SlideShare a Scribd company logo
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Session01:
introduction
Disinformation/Malign Influence Training
Disarm Foundation | 2022
1
1
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Questions for class
● Do you want 30 mins or 1 hour lunch break?
● What are your backgrounds?
○ Course will include some information security, data science, psychology, risk
analysis, and python coding
● What do you want to get out of this course?
2
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
About this course
3
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Your instructors, and the Disarm Foundation
Today’s instructors:
● SJ Terp
● Pablo Breuer
● Mike Klein
The Disarm Foundation:
https://www.disarm.foundation/
4
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Disarm Foundation: Frameworks and Training
https://www.disarm.foundation/
5
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Course outcomes
After successfully completing the course, students will be able to:
● Elaborate how information security and cognitive security interact
● Evaluate persuasive technology at different scales
● Evaluate influence operation mechanisms and tracking techniques
● Use tools to investigate account and network-level coordinated
inauthentic activities
● Understand ethical behaviour around misinformation and disinformation
response and research
6
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Course structure
Understand environment
1: Introduction
2: Information and response
3: Threats
Set up project
4: Project setup
5: Data collection
Manage components
6: Influence
7: Narratives
8: Behaviours
Manage risk
9: Risk assessment
10: Risk measurement
Hotwash
Module 1: Introduction
● Introductions
● Defining “cognitive security”
● Cognitive Security
Exercise: play games
7
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Course schedule
8
DAY 1: understanding cogsec
9-10:30
Session 1: introduction
Exercise: play games
10:30-12
Session 2: information and response
Exercise: information & response landscapes
12-1 lunch
1-2:30
Session 3: threats
Exercise: threat landscape
2:30-4
Session 4: project setup
Exercise: set up your project resources
4-5:30
Session 5: data collection
Exercise: gather data for your project
DAY 2: managing cogsec
9-10:30
Session 6: influence
Exercise: influence analysis
10:30-12
Session 7: narratives
Exercise: narrative analysis
12-1 lunch
1-2:30
Session 8: behaviours
Exercise: behaviour analysis
2:30-4
Session 9: risk assessment
Exercise: purple team
4-5:30
Session 10: risk prioritisation
Exercise: hotwash
Each session is 55 mins taught, 30 mins exercise
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Course Project
9
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Course project
Explore an information harm area or incident
of your choice:
● Assess information, harms, and response
environments
● Organise project
● Gather data
● Identify incident artifacts
● Identify narratives and behaviours
● Suggest counters
● Report out - in a format of your choice
10
Image: https://commons.wikimedia.org/wiki/File:Project_Management_(project_control).png
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Start thinking about your project
Outputs
● Tweets, report, alert?
● Data science, notes, examples?
Topics
● Medical
● Disaster
● Elections
● Business
● War
Geography
● Region
● Country
● City etc
Creators
● Nationstate / criminal / insider / etc
Community
● Who is affected?
Harms
● Misinformation
● Disinformation
● Conspiracies
● Rumours
Channels
● Social media
● URLs
● Offline
11
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Defining “Cognitive
Security”
12
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Media: Information disorder
13
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Military: Information Operations
14
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cognitive Security
PHYSICAL
SECURITY
CYBER
SECURITY
COGNITIVE
SECURITY
15
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cognitive Security: both of them
“Cognitive Security is the application of
artificial intelligence technologies, modeled
on human thought processes, to detect
security threats.” - XTN
MLSec - machine learning in infosec
● ML used in attacks on information
systems
● ML used to defend information systems
● Attacking ML systems and algorithms
● “Adversarial AI”
“Cognitive Security (COGSEC) refers to
practices, methodologies, and efforts made
to defend against social engineering
attempts‒intentional and unintentional
manipulations of and disruptions to cognition
and sensemaking” - cogsec.org
CogSec - social engineering at scale
● Manipulation of individual beliefs,
belonging, etc
● Manipulation of human communities
● “Adversarial cognition”
16
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Social Engineering: both of them
“the use of centralized planning in an
attempt to manage social change and
regulate the future development and
behavior of a society.”
● Mass manipulation etc
“the use of deception to manipulate
individuals into divulging confidential or
personal information that may be used for
fraudulent purposes.”
● Phishing etc
17
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cognitive Security: Information Security applied to
disinformation+
“Cognitive security is the application of information security principles, practices, and tools
to misinformation, disinformation, and influence operations.
