diff options
Diffstat (limited to 'cybersuntzu')
-rw-r--r-- | cybersuntzu | 3068 |
1 files changed, 3068 insertions, 0 deletions
diff --git a/cybersuntzu b/cybersuntzu new file mode 100644 index 000000000000..f54a93c068d0 --- /dev/null +++ b/cybersuntzu @@ -0,0 +1,3068 @@ +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +A cyber warrior only allows that which is needed. A cyber master +questions why it is needed. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Do not expose your weaknesses to the enemy; firewall judiciously. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +A key to victory in cyberwar is detecting and disabling protracted +adversary operations. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The whole secret to cyberwar lies in confusing the enemy, so that he +cannot fathom our real defenses. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Manage flows out of the network as closely as those allowed in to defeat +the persistent cyber adverary + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The competent cyber warrior learns from their mistakes. The cyber +master learns from the mistakes of others. + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary sees your networked systems as points on a map with +many routes between them. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Always be on the lookout for single points of failure that the cyber +adversary can leverage in attacks. + -- Sun Tzu, The Art of Cyber War +% +Authorized 'hacking back' will enable previously unrealized asymmetries +for the cyber adversary. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Management will not provide additional budget based on ancient quotes on +Powerpoint presentations. + -- Sun Tzu, The Art of Cyber War +% +The fog of war is thick on the cyber battlefield + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +All warfare is based on deception and cyber attribution is a shit show + -- Sun Tzu, The Art of Cyber War +% +A diligent risk register is an invaluable roadmap for the cyber +adversary. + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not check your risk register prior to attacking. + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +The cyber expert in battle seeks his victory from strategic advantage +and does not demand it from his SOC. + -- Sun Tzu, The Art of Cyber War +% +Unlike on a battlefield, the cyber adversary always lives to attack +again. + -- Sun Tzu, The Art of Cyber War +% +Your enemy cares not that the maintainer of an Internet-connected server +left 10 years ago. + -- Sun Tzu, The Art of Cyber War +% +The cyber adversary's tactics flow like water, seeking the path of least +resistance. Plan accordingly. + -- Sun Tzu, The Art of Cyber War +% +Cyber deterrence creates the next decade's malware problem. + -- Sun Tzu, The Art of Cyber War +% +If you know your network and your systems, you need not fear the result +of a hundred cyber battles. + -- Sun Tzu, The Art of Cyber War +% +Do not rely too heavily on the skill of the common person to detect +attacks. The adversary can quickly adapt. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Every cyber battle is won before it is fought + -- Sun Tzu, The Art of Cyber War +% +The cyber master knows how varied a path the adversary can walk between +systems, across the network + -- Sun Tzu, The Art of Cyber War +% +Many great cyber battles were lost by warriors who failed to understand +the methods of the adversary. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +Defeat wrought by known vulnerabilities is doubly painful in the media + -- Sun Tzu, The Art of Cyber War +% +In the midst of chaos, there is opportunity for your adversary. Remain +focused and organized in the face of chaos. + -- Sun Tzu, The Art of Cyber War +% +One does not simply walk into cyber Mordor. + -- Sun Tzu, The Art of Cyber War +% +The enemy does not care what systems were in scope for testing. Protect +your weak points. + -- Sun Tzu, The Art of Cyber War +% +Your adversary does not wait for you to finish patching. + -- Sun Tzu, The Art of Cyber War +% +Great results can be achieved by small teams focused on the correct +actions + -- Sun Tzu, The Art of Cyber War +% +Most APTs are not very advanced + -- Sun Tzu, The Art of Cyber War +% |