operational
process.
Too little Just right Too much
Investment
Act to achieve balance
Understand adversary opportunity in it
Understand activity across it
Understand the terrain
Act to achieve balance
Understand adversary opportunity in it
Understand activity across it
Understand the terrain
Act to achieve balance
Understand adversary opportunity in it
Understand activity across it
Understand the terrain
Act to achieve balance
Understand adversary opportunity in it
Understand activity across it
Understand the terrain
System entropy and / or complexity
Operating constraints
Culture of operations
Target capex / opex ratio
Capacity to absorb change
Delivery capability
System entropy and / or complexity
Operating constraints
Culture of operations
Target capex / opex ratio
Capacity to absorb change
Delivery capability
Change
Time
Amount
Target level of protection
$
Actual level
of protection
Phase Effort Cost Time
Buy £
Design £££
Deploy ££
Tune ££
Operationalize ££££
Optimize £
Option 1
Identify Protect Detect Respond Recover
Option 2
2. Collect data
3. Analyze 1. Hypothesize
4. Validate
Hunt
1. Collect data
2. Analyze
3. Validate
4. Escalate
1. Discover
2. Triage 4. Monitor
3. Remediate
1. Prepare
2. Detect
3. Manage
4. Learn
Vuln
SOC
CSIRT
1. Collect data
2. Process 4. Share
3. Use
Intel
3. Triage
Red Team
1. Scope
2. Att&ck
4. Share
Withapologiesto@dextercaseyformakingthisamess
On reaching
worthy destinations.
Act to achieve balance
Understand adversary opportunity in it
Understand activity across it
Understand the terrain
What will define
our success here?
How we translate our
understanding into choices.
Where do we place our
resources on the field?
In what pattern?
How do we direct
their effort?
Why here, not there?
Why this direction, not that?
Why ‘this much’, not
more or less?
A graph, built and
then filtered, by applying
our mental model of
understanding.
Wisdom filters
Understanding maps
Knowledge graphs
Information tables
Data captures
The reaching
of worthy
destinations
gets easier
“Data captures. Information tables. Knowledge
graphs. Understanding maps. Wisdom filters.
And if that's right … if traditionally defenders think in
tables and attackers think in graphs, then the future
is owned by cartographers who can navigate
maps, and refine [paths through] them by filtering
to reach worthy destinations.”
@dantiumpro
A visual metaphor for
filtering paths through a
graph to reach worthy
destinations, using a map.
Explicit.
It is harder (or easier) to do
certain things in some
terrains, but not others
due solely to the terrain.
It is harder (or easier) to do
certain things depending
on our position in the
terrain.
Implicit.
It is harder (or easier) to do
certain things due to the
forces acting on the
terrain.
Who controls it?
How do they perceive it?
What are their concerns
and pressures?
How are they making
decisions?
What actions are they
taking?
Act to achieve balance
Understand adversary opportunity in it
Understand activity across it
Understand the terrain
change in
<
change in
< change in
<
Identify
Protect
Detect
Respond
Recover
What is the range of
forces we are either at
the mercy of, or can
influence / conjure?
Micro-climates
Weather patterns
Tectonics
Micro-climates
Weather patterns
Tectonics
Predictability
ofchange
Scale of change
“Only a crisis - actual or perceived - produces real
change. When that crisis occurs, the actions that
are taken depend on the ideas that are lying
around. That, I believe, is our basic function: to
develop alternatives to existing policies, to keep
them alive and available until the politically
impossible becomes the politically inevitable.”
- Milton Friedman
https://en.wikiquote.org/wiki/Milton_Friedman
Reactive.
Proactive.
Shih
"Like any part of the world we might provisionally
mark off ... people and things will move through it in
a patterned way. We can take advantage of that
flow, in some instances riding its energy. The world
doesn't consist of solid things, but flows of forces, or
shifting configurations of shih."
There are changing
patterns.
"Shih exists only moment to moment. But one can
learn to recognise it ... as someone with a good eye
knows which way water will flow through a range of
hills, just from seeing the form of a value and its
surrounding spurs and ridges. Then we can
determine where to place a dam in this landscape -
seeing the simple and easy thing that changes
the whole configuration."
If we understand them,
we can see simple ways
to harness them.
"Shih is the power inherent in configuration; it does
not rely solely on powerful components. The node is
the small juncture between the sections of bamboo.
It indicates the abrupt moment at which
something occurs. It must be short: it's target is
always in motion. The power of shih comes from
combining these two elements. When you pull the
trigger of a crossbow, its gradually accumulated
energy is released all at once, in a spot."
If we’re prepared, we can
act quickly, without waiting
for (or causing) chaos.
Wisdom filters
Understanding maps
Knowledge graphs
Information tables
Data captures
Ease to reach
worthy
destinations
2d
3d
4d
Knowledge graphs offer a
scalable way to structure,
connect, identify and
share patterns.
When we presented our
ontology at BSidesLV ...
… we were taking all this ...
Business Security
Assets
Functions
Teams
Skills
Processes
Projects
Partners
Governance
Risks
Impacts
Threat Actors
Actor Motivations
Threat Tactics
Attack Surfaces
Controls
Vulnerabilities
Threat Models
Security Events
Security Incidents
Attack Paths
Technology
IT Systems IT Assets
… and trying to codify how
to link data across business
and technical dimensions
to identify patterns.
https://github.com/owasp-sbot/GraphSV-demo-data
This allowed us to start
capturing our terrain (aka
landscape) and influencing
factors (aka climate).
It didn’t show us the merits
of expending effort in a
direction in an area of terrain
to achieve our mission.
On patterns of play.
How do I reduce adversary
opportunity across the
terrain with greatest
efficacy?
Patterns reduce exposure
to compromise that
would result in an
unacceptable impact.
Interesting to
Threat Actor
Yes
No
No Yes
Easy to Compromise
When we act, we’re
recognising 1< patterns,
then implementing one or
more patterns.
Generic of terrain, what
factors will determine our
ability to deliver state
change?
Where you place your
resources on the field.
The pattern of resources
you choose.
How they interact.
How much effort they
have to expend on the
terrain to achieve balance.
The gamespace in which
they counter adversary
opportunity.
How can we reason
through available patterns,
which to select and how to
apply them?
How can we present that
model and make it easily
grokable for our colleagues?
Threat Actor
Motivation
Financial Gain Subversion Espionage Destruction
Nation State
Organised Crime
Hacker / hacktivist
Script Kiddie
Non-technical
insider
Threat Actor
Nation State
Organised Crime
Hacker / Hacktivist
Script Kiddie
Non-technical
insider
Advanced tools and tactics, only available to
government agencies
Ecosystem of commoditized services for business
compromise, access to systems, data exfil, etc
Capable individuals or groups who operate
using skills, experience and free / paid tools
Widely known tactics freely available
online and easy to try out
Anyone who knows how to
use the delete button on a file
Triangle indicates threat actor
population size (not to scale)
External
Internet
External
Social
External
Physical
Internal
Physical
Internal
Social
Internal
Cyber
Internal
Privileged
3rd party?
Available to
anyone
with an
internet
connection
Available to
anyone who
can get to a
site we own
Should
only be
admins
and VIPs
NB: This start point should be
furthest away from a vital asset. It
is also where the greatest number
of threat actors can reach us.
Attack
surface for
‘standard
user’
NB: This start point will be closest to
vital assets. Ideally it has the least
number of actors to contend with and
is the most tightly controlled.
Phone,
email,
down the
pub
Once you’re
inside our sites
these surfaces
are open to you
Nation
State
Organised
Crime
Hacker /
Hacktivist
Script
Kiddie
Non-tech
insider
External
Cyber
External
Social
External
Physical
Internal
Physical
Internal
Social
Internal
Cyber
Internal
Privileged
https://pharossecurity.com/
Nation
State
Organised
Crime
Hacker /
Hacktivist
Script
Kiddie
Non-tech
insider
External
Cyber
External
Social
External
Physical
Internal
Physical
Internal
Social
Internal
Cyber
Internal
Privileged
https://pharossecurity.com/
Nation
State
Organised
Crime
Hacker /
Hacktivist
Script
Kiddie
Non-tech
insider
External
Cyber
External
Social
External
Physical
Internal
Physical
Internal
Social
Internal
Cyber
Internal
Privileged
Identify Protect Detect Respond Recover
Access C1 C3 C5 C7
Data C1 C4 C5 C9
Apps C2 C5 C10
Device C6 C8 C10
Network C1 C4 C6 C8 C10
https://pharossecurity.com / @sounilyu’s cyber defence matrix
Nation
State
Organised
Crime
Hacker /
Hacktivist
Script
Kiddie
Non-tech
insider
External
Cyber
External
Social
External
Physical
Internal
Physical
Internal
Social
Internal
Cyber
Internal
Privileged
Identify Protect Detect Respond Recover
Access C1 C3 C5 C7
Data C1 C4 C5 C9
Apps C2 C5 C10
Device C6 C8 C10
Network C1 C4 C6 C8 C10
Strong value Can be optimised Reallocate spend
