The SEArt of War: The Chimaera Threat Model

Presented at LayerOne 2019, May 25, 2019, 10 a.m. (60 minutes)

In recent years, “red teaming” has become a market buzzword often prompting corporate excitement and weaving an image of “pentesting” in a red cape. This is unacceptable. The essence of red teaming is a healthy mix of “Gegenspiel” (Adversarial Thinking) and “Kontraspiel” (Adversarial Thought), terms coined by Dr. Mark Mateski of Red Team Journal.In the talk we will discuss how “red teaming” is not limited to the digital arena alone but includes physical and social vectors that should be considered for an effective operation. The social category does not only include social engineering but aspects such as history, philosophy, culture and art as well. In this talk, we will explain the logic behind these elements and their interconnection. We will discuss how these elements can provide significant intelligence when dealing with threat actors, and how they can additionally help craft a defense strategy. Drawing from examples and case studies from both the real and fictional world we will expand on Dr. Mark Mateski’s concepts by applying both of them respectively to analyzing the character Grand Admiral Thrawn from the Star Wars universe and the way he successfully does his threat profiling and fusion of intelligence from a diverse number of sources. The parallelism with Grand Admiral Thrawn is considered to be an entertaining yet representative example of applying critical thinking in gathering and analyzing intelligence and conducting threat profiling.Examples from the real world will be provided throughout the presentation as well, showcasing how the elements discussed in the CHIMAERA model have significantly contributed in past cases.

Lastly, participants will have the option to participate in a “debrief”. Participants will be provided with certain threat actors and they will be given a few minutes to research and to think critically to figure out why those threat actors do what they do, not in terms of the TTPs but in terms of their motivations, rationale, etc. Feedback will be provided right after.


Presenters:

  • Tigran Terpandjian
    Tigran (th3CyF0x) is presently an Incident Handler. He has been fascinated with languages, cultures, social psychology, military tactics and history since childhood. Despite a degree in international relations, he stumbled across Cyber Security and decided to pull the trigger and tumble down the security rabbit hole. Along the way, he was beset by the beasts of Compliance (FedRAMP) but found his banner under Red Teaming. Tigran enjoys applying red teaming concepts to conduct threat hunting and is passionate about emulating an adversary. He also loves playing tennis and is an avid practitioner of Krav Maga.
  • Christina Lekati
    Christina is a Social Engineering expert and ethical human hacker. With a background in Psychology, she learned the mechanisms of behavior, motivation, decision making, as well as manipulation and deceit. She became particularly interested in human dynamics and passionate about social engineering. Her writings on social engineering strategies earned her a distinction during her master studies. Christina has participated among other things, in forensic investigations within companies, and in needs and vulnerabilities assessments. She is currently working with Cyber Risk GmbH, a provider of cyber security training programs, as a social engineering expert and trainer.

Links:

Similar Presentations: