summarylogtreecommitdiffstats
path: root/cybersuntzu
diff options
context:
space:
mode:
Diffstat (limited to 'cybersuntzu')
-rw-r--r--cybersuntzu3068
1 files changed, 3068 insertions, 0 deletions
diff --git a/cybersuntzu b/cybersuntzu
new file mode 100644
index 000000000000..f54a93c068d0
--- /dev/null
+++ b/cybersuntzu
@@ -0,0 +1,3068 @@
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%