YoVDO

Operational Templates for State-Level Attack and Collective Defense of Countries

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Supply Chain Courses Military Strategy Courses

Course Description

Overview

Explore operational templates for state-level cyberattacks and collective defense strategies in this 50-minute Black Hat conference talk. Delve into doctrinal templates used by militaries for traditional warfare and their application in cyberspace. Examine various ways threat actors could disrupt or defeat countries, considering different time horizons and attribution levels. Learn about defeating detail, fighting wars independently, collective offense, and levers of power such as underwater cables, electromagnetic spectrum, and global networks. Analyze threat templates, kill chain templates, and cyberspace denial strategies. Investigate influence and information operations, long-term strategies, and the concept of apathy threshold. Gain insights into sector-level situational awareness and collective defense approaches. Presented by Gregory Conti and Robert Fanelli, this talk provides valuable knowledge for understanding and defending against state-level cyber threats.

Syllabus

Introduction
Opening remarks
Introductions
Mission Statement
Context
Research Arc
Defeating Detail
Fighting Wars Independently
Collective Offense
Levers of Power
Underwater Cables
Electromagnetic Spectrum
National Intelligence
Global Network
Supply Chains
Combined Operations
Threat Templates
Kill Chain Template
Cyberspace Denial Strategy
Influence Operations
Information Operations
The Long Game
Staircase of Apathy
Apathy Threshold
Long Game
Hybrid
Sector Level Situational Awareness
Level 3 to 4
Collectives
What can help
Conclusions
Questions


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network