YoVDO

Operational Templates for State-Level Attack and Collective Defense of Countries

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Supply Chain Courses Military Strategy Courses

Course Description

Overview

Explore operational templates for state-level cyberattacks and collective defense strategies in this 50-minute Black Hat conference talk. Delve into doctrinal templates used by militaries for traditional warfare and their application in cyberspace. Examine various ways threat actors could disrupt or defeat countries, considering different time horizons and attribution levels. Learn about defeating detail, fighting wars independently, collective offense, and levers of power such as underwater cables, electromagnetic spectrum, and global networks. Analyze threat templates, kill chain templates, and cyberspace denial strategies. Investigate influence and information operations, long-term strategies, and the concept of apathy threshold. Gain insights into sector-level situational awareness and collective defense approaches. Presented by Gregory Conti and Robert Fanelli, this talk provides valuable knowledge for understanding and defending against state-level cyber threats.

Syllabus

Introduction
Opening remarks
Introductions
Mission Statement
Context
Research Arc
Defeating Detail
Fighting Wars Independently
Collective Offense
Levers of Power
Underwater Cables
Electromagnetic Spectrum
National Intelligence
Global Network
Supply Chains
Combined Operations
Threat Templates
Kill Chain Template
Cyberspace Denial Strategy
Influence Operations
Information Operations
The Long Game
Staircase of Apathy
Apathy Threshold
Long Game
Hybrid
Sector Level Situational Awareness
Level 3 to 4
Collectives
What can help
Conclusions
Questions


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube