A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Let's Play Defense at Cyber Speed - Duncan Sparrell (ANYCon 2017 Videos) (Hacking Illustrated Series InfoSec Tutorial Videos)

Let's Play Defense at Cyber Speed
Duncan Sparrell

ANYCon 2017

Cyber-attacks are increasing in terms of sophistication, speed and dynamics. Advanced cyber actors (and even script kiddies) are utilizing automation with adaptive tradecraft and these trends are likely to continue. To combat this we need to facilitate interoperability and integration by standardizing interfaces & protocols allowing more flexible and interoperable cyber defense components. OpenC2 is being created to standardize machine-to-machine command & control (C2) to enable cyber defense system interoperability at machine speeds. This will make defense cheaper/better/faster and economics that will drive adoption. The talk will begin with the problem openC2 is trying to solve, provide a review of openC2 and its use cases, show the economics of adoption, review various open source implementations, and give the current status on standardization.

Duncan Sparrell is a seasoned (aka old) software developer and network security evangelist. He graduated from RPI back when computers were the size of buildings and programmed with punch cards. He is semi-retired and trying to give back to the community while pursuing his interests in cloud security, agile, secure software development, and erlang. Most of his cyber experience is blue team (defense) but he kick-started his cyber chops as part of a CNA (offense) team during first Gulf War. Besides having various certs (CSSIP, CSSLP, CCSK, PE), the US Govenment awarded him the Intelligence Community Seal Medallion, and AT&T awarded him its Science and Technology Medal. His PGP fingerprint is ?A870 5F67 00F9 D3FC ECD1 2D97 2A42 E870 6A4E EC12?, his twitter handle is @dsparrell, his peerlyst handle is sFractal, and his github handle is sparrell.

Back to ANYCon 2017 Videos list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast