In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % A cyber warrior only allows that which is needed. A cyber master questions why it is needed. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Do not expose your weaknesses to the enemy; firewall judiciously. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % A key to victory in cyberwar is detecting and disabling protracted adversary operations. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % The whole secret to cyberwar lies in confusing the enemy, so that he cannot fathom our real defenses. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Manage flows out of the network as closely as those allowed in to defeat the persistent cyber adverary -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % The competent cyber warrior learns from their mistakes. The cyber master learns from the mistakes of others. -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % The cyber adversary sees your networked systems as points on a map with many routes between them. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Always be on the lookout for single points of failure that the cyber adversary can leverage in attacks. -- Sun Tzu, The Art of Cyber War % Authorized 'hacking back' will enable previously unrealized asymmetries for the cyber adversary. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Management will not provide additional budget based on ancient quotes on Powerpoint presentations. -- Sun Tzu, The Art of Cyber War % The fog of war is thick on the cyber battlefield -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % All warfare is based on deception and cyber attribution is a shit show -- Sun Tzu, The Art of Cyber War % A diligent risk register is an invaluable roadmap for the cyber adversary. -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % The enemy does not check your risk register prior to attacking. -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % The cyber expert in battle seeks his victory from strategic advantage and does not demand it from his SOC. -- Sun Tzu, The Art of Cyber War % Unlike on a battlefield, the cyber adversary always lives to attack again. -- Sun Tzu, The Art of Cyber War % Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago. -- Sun Tzu, The Art of Cyber War % The cyber adversary's tactics flow like water, seeking the path of least resistance. Plan accordingly. -- Sun Tzu, The Art of Cyber War % Cyber deterrence creates the next decade's malware problem. -- Sun Tzu, The Art of Cyber War % If you know your network and your systems, you need not fear the result of a hundred cyber battles. -- Sun Tzu, The Art of Cyber War % Do not rely too heavily on the skill of the common person to detect attacks. The adversary can quickly adapt. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Every cyber battle is won before it is fought -- Sun Tzu, The Art of Cyber War % The cyber master knows how varied a path the adversary can walk between systems, across the network -- Sun Tzu, The Art of Cyber War % Many great cyber battles were lost by warriors who failed to understand the methods of the adversary. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % Defeat wrought by known vulnerabilities is doubly painful in the media -- Sun Tzu, The Art of Cyber War % In the midst of chaos, there is opportunity for your adversary. Remain focused and organized in the face of chaos. -- Sun Tzu, The Art of Cyber War % One does not simply walk into cyber Mordor. -- Sun Tzu, The Art of Cyber War % The enemy does not care what systems were in scope for testing. Protect your weak points. -- Sun Tzu, The Art of Cyber War % Your adversary does not wait for you to finish patching. -- Sun Tzu, The Art of Cyber War % Great results can be achieved by small teams focused on the correct actions -- Sun Tzu, The Art of Cyber War % Most APTs are not very advanced -- Sun Tzu, The Art of Cyber War %