It takes a socio-technical lens to high-volume, high-velocity, and high-variety forms of
“something is wrong on the internet”.
Cognitive security can be seen as a holistic view of disinformation from a security
practitioner’s perspective
18
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
How Cognitive Security
and information security
fit together
19
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Information Security vs Cognitive Security: Objects
Computers
Networks
Internet
Data
Actions
People
Communities
Internet
Beliefs
Actions
20
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Hybrids, and other attack types from infosec
21
● Hybrid: cyber + cognitive + physical
● Cyber supporting cognitive
● Cognitive supporting cyber
● Cyber attack forms adapted to cognitive
Image: Verizon DBIR https://www.verizon.com/business/resources/reports/dbir/
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Your role
● Manage lifecycles
● Manage risk
● Manage teams
● Manage objects
● Manage behaviours
● Manage endpoints
● Manage toolset
22
Image: https://www.wsj.com/articles/SB947800469939459913
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
23
Manage Lifecycles
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec lifecycle: NIST
24
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec: Lifecycle models
25
Images: WHO Europe, https://www.nist.gov/cyberframework/online-learning/components-framework
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
26
Manage Risk
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec: risk management models
Image: https://www.risklens.com/infographics/fair-model-on-a-page
27
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
CogSec: Managing risk and resources
Manage risks
● Risk management
○ assessment, reduction, remediation
● Frequency:
○ how often?
● Losses:
○ How bad? How big? Who to?
○ Harm categories: physical,
psychological, economic,
reputational, cultural, political
● Environment
○ Assets, threats, vulnerabilities
Manage resources
● Mis/disinformation is everywhere
● Detection, mitigation, response
● You never have enough resources
○ People
○ Technologies
○ Time
○ Attention
○ Connections
28
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
CogSec: Managing the whole system
Information
Landscape
• Information seeking
• Information sharing
• Information posting
• Information sources
• Information voids
Harms
Landscape
• Motivations
• Sources/ Starting points
• Effects
• Misinformation narratives
• Hateful speech narratives
• Crossover narratives
• Tactics and Techniques
• Artifacts
Response
Landscape
•Monitoring organisations
•Countering organisations
•Coordination
•Existing policies
•Technologies
•etc
29
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
30
Manage Teams
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec: SOCs
31
Image: https://www.comptia.org/content/articles/what-is-a-security-operations-center
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cognitive Security Operations Centers
32
Image: DISARM Foundation
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
33
Manage Objects
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec model: STIX
Image: https://github.com/traut/stixview
34
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec: interacting layers of attack/respond
Campaigns
Incidents
Narratives and
behaviours
Artifacts
a
t
t
a
c
k
e
r
d
e
f
e
n
d
e
r
35
Image: DISARM Foundation
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec STIX:
Transferable
situation reports
CAMPAIGN
INCIDENT
NARRATIVE
ARTIFACT
36
Image:
https://africacheck.org/fact-checks/reports/anatomy-
disinformation-campaign-who-what-and-why-deliber
ate-falsehoods-twitter Image: DISARM Foundation
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec: Malware
37
Image: https://www.avast.com/c-malware
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec: Narratives
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
39
Manage Behaviours
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec model: ATT&CK
Image: https://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/the-attck%E2%84%A2-navigator-a-new-open-source 40
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec: DISARM Red
41
Image: DISARM Foundation
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec model: MITRE DEFEND
Image: https://therecord.media/mitre-releases-d3fend-defensive-measures-complimentary-to-its-attck-framework/ 42
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec: DISARM Blue
43
Image: DISARM Foundation
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
44
Manage Toolset
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
45
Infosec tools
Image: https://scet.berkeley.edu/scet-explains-cybersecurity/
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Typical cogsec toolset
Data gathering
● Crowdtangle
● Tineye / Yandex
● Hypothes.is
● Maltego
● Profil3r
● CheckUserNames
● Hootsuite
Data storage and sharing
● CSVs
● STIX / TAXII
● Archive.org
Information sharing
● MISP
● Ticketing system
● Googledocs
● Spreadsheets
Response
● Googledocs &
spreadsheets
Analysis
● Jupyter notebooks
● Python libraries
● (Pandas)
● Gephi
● AMITT Navigator
● inVid
● BuiltWith
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
47
Manage Endpoints
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec: Security training
Image: https://www.firewelltechnologysolutions.com/two-factor-authentication-and-account-security/ 48