https://pharossecurity.com / @sounilyu’s cyber defence matrix
Efficacy in relation to the
range of possible options.
Attack game space Target game space
Vector Exploit Attack surface Vulnerability
Paths to reach
the target
Means to
compromise it
Exposed
weaknesses
Weaknesses the
exploit can use
Change is
rare
Change is
frequent
Change
collapses
controls
Change
degrades
controls
Change needs operational or
tactical response to close gaps or
address failures
Constrain Reduce Fix
Thanks to @sounilyu for this framework
Vector
Exploit
Attack
Surface
Vuln
Access
Data
Apps
Device
Network
Identify Protect Detect Respond Recover
Thanks to @sounilyu for this framework
Constrain
Reduce
Fix
Target game space
Attack game space
Vector
Exploit
Attack
Surface
Vuln
Paths to reach target
Means to compromise target
Exposed weaknesses
Weaknesses the exploit can use
Change
rare
Change
frequent
Access
Data
Apps
Device
Network
Identify Protect Detect Respond Recover
Thanks to @sounilyu for this framework
Identify Protect Detect Respond Recover
Access
Data
Apps
Device
Network
External
Internet
External
Social
External
Physical
Internal
Physical
Internal Social Internal Cyber Internal
Privileged
3rd party?
Vector
Exploit
Attack
Surface
Vuln
Identify Protect Detect Respond Recover
Access
Data
Apps
Device
Network
Vector
Exploit
Attack
Surface
Vuln
External
Internet
External
Social
External
Physical
Internal
Physical
Internal Social Internal Cyber Internal
Privileged
3rd party?
< thought experiment >
Interesting to
Threat Actor
Yes
No
No Yes
Easy to Compromise
Interesting to
Threat Actor
Yes
No
No Yes
Easy to Compromise
Interesting to
Threat Actor
Yes
No
No Yes
Easy to Compromise
Interesting to
Threat Actor
Yes
No
No Yes
Easy to Compromise
Interesting to
Threat Actor
Yes
No
No Yes
Easy to Compromise
How could your actions
change how ‘good’
everyone’s adversaries are?
How could the actions of
others change how ‘good’
your adversaries are, or
what they’re interested in.
How could threat actors
change what they are
interested in?
</ thought experiment >
What is the stability and
longevity of our control
capability portfolio?
Are we making the right
trade offs in the patterns
we’re applying?
What fast and slow cycle
changes are we ready for?
Are we happy with all
those answers?
The status woe.
Strategic
Operational
Tactical
Meaningful
Yes
Domain expert
assessments
???
No
Governance,
Risk and
Compliance
reports
Telemetry,
alerts, logs
No Yes
Timely
Identify Protect Detect Respond Recover
Fire
proofing
Fire
fighting
Arson
investigation
Identify Protect Detect Respond Recover
Fire
proofing
Fire
fighting
Arson
investigation
That’s where incoming
data creates the greatest
need for context.
Time
Amount
$
FPaaS
Return
Alerts going into an inbox; no one
knows where they’re from.
Alerts going into a SIEM; no one
knows where they’re from.
We built a data lake on open
source.
Niche analytics vendor sits on top
of your SIEM; it’s useless.
Come and join our hunt team!
An ML anomaly detection ‘solution’
generating 1000s of alerts.
How different a threat
actor looks to ‘normal’
Threat actor
adaptability
Hunter
Analyst
Operator
How different a threat
actor looks to ‘normal’
Threat actor
adaptability
Hunter
Analyst
Operator
Graphs
Tables
Lists
How different a threat
actor looks to ‘normal’
Threat actor
adaptability
Lists
Tables
Graphs
Graphs but ... partial
context from the bottom
up, that struggles to
connect top down.
Inability to get complete
enough representations
that communicate
strategic deficiency and
effect improvement.
Evilution.
An unexpected
outcome in hindsight.
A step in an attack path,
which we expected to
detect and respond to
successfully - but didn't.
Did we recognise it?
Yes
No
No Yes
Did we respond to it?
What went wrong?
Did we recognise it?
Yes
No
No Yes
Did we respond to it?
Sensors
Analytics
Orchestrators
Actuators
Did we recognise it?
Yes
Missed, mis-
prioritised or
no alert
No
No Yes
Did we respond to it?
Did we recognise it?
Yes
No
No Yes
Did we respond to it?
Sensors
Analytics
Orchestrators
Actuators
Successful detection, but
did not trigger a course of
action.
Did we recognise it?
Yes
Alert ignored, or
poorly triaged /
investigated
No
No Yes
Did we respond to it?
Did we recognise it?
Yes
No
No Yes
Did we respond to it?
Sensors
Analytics
Orchestrators
Actuators
Successful detection and
workflow, but wrong
action.
Did we recognise it?
Yes
No
Gap or failure
in detection
logic
No Yes
Did we respond to it?
Did we recognise it?
Yes
No
No Yes
Did we respond to it?
Sensors
Analytics
Orchestrators
Actuators
Data was there, but
detection was deficient.
Did we recognise it?
Yes
No
Post hoc
investigation
