loader from loading.io

Episode 68: Scythe CEO Bryson Bort on Enhancing Security with Realistic Adversary Emulation

OODAcast

Release Date: 05/28/2021

Episode 117:  Leading Cyber Change: Allan Friedman on the Revolution of SBOM & Future Cybersecurity Initiatives show art Episode 117: Leading Cyber Change: Allan Friedman on the Revolution of SBOM & Future Cybersecurity Initiatives

OODAcast

Allan Friedman is a senior strategist at CISA (the Cyber Security and Infrastructure Security Agency) where he coordinates all of their cross-sector activities on the topic of SBOM: The Software Bill of Materials. Allan is widely known as a change agent in both the public and private sector. In government he led initiatives that created positive change in major community-wide initiatives around vulnerability disclosure and vulnerability management. He also championed efforts that made dramatic improvements in the ability to reduce risk due to the proliferation of Internet of Things devices...

info_outline
Episode 116:  Joe Sullivan on Managing Complex Security Challenges show art Episode 116: Joe Sullivan on Managing Complex Security Challenges

OODAcast

Joe Sullivan has been at the forefront of managing security risk in rapidly growing high tech companies over the past 20 years serving as the Chief Security Officer at Facebook from early start-up through the IPO, CSO of Uber and CloudFlare, and as a security leader at eBay/PayPal. Joe was also involved in a landmark legal case for a breach at Uber which resulted in a criminal conviction that serves as a precedent for executive liability in cybersecurity going forward. In this OODAcast we discuss: Joe's early career and how he got interested and involved in technology and started his...

info_outline
Episode 115:  Joe Tranquillo on the Revolution in Biological Science show art Episode 115: Joe Tranquillo on the Revolution in Biological Science

OODAcast

Joe Tranquillo is a Professor of Biomedical Engineering at Bucknell University and a provost at the school. He is also and author and speaker with a knack for helping make new and at times complex subjects understandable. In this OODAcast we discuss many aspects of the revolution in biological sciences with Joe including topics like: New ways of delivering medicines that target specific tissues Discovery of the structure of almost every human protein Methods to synthesize biomolecules, which can result in ways to manufacture a wide range of materials like therapeutics, flavors, fabrics, food,...

info_outline
Episode 114: MITRE Futurist Charles Clancy on our Quantum Enabled Future show art Episode 114: MITRE Futurist Charles Clancy on our Quantum Enabled Future

OODAcast

Charles Clancy has successfully led technology efforts in government, industry, academia and continues to lead and innovate in his current position as Senior Vice President and GM of MITRE Labs. He is MITRE's Chief Futurist. His role in technology leadership and his tracking of tech across multiple domains made for an incredibly insightful OODAcast. We review Charles' insights into: Quantum Computing Quantum Security Artificial Intelligence Microelectronics and Friendshoring/Reshoring The March 2023 National Strategy for Cybersecurity Governance in the age of ubiquitous computing ...

info_outline
Episode 113:  Mark McGrath: John Boyd Is Far More Than The OODA Loop show art Episode 113: Mark McGrath: John Boyd Is Far More Than The OODA Loop

OODAcast

Mark McGrath has applied the teachings of John Boyd to a career that began in the Marine Corps, included leadership positions in financial services firms and consulting with businesses with a need to learn to thrive in volatile, uncertain, complex and ambiguous (VUCA) environments. He co-founded the consultancy AGLX and serves as its Chief Learning Officer. He is the co-host of the popular podcast “No Way Out” which is dedicated to examining and advancing the use of the theories of John Boyd to help both individuals and businesses seeking to improve their capacity for free and independent...

info_outline
Episode 112:  Serene - The Hacker Pianist Saving Cyberspace show art Episode 112: Serene - The Hacker Pianist Saving Cyberspace

OODAcast

Serene is a hacker in the truest sense of the word. She's applied a hacker mindset to learn coding, piano, and blend art and engineering in fascinating ways. You'll find her collaborating on-stage with Grimes one night and coding censorship resistant technologies the next day. As a self-taught coder she was the first engineer hired into Google Ideas when she was just a teenager. At Google she pioneered work on WebRTC proxies that she continued as a fellow at the Open Tech Fund and was eventually released as a Tor-enabling tool called Snowflake. Serene took a hiatus from working as a...

info_outline
Episode 111:  Andy Bochman on Countering Cyber Sabotage show art Episode 111: Andy Bochman on Countering Cyber Sabotage

OODAcast

Andy Bochman is the Senior Grid Strategist-Defender for Idaho National Laboratory’s National and Homeland Security directorate. In this role, Andy provides strategic guidance on topics at the intersection of grid security and climate resilience to INL leadership as well as senior U.S. and international government and industry leaders. Andy is a frequent speaker, writer, and trainer who has testified before the U.S. Senate Energy and Natural Resources Committee on energy infrastructure cybersecurity issues and before FERC on the maturity of smart grid cybersecurity standards. He has had...

info_outline
Episode 110:  Spencer Ante on Creative Capital and Disruptive Innovation show art Episode 110: Spencer Ante on Creative Capital and Disruptive Innovation