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
CogSec: Fake news training
Image: https://www.dhs.gov/sites/default/files/publications/19_0717_cisa_the-war-on-pineapple-understanding-foreign-interference-in-5-steps.pdf 49
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Your first exercise: play
games
50
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Using games to prepare your responses
Learning game
● fun experience that teaches you
something
● Useful for training large numbers of
people simultaneously
Red team / Purple team
● test an organisation’s defences by
thinking like a bad guy
● Useful for finding system vulnerabilities,
and predicting future moves
Tabletop exercise
● key people responding to a simulated
event
● Useful for creating cohesive teams.
Often large scale
Simulation
● imitation of processes and
environment
● Useful for “what if” automated tests
51
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
52
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Assessing a game: look for…
Coverage
● Who is this designed for?
● Public, influencers, media etc
● Techniques covered
● Harms covered
● rumours, misinformation,
disinformation, conspiracy theories etc
● Variants, e.g. languages / countries
Viewpoint
● Whose point of view are you playing from?
● Do you “break it then fix it”?
53
Outcomes
● What did you learn from the game?
● What are the rewards from the game?
Continuation
● Where does it suggest you go or do next?
● Would you recommend it to your friends?
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
A sampling of disinformation games
Game Point of view Audience Creator
Bad News Game,
Harmony Square,
Go Viral
Creator Public DROG
News Hero Media Public NATO stratcom
Cranky Uncle Family member Public Monash uni
Disinformation Diaries Politician Political staff Alliance of dems
Learn2Discern Media Public Ukraine
Fakey Fact checker Public Uni of Indiana
54
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Other disinformation games
Online games
● Fake News: the game
https://www.rand.org/research/projects/truth-decay/fighting-disinformation/search/items/fake-news-
the-game.html
● Checkology misinformation practice (e.g. https://checkology.org/lessons/teacher/163/elements/2471)
● Polititruth https://www.cinqmarsmedia.com/politifact/index.html (Politifact, Tinder-style)
● BBC iReporter
https://www.bbc.co.uk/news/resources/idt-8760dd58-84f9-4c98-ade2-590562670096
● Digital Compass https://www.gamesforchange.org/game/digital-compass/
● The Republia Times https://www.gamesforchange.org/game/the-republia-times/
● Interland https://beinternetawesome.withgoogle.com/en_us/interland
● Propaganda Game https://propagandagame.org/
● Factitious http://factitious.augamestudio.com/#/
● Hindsight2020 https://www.hindsight2020.eu/
Card games
● Fake News
● Paladone
55
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Assessing a game: look for…
Coverage
● Who is this designed for?
● Public, influencers, media etc
● Techniques covered
● Harms covered
● rumours, misinformation,
disinformation, conspiracy theories etc
● Variants, e.g. languages / countries
Viewpoint
● Whose point of view are you playing from?
● Do you “break it then fix it”?
56
Outcomes
● What did you learn from the game?
● What are the rewards from the game?
Continuation
● Where does it suggest you go or do next?
● Would you recommend it to your friends?
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Annex: Some
disinformation games to
choose from
57
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
News Hero
https://www.thenewshero.org/ and
https://www.facebook.com/thenewshero
NATO Stratcom CoE
58
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Bad News Game
https://www.getbadnews.com/#intro
DROG and Uni Cambridge
Techniques:
● Impersonation
● Emotion
● Polarization
● Conspiracy
● Discredit
● Trolling
59
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Harmony Square
https://www.harmonysquare.game/en
DROG/ GEC
Techniques:
● Trolling
● Emotion
● Amplification
● Escalation
60
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Go Viral Game
https://www.goviralgame.com/
University of Cambridge, DROG
Techniques:
● Emotion
● Fake expert
● Conspiracy
61
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Disinformation Diaries
https://www.allianceofdemocracies.org/initiatives/the
-campaign/the-disinformation-diaries/
Ora Tanner, Alliance of Democracies Foundation
62
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cranky Uncle
https://crankyuncle.com/
John Cook, Monash Uni, Autonomy
63
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Learn 2 Discern game
http://irex.mocotms.com/ml_en/story_html5.html?l
ms=1
Ukrainian
Takes a while to do, but a lovely game
64
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Fakey
https://fakey.osome.iu.edu/
Indiana University (Osome)
65
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Hindsight2020
https://www.hindsight2020.eu/
European Union
66
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Fake It to Make It
https://www.fakeittomakeitgame.com/
67
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
The propaganda game
https://propagandagame.org/
https://www.facebook.com/The-Propagand
a-Game-212679222850847
68
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Factitious
http://factitious.augamestudio.com/#/ - dead?
http://factitious-pandemic.augamestudio.com/#/
Maggie Farley/ Bob Hone, AU Game Lab, Jolt
program
69

