Presentation made using reveal.js. Type ? for navigation help, or just skip through using space key.
Frode Hommedal
Subject Matter Lead at Telenor CERT.
7 years at Norwegian national CERT.
Background from HW/SW dev and QA.
I think a lot about models and "the big picture".
Not The Answer™
But rather the status of my own research and
learning experience on CSIRT capability modelling.
PS: This is basically a highlights tour of a 3h talk.
Because we are not keeping up
We have actually had to conclude that we are unable to
design, deploy and operate IT infrastructure securely.
We can improve our game!
Which is different from trying harder.
One path to improvement
goes through better modeling
of what a CSIRT is and should be
I hope this presentation will contribute
to our collective effort to improve
So we have at least 8 possible paths to improvement
Upping our game means traversing as many of these
8 paths fast enough to outperforme our adversaries
And our job is to outperform our adversaries
Driving improvements along as
many of the 8 paths as possible.
Tactical analysis is a crucial bridge between your
incidents and many of the 8 improvement paths
WARNING: Brace for impact...
(Complicated figure ahead)
accass to information and
control over capabilities
to limit the risk exposure and
damage to our organizations
from our adversaries' operations
have three main foothold perspectives
have five main footprint perspectives
Getting inside your adversary's OODA loop means performing these steps faster and better than the tactical actions of your adversary during your engagement
Getting there requires an advanced, infrastructured
and supported core incident response team
Do this right, and you may
outperform your adversaries
Do this right, and you will
be able to kick some butt!
</presentation>