triggered by
something else
No Yes
Did we respond to it?
Did we recognise it?
Yes
No
No Yes
Did we respond to it?
Sensors
Analytics
Orchestrators
Actuators
Data was not collected
or available.
But if you asked
your team?
Did we detect it?
Yes
Turned the
noise down;
didn’t have
time
It looked
innocuous,
we’ve done ‘x’
1000 times
No
Vendor won’t
share their
detection logic
No obvious
pipeline failure
No Yes
Did we respond to it?
When you think
about failures across
these layers ...
Did we recognise it?
Yes
No
No Yes
Did we respond to it?
Sensors
Analytics
Orchestrators
Actuators
Invisible or known?
Silent or loud?
Consistent or inconsistent?
Local or global?
What layer(s) did the
failure(s) happen?
How can we safeguard
and assure against
failure modes?
Actuators
Orchestration
Analytics
Sensors
Defence Data Science.
In 2013, John Allspaw
(then the CTO of Etsy)
wrote a blog post on
‘Owning Attention’.
What I’m interested in is not how software can be used to detect
anomalies automatically, (well, I’m interested, but I don’t doubt that
we all will continue to get better at it) … it is how people navigate this
boundary between themselves and the machines they work with.
The boundary between humans and machines, as we observe our
use of tools, is a focus in and of itself. If we have any hope of making
progress in monitoring complex systems, we must take this boundary
into account.
https://www.kitchensoap.com/2013/07/22/owning-attention-considerations-for-alert-design/
Actuators
Orchestration
Analytics
Sensors
This is a problem
Feedback Loops
Action
Trust
Communication
Insight
Context
Analysis
Transformation
Platform
Pipeline
API
Data
Sensor
Human Interaction
Data Science
Data Engineering
This is a problem
Give up thinking about "Defense" and "Offense" and
start thinking about what is being controlled by
what, or in other words what thing is being informed
or instrumented or manipulated by what other thing.
https://cybersecpolitics.blogspot.com/2017/04/0-12-and-some-duct-tape.html
Lots of tables joined
together is a leading
indicator you’re entering a
strategic problem space.
How different a threat
actor looks to ‘normal’
Threat actor
adaptability
Lists
Tables
Graphs
Operational layer,
strategic problem
As we enter strategic
problem spaces, we need
to think how we use
signals, and apply them to
populations.
How we combine human
and machine learning loops.
Knowing what to
EXPECT
Knowing what to
LOOK FOR
Knowing what to
DO
Knowing what has
HAPPENED
Anticipation
Monitoring
Response
Learning
https://www.kitchensoap.com/2012/06/18/resilience-engineering-part-ii-lenses/
Recognition
What you can
COLLECT
What you can
RECOGNISE
What you can
JOIN UP
What you can
INTERPRET
Sensors
Analytics
Orchestrators
Actuators
What problem space are
we in, what signals are
likely available, how do
we partner with them?
Signal strength
Signal density
Signal sim
ilarity
Signal
Strength
Signal Density
Unbounded
Unbounded
Bounded
Wicked
Strong
Weak
Sparse Dense
Signal
Strength
Signal Density
Field of uncertainty with
limited scope, the details
of which can be reduced
over time to a boundary of
relative certainty.
No set formulae or chance
to learn by trial and error,
and no way to know your
solution is definitive as it
can’t be true or false, just
good or bad.
Defy easy restriction and
do not easily converge to
a boundary of certainty
(even with great effort.)
Unbounded
Unbounded
Bounded
Wicked
Strong
Weak
Sparse Dense
Signal
Strength
Signal Density
Unbounded
Unbounded
Bounded
Wicked
Strong
Weak
Sparse Dense
Tactical
O
perational
Strategic
Grand
Strategic
Signal
Strength
Signal Density
Unbounded
Unbounded
Bounded
Wicked
Strong
Weak
Sparse Dense
Tactical
O
perational
Strategic
Grand
Strategic
Tectonics
W
eather
Patterns
M
icro
Clim
ates
Signal
Strength
Signal Density
Unbounded
Unbounded
Bounded
Wicked
Strong
Weak
Sparse Dense
Data
Inspired
Data
Informed
Data
Driven Tactical
O
perational
Strategic
Grand
Strategic
Tectonics
W
eather
Patterns
M
icro
Clim
ates
Signal Strength
Signal Density
Unbounded
Unbounded
Bounded
Wicked
Strong
Weak
Sparse Dense
Maps
Graphs
Tables
Lists
Data
Inspired
Data
Informed
Data
Driven Tactical
O
perational
Strategic
Grand
Strategic
Tectonics
W
eather
Patterns
M
icro
Clim
ates
Signals
The things they connect
The relationships they suggest
The answers we can get
How we think about using those
The tools we need
https://www.kitchensoap.com/2013/07/22/owning-attention-considerations-for-alert-design/
What if we viewed alerting systems as a partner? What does the
world look like if we designed alerting systems to cooperate with us?
If trust in alerting systems is such a big deal, as it is with the GPWS
and alert numbness, what can we learn from how humans learn to
trust each other, and let that influence our design decisions?
In other words: how can we design alerts that support our efforts
to confirm their legitimacy, or our expectations when an alert will
fire?
Visibility
Too much
Stop centralising so
much data. Question
your collection criteria.
Look at filtering.
Optimise what you’re
collecting. You have
more visibility than you
need / can handle.
Probably too many
default alerts, paying
too much for data
centralisation. Pare
things back.
Just right
Optimise recognition
for malicious,
informational, etc.
Just right
Tune out recognition
based on user need /
available resources.
Too little
Get the right data for
priority problem sets
and ramp up
recognition.
Get clarity on why
alerts are firing, or
optimise your triage
workflow.
Reconsider your choice
of vendor or the way
you’ve integrated
things.
Too little Just right Too much
Recognition
Signals
Analytics
Recognitions
Workflows
Notifications
Reviews
Signals
Source 4
Source 3
Source 2
Source 1
T1 T2 T3 T4
Set Sequence
Structure
DataSources
Time Periods
Analytics
Recognition
problem
<blah>
Data Sources
1 2 1 3 2 4 4 5 2 6
Analytics steps
to solve
1 2 3 4 5
Type of analytic Streaming
Needle /
Haystack
Sort
Filter
Anomaly Search
Feature A
Feature B
Feature C
Platform 1
Feature B
Feature C
Feature D
Platform 2
Feature B
Feature D
Feature E
Platform 3
Recognitions
Adversary opportunity within it
Target game space
Attack game space
Vector
Exploit
Attack
Surface
Vuln
Paths to reach target
Exposed weaknesses
Weaknesses the exploit can use
Movement across it
The terrain
Identify Protect Detect Respond Recover
Understand
Means to compromise target
The right level of ‘zoom’.
Adversary opportunity within it
Target game space
Attack game space
Vector
Exploit
Attack
Surface
Vuln
Paths to reach target
Exposed weaknesses
Weaknesses the exploit can use
Movement across it
The terrain
Identify Protect Detect Respond Recover
Understand
AchieveBalance
Aggregate,
Divide,Filter
Means to compromise target
Workflows
Recognition
Fidelity
Recognition
Volume
High
Medium
Low
LF
Amount
MF HF
LF
Amount
MF HF
LF
Amount
MF HF
Repeat
benign
N
ovel
benign
Repeat
suspicious
N
ovel
suspicious
M
alicous
RareContinuous
Population
Criticality
Population Size
High
Medium
Low
Population
Criticality
Population Size
Execs, VIPs,
Super Users
Management, Back
Office, Lead Devs
Everyone else
Population
Criticality
Population Size
Execs, VIPs,
Super Users
Management, Back
Office, Lead Devs
Everyone else
By role
Bybehaviour
Notifications and reviews
High
Moderate
Low
None
S1 S2 S3 S4 S5 S6
Fidelity
Attack Path Steps
A graph … finally.
Points of
Evidence
Points of
Evidence
Points of
Evidence
Points of
Evidence
Points of
Evidence
Points of
Evidence
Points of
Evidence
Points of
Evidence
Points of
Evidence
Points of
EvidenceAsset
Point of
Evidence
Control
1
Identify
Fact
1
Assumption 1
Statement of
adversary
opportunity
FAIR analysis
Advisory
Pattern
1
Biz, tech
and
project
context
Project /
Story
How do I bring our team around a living picture of our
terrain, activity across it, and adversary opportunity
within it - so that we have shared context to think
through questions like:
- Where are we and what are the conditions?
- What are the patterns of play available to us?
- Which do we select and how do we apply them?
- How do we track progress to target and trajectory?
How do I present ‘the facts’ my colleagues need to
make the best possible judgement call based on
available data, (i.e. to accept risk, mitigate risk, get
more data), while also exposing ‘how we should think
about this problem’ by putting facts in the context of
relevant frameworks. Oh, and do so in way that
speaks to their horizon, accountability and concerns.
In closing.
"Strategy is all about observing the landscape,
understanding how it is changing and using
what resources you have to maximise your
chances of success."
- Simon Wardley
Tools to reason through
higher order problem, so we
can make wise trade offs.
@SWardley’s
two whys
Sun Tzu’s
five factors
Boyd’s
OODA
@SounilYu’s
defense stack
@DantiumPro’s
progression
@CxOSidekick’s
question list
Why of
movement
Landscape
Observe Sensors
Knowledge
Graphs
Where are we,
and what are the
conditions?
Climate
Doctrine Orient Analytics
Understanding
Maps
What are the
patterns of play
available to us?
Leadership Decide Orchestrators Wisdom Filters
Which do we select
and how do we
apply them?
Why of
mission
Purpose Act Actuators
Data Captures
and information
tables
How do we track
progress to target
and trajectory?
Defence Data Science - BlueHat Seattle, 2019