More Related Content

What's hot

CanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfCanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdf
SaraJayneTerp
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
seadeloitte
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
Deep Shankar Yadav
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
Splunk
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
Mark Arena
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
Sara-Jayne Terp
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
Ian-Edward Stafrace
 
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
JamieWilliams130
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE - ATT&CKcon
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Prachi Mishra
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
Christophe Foulon, CISSP
 
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Mark Arena
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Sirius
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
Jisc
 
Cyber Threat Intelligence: Who is Targeting your Information?
Cyber Threat Intelligence: Who is Targeting your Information? Cyber Threat Intelligence: Who is Targeting your Information?
Cyber Threat Intelligence: Who is Targeting your Information?
Control Risks
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
OWASP Delhi
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
♟Sergej Epp
 

What's hot (20)

CanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfCanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdf
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Cyber Threat Intelligence: Who is Targeting your Information?
Cyber Threat Intelligence: Who is Targeting your Information? Cyber Threat Intelligence: Who is Targeting your Information?
Cyber Threat Intelligence: Who is Targeting your Information?
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 

Similar to CSW2022_01_introduction.pptx.pdf

CSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdfCSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdf
SaraJayneTerp
 
2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptx2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptx
SaraJayneTerp
 
CSW2022_02_info_response_environments.pptx.pdf
CSW2022_02_info_response_environments.pptx.pdfCSW2022_02_info_response_environments.pptx.pdf
CSW2022_02_info_response_environments.pptx.pdf
SaraJayneTerp
 
CSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdfCSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdf
SaraJayneTerp
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
Jacqueline Fick
 
Adversary Playbook Tactical Assessment of Protection Techniques
Adversary Playbook Tactical Assessment of Protection TechniquesAdversary Playbook Tactical Assessment of Protection Techniques
Adversary Playbook Tactical Assessment of Protection Techniques
Justin Berman
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity Panel
Julie Evans
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response Program
Resilient Systems
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
Duane Blackburn
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Stephanie McVitty
 
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
ManagedMethods
 
Webinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy WebinarWebinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy Webinar
Blueliv
 
Drone-based Learning for Project-based Learning (for printing only-real).pptx
Drone-based Learning for Project-based Learning (for printing only-real).pptxDrone-based Learning for Project-based Learning (for printing only-real).pptx
Drone-based Learning for Project-based Learning (for printing only-real).pptx
Mohd Shahril Nizam Shaharom
 
AMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptxAMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptx
SaraJayneTerp
 
Abso lutely!
Abso lutely!Abso lutely!
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
AmitPandey388410
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
Kroll
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
inLabFIB
 

Similar to CSW2022_01_introduction.pptx.pdf (20)

CSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdfCSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdf
 
2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptx2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptx
 
CSW2022_02_info_response_environments.pptx.pdf
CSW2022_02_info_response_environments.pptx.pdfCSW2022_02_info_response_environments.pptx.pdf
CSW2022_02_info_response_environments.pptx.pdf
 
CSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdfCSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdf
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
 
Adversary Playbook Tactical Assessment of Protection Techniques
Adversary Playbook Tactical Assessment of Protection TechniquesAdversary Playbook Tactical Assessment of Protection Techniques
Adversary Playbook Tactical Assessment of Protection Techniques
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity Panel
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response Program
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
 
Webinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy WebinarWebinar: Scale up you Cyber Security Strategy Webinar
Webinar: Scale up you Cyber Security Strategy Webinar
 
Drone-based Learning for Project-based Learning (for printing only-real).pptx
Drone-based Learning for Project-based Learning (for printing only-real).pptxDrone-based Learning for Project-based Learning (for printing only-real).pptx
Drone-based Learning for Project-based Learning (for printing only-real).pptx
 
AMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptxAMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptx
 
Abso lutely!
Abso lutely!Abso lutely!
Abso lutely!
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 

Recently uploaded

一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 

Recently uploaded (16)

一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 

CSW2022_01_introduction.pptx.pdf