Welcome to the third running of Cyber Security London hosted by Capital One, on Wednesday July 18th 2018. We're trying to hold ourselves to our ambitious schedule cadence and this just about keeps us on track.
You can find us at the White Collar Factory, on the south-west corner of Old Street roundabout. If arriving by Tube, follow the signs to the yellow exit 3 and the signs for Moorgate. Use EC1Y 2BP to find us with Google. https://goo.gl/maps/gHUWM916CxG2 Please bring ID and meet us in the main building reception.
We'll start with the presentations as 19:00.
The usual free refreshments will be available: beer, wine, soft drinks, pizza.
Nick Drage (@SonOfSunTzu) "Lessons from the Legion"
At an operational level Cyber Security people tend to be self-taught, learning or relearning or revising tools and techniques on their own against static targets that don’t fight back, targets that they’ve probably set up anyway.
At a tactical level, in Incident Response ( and arguably in Penetration Testing and Red Teaming also ) Cyber Security practitioners use “playbooks”, which are essentially pre-determined plans on how to deal with expected situations. A lot of effort goes into writing playbooks, but no effort goes into testing them or updating them, and especially not in testing them against attackers’ playbooks and seeing how the two sets of plans interact.
So at the operational level Cyber Security workers train in a situation different to how their skills will be tested, and at a tactical level organisations have thick books of procedures, unproven and unpracticed, waiting for that inevitable breach to show up their faults - all the negative aspects of “playbook” with none of the positive.
In this presentation I will show how we can learn from others who have succeeded in similar situations but in different contexts and conflicts; and I will show how we can take their ideas and cross-pollenate them into our own field and improve our own methods and practices.
This is all very conceptual, and professionally useful, and will be achieved through a combination of rational argument, occasional ranting against established ways of working, rapidly evolving slidedecks that make PeckaKucha look like watching paint dry, and noisy video clips.
Fraser Scott (@zeroXten) "Threat modelling: From application to attacker"
Synopsis to follow..
Want to work for Capital One?
Check out our current vacancies!