More Related Content

Similar to Defence Data Science - BlueHat Seattle, 2019

Seeing through complexity
Seeing through complexitySeeing through complexity
Seeing through complexityEmiliano Soldi
 
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSOAlexander Hutton
 
Types of environment
Types of environmentTypes of environment
Types of environmentMegha Sharma
 
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialArchitecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialWill Gallego
 
C.NEP_MOTION anoop sir.pptx
C.NEP_MOTION anoop sir.pptxC.NEP_MOTION anoop sir.pptx
C.NEP_MOTION anoop sir.pptxanoopsingh827279
 
Multi-Agent Simulator - Emergence
Multi-Agent Simulator - EmergenceMulti-Agent Simulator - Emergence
Multi-Agent Simulator - EmergenceTINZ
 
Favoring the Emergence through Agile Scaffolding
Favoring the Emergence through Agile ScaffoldingFavoring the Emergence through Agile Scaffolding
Favoring the Emergence through Agile ScaffoldingEmiliano Soldi
 
Scenario Building
Scenario BuildingScenario Building
Scenario BuildingCapt Sagar
 
"Managing Complexity" Executive MBA Presentation (3/3)
"Managing Complexity" Executive MBA Presentation (3/3)"Managing Complexity" Executive MBA Presentation (3/3)
"Managing Complexity" Executive MBA Presentation (3/3)atknapp
 
