CYBERWARCON

Coming back November 10th. Tickets on sale now and CFP ends October 7.

CYBERWARCON boosted:
2022-11-14

Had a lovely conversation with a student today about my experience as a woman working at the intersection between national security and cybersecurity. It gave me the space to reflect on how much my experience has evolved over the years and for the better. I feel so incredibly fortunate to have found my people (so to speak) and to be so welcomed by them. Conferences like #LABScon and #CYBERWARCON and organizations like the Cyber Conflict Studies Association (CCSA) and the @alperovitch Institute at Johns Hopkins SAIS are wonderful examples of this. Deeply innovative and world class folks who see embracing and actively building a diverse community as central to their missions. Is it perfect? No. Do I still face challenges ranging from the blatant to subtle? Sadly, yes. Can and should we continue to do better? Absolutely, and please. But I am increasingly hopeful that we are heading in the right direction and that’s largely because leaders in this field have made it a priority. Let’s keep the momentum going! One day in the near future I want to find myself in a ridiculously long queue for the women’s restroom at every cybersecurity conference I attend.

CYBERWARCON boosted:
2022-11-10

From microsoft. I wound up not using my virtual tickets and went outside.

microsoft.com/en-us/security/b

The @CYBERWARCON sessions summarized below include:
“They are still berserk: Recent activities of BROMINE” – a lightning talk covering MSTIC’s analysis of BROMINE (aka Berserk Bear), recent observed activities, and potential changes in targeting and tactics.
“The phantom menace: A tale of Chinese nation-state hackers” – a deep dive into several of the Chinese nation-state actor sets, their operational security patterns, and case studies on related tactics, techniques, and procedures (TTPs).
“ZINC weaponizing open-source software” – a lighting talk on MSTIC and LinkedIn’s analysis of ZINC, a North Korea-based actor. This will be their first public joint presentation, demonstrating collaboration between MSTIC and LinkedIn’s threat intelligence teams.

2022-11-10

🚨 It has come to our attention that there may be people in the room #CYBERWARCON who do not know who John Hultquist is.

2022-11-10

Good observation over at the dying birdsite:

“The pattern at this #CYBERWARCON is that low-quality 2016 type of IO operations are not helpful anymore and now we are seeing APT actors working closely with IO to produce quality influence operation. Love where this is heading.” @dlshadothman

CYBERWARCON boosted:
2022-11-10

Killer to see the practical application of @danny's event-based operations concept to the war in Ukraine today at #cyberwarcon. What an incredibly useful tool to enable a more nuanced conversation about the nature of cyber operations under conditions of war.

CYBERWARCON boosted:
2022-11-10

10 Phases of the Operations Kill Chain
1. Acquiring assets
2. Disguising assets
3. Gathering information
4. Coordinating + planning
5. Testing defenses
6. Evading detection
7. Indiscriminate engagement
8. Targeting engagement
9. Compromising assets
10. Enabling persistence

The Online Operations Kill Chain by Ben Nimmo and @hutch

#CYBERWARCON

CYBERWARCON boosted:
2022-11-10

@aRtAGGI’s talk was probably one of the best Cyber talks I’ve watched. Really excellent content and delivery. #CyberWarCon

CYBERWARCON boosted:
2022-11-10

What an amazing talk and I'm left wanting more. @aRtAGGI Job well done! 🎣
Trying hard to wait until break to crack into this report. proofpoint.com/us/blog/threat-

#CYBERWARCON

CYBERWARCON boosted:
David Oxley (is on Bluesky)dox@infosec.exchange
2022-11-10

Lots of Mastodon shoutouts at #CYBERWARCON, on the day all the top security and privacy execs leave Twitter. The trend seems clear.

CYBERWARCON boosted:
2022-11-10

At #CYBERWARCON, Mandiant analysts reveal new tactics used by Russia's GRU in its cyberattacks on Ukraine: Hacking "edge" devices like routers, firewalls and email servers to quicken their pace of operations, to repeatedly hit the same victims and even to keep access to victim networks *after* they're wiped.

wired.com/story/russia-ukraine

CYBERWARCON boosted:
2022-11-10

The book mentioned in the CYBER WAR ON THE EDGE: A BALANCE OF ACCESS AND ACTION talk.

hurstpublishers.com/book/offen
#CYBERWARCON

CYBERWARCON boosted:
Rick Valenzuelarv@infosec.exchange
2022-11-10

"The Lada of backdoors" 😂

From "Cyber War on the Edge," by @gabr's and John Wolfram at #cyberwarcon

CYBERWARCON boosted:
2022-11-10

@danny well you just got a huge shoutout with book cited on stage

Gabby and JohnSlide
2022-11-10

Yes we just had a no kidding blackout, power in the entire hotel was down for about ten minutes. Back now. Apologies to online participants.

CYBERWARCON boosted:
2022-11-10

Wow I mention Mastodon in passing on stage at #CYBERWARCON during a speaker intro and an audience of ~350 interrupts me with spontaneous cheers and applause

CYBERWARCON boosted:
2022-11-10

My first post on Mastodon comes live from #CYBERWARCON, where Lookout researchers will later present their findings on what they say are two new strains of Android malware that masquerade as legitimate apps and target Uyghurs in China and abroad, including Turkey.

More here: bloomberg.com/news/articles/20

CYBERWARCON boosted:
2022-11-10

@CISAjen “Intel drives operations” #cyberwarcon

2022-11-10

.@CISAjen remains optimistic in spite of all the threat actors: cybersecurity has never been such a high priority. We have enduring institutions, and we also understand the importance of persistent collaboration. #CYBERWARCON

Jen
CYBERWARCON boosted:
2022-11-10
Jen Easterly speaking at Cyberwarcon

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst