Use of Guerrilla Warfare for the Blue Team

Network Security, Ransomware & IOT Theatre

Thu 1st Nov 01:40 to 02:10

Blue Team Security is a hard job. It's not sexy, and it is always complicated navigating between the people, processes, and technology of the organization. Blue teams try to defend meanwhile breaches still happen. Why? adversaries (external AND internal) just need to find a pin-hole or create one. Or buy one. That simple.

Its time, we start thinking and acting like a guerrilla and adopt some practices from irregular warfare.  Irregular warfare has a long history of defeating larger and better-equipped adversaries while using limited resources.  Let’s talk about how we can adopt these tools, technique and procedures to win.

What you will take away from this session

  • Practical Use of Information Operations in the Corporate Environment
  • Attribution is key to Intelligence Decision making
  • Use economics to craft a strategy
  • Tool, Techniques, and Procedures to effect positive change in your Security Program


Photo Speaker Name Profile
Rob Carson Rob Carson View Profile