20231123 Foresight Tools Slideshare.pdf
20231123 Foresight Tools Slideshare.pdf20231123 Foresight Tools Slideshare.pdf
20231123 Foresight Tools Slideshare.pdfMcGuinness Institute
 
Week 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docxWeek 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docxmelbruce90096
 
Final review nopause
Final review nopauseFinal review nopause
Final review nopausej4tang
 
Principles of visitor management
Principles of visitor management Principles of visitor management
Principles of visitor management Steve McCool
 
Mental models long
Mental models   longMental models   long
Mental models longJai Chenna
 
Visualizing for Systems
Visualizing for SystemsVisualizing for Systems
Visualizing for SystemsSam Pottinger
 
Designing Events-first Microservices
Designing Events-first MicroservicesDesigning Events-first Microservices
Designing Events-first MicroservicesJonas Bonér
 
Brains@Bay Meetup: The Effect of Sensorimotor Learning on the Learned Represe...
Brains@Bay Meetup: The Effect of Sensorimotor Learning on the Learned Represe...Brains@Bay Meetup: The Effect of Sensorimotor Learning on the Learned Represe...
Brains@Bay Meetup: The Effect of Sensorimotor Learning on the Learned Represe...Numenta
 
Human legal compliance and ethical issues of emergency preparedness
Human legal compliance and ethical issues of emergency preparednessHuman legal compliance and ethical issues of emergency preparedness
Human legal compliance and ethical issues of emergency preparednessBMLP
 
Complexity strategies for change
Complexity strategies for changeComplexity strategies for change
Complexity strategies for changeNoah Raford
 

Similar to Defence Data Science - BlueHat Seattle, 2019 (20)

Seeing through complexity
Seeing through complexitySeeing through complexity
Seeing through complexity
 
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
 
Types of environment
Types of environmentTypes of environment
Types of environment
 
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialArchitecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
 
C.NEP_MOTION anoop sir.pptx
C.NEP_MOTION anoop sir.pptxC.NEP_MOTION anoop sir.pptx
C.NEP_MOTION anoop sir.pptx
 
Multi-Agent Simulator - Emergence
Multi-Agent Simulator - EmergenceMulti-Agent Simulator - Emergence
Multi-Agent Simulator - Emergence
 
Favoring the Emergence through Agile Scaffolding
Favoring the Emergence through Agile ScaffoldingFavoring the Emergence through Agile Scaffolding
Favoring the Emergence through Agile Scaffolding
 
Scenario Building
Scenario BuildingScenario Building
Scenario Building
 
"Managing Complexity" Executive MBA Presentation (3/3)
"Managing Complexity" Executive MBA Presentation (3/3)"Managing Complexity" Executive MBA Presentation (3/3)
"Managing Complexity" Executive MBA Presentation (3/3)
 
20231123 Foresight Tools Slideshare.pdf
20231123 Foresight Tools Slideshare.pdf20231123 Foresight Tools Slideshare.pdf
20231123 Foresight Tools Slideshare.pdf
 
Week 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docxWeek 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docx
 
Final review nopause
Final review nopauseFinal review nopause
Final review nopause
 
Principles of visitor management
Principles of visitor management Principles of visitor management
Principles of visitor management
 
Mental models long
Mental models   longMental models   long
Mental models long
 
Visualizing for Systems
Visualizing for SystemsVisualizing for Systems
Visualizing for Systems
 
Designing Events-first Microservices
Designing Events-first MicroservicesDesigning Events-first Microservices
Designing Events-first Microservices
 
Brains@Bay Meetup: The Effect of Sensorimotor Learning on the Learned Represe...
Brains@Bay Meetup: The Effect of Sensorimotor Learning on the Learned Represe...Brains@Bay Meetup: The Effect of Sensorimotor Learning on the Learned Represe...
Brains@Bay Meetup: The Effect of Sensorimotor Learning on the Learned Represe...
 
Human legal compliance and ethical issues of emergency preparedness
Human legal compliance and ethical issues of emergency preparednessHuman legal compliance and ethical issues of emergency preparedness
Human legal compliance and ethical issues of emergency preparedness
 
Complexity strategies for change
Complexity strategies for changeComplexity strategies for change
Complexity strategies for change
 
Managing Complexity
Managing ComplexityManaging Complexity
Managing Complexity
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Defence Data Science - BlueHat Seattle, 2019