Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore frameworks for measuring persistent engagement and deterrence in cybersecurity through this Black Hat conference talk. Delve into recent research that introduces transparent methods to assess the impact of U.S. policy and actions on cyber attacks. Learn about incident severity schemas, the "Opium Example," and the "Oil Rig Group APPLE Timeline." Gain insights into defending forward strategies, government processes, and the debate surrounding cybersecurity policies. Examine potential reasons for delays in cyber incidents and understand the importance of attribution in this complex landscape. Discover how these frameworks can be applied to better evaluate the effectiveness of cybersecurity measures and their influence on attack patterns.
Syllabus
Introduction
Introductions
The Debate
Defending Forward
The Process
The Government
Basic Frameworks
Incident Severity Schema
Opium Example
The Hawks
Deep Dive
What do we do
Duration of disruption
Potential reasons for delay
Frameworks
Oil Rig Group
APPLE
Timeline
Call to Action
Attribution
Taught by
Black Hat