OODAcast

Spencer Ante is the author or "Creative Capital: Georges Doriot and the Birth of Venture Capital", which was on my Top 10 book list for 2022. In fact, I found Doriot's story so compelling that a portrait of him hangs on the wall at the Hack Factory start-up studio in Reston, VA. Doriot is a compelling figure with an incredible story as told in Spencer's book.  He was a Harvard Business School professor, responsible for launching the modern American industrial management movement, served as a General in World War II where he solved critical supply chain and logistics issues while also...

info_outline
Episode 109:  Bob Zukis and the Digital Directors Network: Helping corporate boards mitigate systemic risk show art Episode 109: Bob Zukis and the Digital Directors Network: Helping corporate boards mitigate systemic risk

OODAcast

ob Zukis is a man on a mission to improve the ability of corporate America to succeed in a complex digital world, even when under constant cyber attack. Bob is the CEO and founder of the Digital Directors Network, the global pioneer in helping corporate directors advance their understanding of systemic risk. We consider Bob to be the world's leading advocate for improving cybersecurity governance. His many articles published in major business journals and impactful books on the topic make this case well. Bob has worked with, studied, and been on corporate boards for years and now teaches...

info_outline
Episode 108:  Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars show art Episode 108: Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

OODAcast

Adam Shostack is widely known in the cybersecurity world for his pioneering work on disclosing and discussing computer vulnerabilities (the CVE  (common vulnerabilities and exposures) list). He also helped formalize and train leading approaches to threat modeling and wrote the foundational book on the subject (). In this OODAcast we seek lessons from Adam’s career and experiences (which range from startups to nearly a decade at Microsoft, as well as the Blackhat review board, as well as being an Affiliate Professor at University of Washington).  We then dive deep into Adam’s most...

info_outline
 
More Episodes

Bryson Bort is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a boutique cybersecurity consultancy. He is widely known in the cybersecurity community for helping advance concepts of defense across multiple critical domains. He is the co-founder of the ICS Village, a non-profit advancing awareness of industrial control system security. Bryson is also a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute.

In this OODAcast we examine approaches Bryson has seen make positive differences in evaluating and mitigating risks to enterprises, specifically in the domain of adversary emulation.

The discussion covers:

  • A practitioner's view of the state of cybersecurity
  • The demise of the perimeter as a security control
  • What leaders need to know to mitigate risk
  • Attack, Detect and Response tools and how their automation can help continuously mitigate risks
  • Mitre ATT&CK and how to use it to help frustrate adversaries
  • Assisting Blue Teams, Purple Teams and Red Teams with tooling
  • The use of cyber threat intelligence to inform automated adversary emulation

 

More on cybersecurity:

Ransomware: An update on the nature of the threat

The technology of ransomware has evolved in sophistication and the business models of the criminal groups behind it have as well. The result: The threat from ransomware has reached pandemic proportions.

This post provides an executive level overview of the nature of this threat. It is designed to be read as an introduction to our accompanying post on how to mitigate the threat of ransomware to your organization. See: Ransomware, an update on the nature of the threat


China’s Plan for Countering Weaponized Interdependence

In an article entitled “The international environment and countermeasures of network governance during the “14th Five-Year Plan” period” by Xu Xiujun (徐秀军) in the February 27, 2021 edition of China Information Security, we see the continuation of China’s concerns over Weaponized Interdependence and China’s desire to shape a global technology and economic environment that is less influenced by Western power. Xiujun identifies concerns in several interconnected areas including cybersecurity, economic centralization, and advancement in technologies like AI, Quantum, and 5G. See: China’s Plan for Countering Weaponized Interdependence


If SolarWinds Is a Wake-Up Call, Who’s Really Listening?

As the U.S. government parses through the Solar Winds software supply chain breach, many questions still remain as to the motive, the entities targeted, and length of time suspected nation state attackers remained intrenched unseen by the victims.  The attack stands at the apex of similar breaches in not only the breadth of organizations compromised (~18,000), but how the attack was executed.

See: If SolarWinds Is a Wake-Up Call, Who’s Really Listening?


Russian Espionage Campaign: SolarWinds

The SolarWinds hacks have been described in every media outlet and new source, making this incident perhaps the most widely reported cyber incident to date. This report provides context on this incident, including the “so-what” of the incident and actionable insights into what likely comes next.

Russian Espionage Campaign: SolarWinds


The Cyber Threat to NASA Artemis Program:

NASA is enabling another giant leap for humanity. With the Artemis program, humans will return to the Moon in a way that will enable establishment of gateways to further exploration of not just the Moon but eventually the entire solar system. The initial expenses of the program will return significant advances for scientific understanding and tangible economic returns. As Artemis continues, the project will eventually deliver improvements for humanity that as of yet have only been dreamed of. But there are huge threats. For more see: The Cyber Threat To Artemis


Security In Space and Security of Space:

The last decade has seen an incredible increase in the commercial use of space. Businesses and individual consumers now leverage space solutions that are so integrated into our systems that they seem invisible. Some of these services include: Communications, including very high-speed low latency communications to distant and mobile users. Learn more at: OODA Research Report: What Business Needs To Know About Security In Space Also see: Is Space Critical Infrastructure, and the special report on Cyber Threats to Project Artemis, and Mitigating Threats To Commercial Space Satellites