diff options
-rw-r--r-- | .SRCINFO | 14 | ||||
-rw-r--r-- | PKGBUILD | 23 | ||||
-rw-r--r-- | cybersuntzu | 3068 |
3 files changed, 3105 insertions, 0 deletions
diff --git a/.SRCINFO b/.SRCINFO new file mode 100644 index 000000000000..7e83439bf735 --- /dev/null +++ b/.SRCINFO @@ -0,0 +1,14 @@ +pkgbase = fortune-mod-cybersuntzu + pkgdesc = #Cyber Sun Tzu fortune cookie file + pkgver = 1 + pkgrel = 1 + url = https://twitter.com/suntzucyber + arch = any + groups = fortune-mods + license = custom:PublicDomain + depends = fortune-mod + source = cybersuntzu + sha256sums = 21c1e38e68925ff46214b7d1fbeb2f2b578bc88bdc0c9cd97d29d80a3c45567d + +pkgname = fortune-mod-cybersuntzu + diff --git a/PKGBUILD b/PKGBUILD new file mode 100644 index 000000000000..7499cd4ddf73 --- /dev/null +++ b/PKGBUILD @@ -0,0 +1,23 @@ +# Maintainer: Mauro Andreolini <mauro.andreolini@gmail.com> + +pkgname=fortune-mod-cybersuntzu +pkgver=1 +pkgrel=1 +pkgdesc="#Cyber Sun Tzu fortune cookie file" +arch=('any') +license=('custom:PublicDomain') +url="https://twitter.com/suntzucyber" +depends=('fortune-mod') +groups=('fortune-mods') + +source=('cybersuntzu') +sha256sums=('21c1e38e68925ff46214b7d1fbeb2f2b578bc88bdc0c9cd97d29d80a3c45567d') + +build() { + strfile ${srcdir}/cybersuntzu ${srcdir}/cybersuntzu.dat +} + +package() { + install -D -m644 ${srcdir}/cybersuntzu ${pkgdir}/usr/share/fortune/cybersuntzu + install -D -m644 ${srcdir}/cybersuntzu.dat ${pkgdir}/usr/share/fortune/cybersuntzu.dat +} diff --git a/cybersuntzu b/cybersuntzu new file mode 100644 index 000000000000..f54a93c068d0 --- /dev/null +++ b/cybersuntzu @@ -0,0 +1,3068 @@ +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% |