Tweets
- Tweets, current page.
- Tweets & replies
- Media
You blocked @HockeyInJune
Are you sure you want to view these Tweets? Viewing Tweets won't unblock @HockeyInJune
-
Pinned Tweet
I'm tired of mismanaged threat models and wasted efforts on defense teams.https://medium.com/@HockeyInJune/threats-that-matter-cc5a1297c41 …
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Julian Cohen Retweeted
Then I asked the audience to build an attack playbook using infrastructure like Samsung and an Windows XP exploit with the resources of the cyber division of the South Korean military.pic.twitter.com/II1IGMrjkR
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
When you do these exercises at work, you don't need to use the diamond model or the Lockheed Martin Kill Chain. I use them in my presentations because they are well understood accepted standards, but you may want to use more and less detail and more or less data in your model.pic.twitter.com/hiBS4n1gvQ
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
What events may change our adversary's motivation, capabilities, and resources? What events may change our adversary's tools, techniques, and procedures? How confident are we in these predictions?pic.twitter.com/D7U1QMr2Oo
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
What events may change our set of adversaries? Is our security strategy growing with out organization and with our adversaries? How quickly is our organization getting added to new target lists and being discovered by new adversaries? How confident are we in these predictions?pic.twitter.com/PZMs3lFyI6
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Do we have enough supporting data and threat intelligence (quantitative and qualitative) to justify our work to our CISO and to our board? How confident are we in our adversary simulation? Can we confidently predict future adversary behavior? Do we have enough historical data?pic.twitter.com/H8J9EcnejY
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Before we can begin to prioritize and execute, we need to review our work. How confident are we that our set of adversaries is complete and accurate? How confident are we that we understand their resourcing, capabilities, motivations, and constraints? Are our defenses effective?pic.twitter.com/Y7jPcm0C6W
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Finally, with a carefully understood attack, I asked the audience to design defenses to prevent, detect, and monitor the attack using Lockheed Martin's Intrusion Kill Chain Courses of Action Matrix (https://pbs.twimg.com/media/DbUGM0LVwAUOVSx.jpg …).pic.twitter.com/SqLtbtiQxt
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Then I asked the audience to build an attack playbook using infrastructure like Samsung and an Windows XP exploit with the resources of the cyber division of the South Korean military.pic.twitter.com/II1IGMrjkR
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Then I asked the audience to help us design an adversary that a North Korean healthcare organization might encounter. Using the Diamond Model (https://threatconnect.com/wp-content/uploads/cshydiamond_full.png …), I asked them to consider who the adversary might be, their motivation, and their capabilities and resources.pic.twitter.com/3UjFb0MPNE
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Then I asked the audience to design an organization for us to protect. I asked them to pick an industry and consider the size of the org, whether the organization is public or private, what countries the org operates in, and what kind of infrastructure the org needs to operate.pic.twitter.com/btULWsb58p
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
First I introduced some concepts that you've probably heard me talk about before on Twitter.pic.twitter.com/iNPrv3Tgvt
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Last night I gave the first version of my Threat-Based Risk Analysis Workshop at
@NCCGroupInfosec Open Forum. This workshop is an introduction to using threat-based risk analysis at your organization by working through a contrived demo together.https://www.meetup.com/NCCOpenForumNYC/events/253815502/ …Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
What kind of dystopia have we created for ourselves?pic.twitter.com/bwlTPASZU9
Thanks. Twitter will use this to make your timeline better. UndoUndo -
What's your favorite (read: most effective or best) EPP/EDR/NGAV suite? Things I care about most: * Threat Intelligence to discover the best TTPs/indicators/attacks/events to prevent and detect * Support for macOS/Windows/Linux * Low performance hit * Remediation * Investigations
Thanks. Twitter will use this to make your timeline better. UndoUndo -
This tastes like someone dropped a couple of lime Skittles into my water.pic.twitter.com/sPnewm3XSF
Thanks. Twitter will use this to make your timeline better. UndoUndo -
What's the state of the world in Caller ID spoofing for VoIP services? If I have a cloud PBX, should I expect that they should be able to detect CID spoofing by comparing the CID header to the VoIP header? Vendor claims that CID spoofing is impossible suddenly. Is that true?
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Julian Cohen RetweetedThanks. Twitter will use this to make your timeline better. UndoUndo
-
I found the pot of gold at the end of the rainbow! It's this signals intelligence dish at 33 Thomas Street.pic.twitter.com/ReQNdJMMKr
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Has anyone taken a deep dive into this "backdoor"? It seems like only one not-popular processor is affected. Has anyone seen any Intel or AMD processors affected? http://i.blackhat.com/us-18/Thu-August-9/us-18-Domas-God-Mode-Unlocked-Hardware-Backdoors-In-x86-CPUs-wp.pdf …
Thanks. Twitter will use this to make your timeline better. UndoUndo
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
.