• How Did We Get Here?
• Attack Methodology Plus Tools/Techniques Used
• Attackers (The Types of Threats)
• How Most Organizations Defend Today (Defensive Mountain Range)?
• Targeted Capabilities (What We should be Defending)
In the early 1980s, when ARPANET was becoming the World Wide Web which grew into today’s Internet, the focus was on interoperability and reliability as a means of communication and potential command and control in the event of an emergency. Everyone with access to the system knew each other and security was not a consideration. Then, in the late 1980s, trouble started; Robert Morris released the first worm (a self-replicating piece of malware) ...