CYBERWARCON

867 Followers
13 Following
35 Posts
Coming back November 10th. Tickets on sale now and CFP ends October 7.
📡Arlington, VA and Virtual
đź’Łhttps://cyberwarcon.com
Had a lovely conversation with a student today about my experience as a woman working at the intersection between national security and cybersecurity. It gave me the space to reflect on how much my experience has evolved over the years and for the better. I feel so incredibly fortunate to have found my people (so to speak) and to be so welcomed by them. Conferences like #LABScon and #CYBERWARCON and organizations like the Cyber Conflict Studies Association (CCSA) and the @alperovitch Institute at Johns Hopkins SAIS are wonderful examples of this. Deeply innovative and world class folks who see embracing and actively building a diverse community as central to their missions. Is it perfect? No. Do I still face challenges ranging from the blatant to subtle? Sadly, yes. Can and should we continue to do better? Absolutely, and please. But I am increasingly hopeful that we are heading in the right direction and that’s largely because leaders in this field have made it a priority. Let’s keep the momentum going! One day in the near future I want to find myself in a ridiculously long queue for the women’s restroom at every cybersecurity conference I attend.

From microsoft. I wound up not using my virtual tickets and went outside.

http://www.microsoft.com/en-us/security/blog/2022/11/10/microsoft-threat-intelligence-presented-at-cyberwarcon-2022/

The @CYBERWARCON sessions summarized below include:
“They are still berserk: Recent activities of BROMINE” – a lightning talk covering MSTIC’s analysis of BROMINE (aka Berserk Bear), recent observed activities, and potential changes in targeting and tactics.
“The phantom menace: A tale of Chinese nation-state hackers” – a deep dive into several of the Chinese nation-state actor sets, their operational security patterns, and case studies on related tactics, techniques, and procedures (TTPs).
“ZINC weaponizing open-source software” – a lighting talk on MSTIC and LinkedIn’s analysis of ZINC, a North Korea-based actor. This will be their first public joint presentation, demonstrating collaboration between MSTIC and LinkedIn’s threat intelligence teams.

Microsoft threat intelligence presented at CyberWarCon 2022  - Microsoft Security Blog

At CyberWarCon 2022, Microsoft and LinkedIn analysts presented several sessions detailing analysis across multiple sets of actors and related activity.

Microsoft Security Blog
🚨 It has come to our attention that there may be people in the room #CYBERWARCON who do not know who John Hultquist is.
Microsoft threat intelligence presented at CyberWarCon 2022  - Microsoft Security Blog

At CyberWarCon 2022, Microsoft and LinkedIn analysts presented several sessions detailing analysis across multiple sets of actors and related activity.

Microsoft Security Blog

Good observation over at the dying birdsite:

“The pattern at this #CYBERWARCON is that low-quality 2016 type of IO operations are not helpful anymore and now we are seeing APT actors working closely with IO to produce quality influence operation. Love where this is heading.” @dlshadothman

Killer to see the practical application of @danny's event-based operations concept to the war in Ukraine today at #cyberwarcon. What an incredibly useful tool to enable a more nuanced conversation about the nature of cyber operations under conditions of war.

10 Phases of the Operations Kill Chain
1. Acquiring assets
2. Disguising assets
3. Gathering information
4. Coordinating + planning
5. Testing defenses
6. Evading detection
7. Indiscriminate engagement
8. Targeting engagement
9. Compromising assets
10. Enabling persistence

The Online Operations Kill Chain by Ben Nimmo and @hutch

#CYBERWARCON

@aRtAGGI’s talk was probably one of the best Cyber talks I’ve watched. Really excellent content and delivery. #CyberWarCon

What an amazing talk and I'm left wanting more. @aRtAGGI Job well done! 🎣
Trying hard to wait until break to crack into this report. https://www.proofpoint.com/us/blog/threat-insight/chasing-currents-espionage-south-china-sea

#CYBERWARCON

Rising Tide: Chasing the Currents of Espionage in the South China Sea  | Proofpoint US

Proofpoint
Lots of Mastodon shoutouts at #CYBERWARCON, on the day all the top security and privacy execs leave Twitter. The trend seems clear.