Guerilla Warfare Tactics

Presented at NolaCon 2022, May 21, 2022, 4 p.m. (Unknown duration).

<p>Blue teamers in the trenches need to stop living groundhog day, time to punch Bill Murray in the face and change the game in our favor! The game has changed but the basics are the same. Coined in the 90&#39;s by General Krulak, the three-block war is described as full-scale military action, peacekeeping operations (PKO) and humanitarian aid within the space of three contiguous city blocks. </p> <p>How does this compare to starting your morning activating your incidence response (IR) plan due to a suspected credential breach, change management meetings (compliance), and handing out hugs while CXO&#39;s change their passwords for the first time. One: no one is shooting at you and two: not much else. Just as methods of warfare have changed, so too has the way we must run security programs. What does takes to prepare and execute your own three block Blue team war?</p>

Presenters:

  • Rob Carson
    <p>Rob Carson is the Founder and Chief Executive Officer of Semper Sec. With over a decade working in information security management, Rob has held positions as Vice President of Operations at InteliSecure, Director of Security at Cherwell Software and Director of Programmatic Services at Celsus Advisory Group. In addition to his private sector experience, Rob served as an infantry officer in the United States Marine Corps for seven years. Rob built and led high performing teams, resulting in mission accomplishment through troop welfare. His passion for excellence was shaped by his time in the Marines, where he was taught discipline, persistence, and the value of simplifying complex tasks to drive success.</p> <p>Rob has built highly successful information security management systems, implementing, and maintaining certifications for ISO 27001:2005/2013, PCI and HIPPA. He has achieved a Bachelor of Science from Texas A&amp;M and a Master of Science from the University of Maryland University College; He holds the following certifications, CISSP, CISA, and CCSK.</p>

Links:

Similar Presentations: