Remove Exercises Remove Government Remove Military Remove Presentation
article thumbnail

Jen Easterly Takes Charge of CISA At Black Hack USA 2021

ForAllSecure

The new Director of the Cybersecurity and Infrastructure Security Agency (CISA), Jen Easterly, opened Day 2 of Black Hat USA 2021 with a remote presentation on Hacking the Cybersecurity Puzzle. Easterly began by presenting her bio. exercise these whole nation attack plans to prepare. She later returned to West Point to teach.

article thumbnail

Red Teaming Your Information Governance Program

Brandeis Records Manager

Red teaming (RT), with origins in the military, involves thinking differently and more objectively about your program, looking under rocks, and grasping alternative views of the way things are. Murder boarding,” or grilling an idea or presenter before actual product delivery, is a similar approach to cleaning up planning and execution.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

The governments of the world wanted the quick and agile minds of children who could think three dimensional -- and without all that moralizing about killing, you know, space aliens. And it could be somebody like a target, it could be a bank, it could be a municipality, like the city of New York, or it could be the US military.

article thumbnail

CyberheistNews Vol 13 #14 [Eyes on the Prize] How Crafty Cons Attempted a 36 Million Vendor Email Heist

KnowBe4

No worries — register now and you will receive a link to view the presentation on-demand afterwards. Human Rights Groups Olga Lautman reported on a very sophisticated social engineering tactic that completely falsifies Non-Government Organizations (NGOs). or UK government authority." Save My Spot!

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Tensions rose throughout February as the Russian military amassed across the Ukrainian border. Although Vladimir Putin and his sympathisers assured the world that they were simply conducting military exercises, the inevitable occurred on 24 February, when troops mobilised and war was declared.

Security 132
article thumbnail

The Future of War (From Jan., 1993 to the Present)

John Battelle's Searchblog

This shift affects everything from the strategy that guides it to the individuals who oversee it (civilian political appointees) and the lawyers who advise them (civilians rather than military officers). This is virtual reality as a new way of knowledge: a new and terrible kind of transcendent military power. Why not purple dragons? (Ed:

Military 101
article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

Government. No worries — register now and you will receive a link to view the presentation on-demand afterwards. Yes, we have started with training and recently conducted a phishing exercise, we are currently doing a POC test with a few users regarding the PAB functionality. Save My Spot! Thanks for your email.