Military Strategy and Tactics for Cyber Security

In today’s threat environment we aren’t just facing small scale operators, instead defenders must counter nation-state and nation-state-enabled threat groups, even cyber armies. InfoSec “best-practices” aren’t enough. This course course applies the vast canon of military strategy, tactics, and doctrine to cybersecurity and you’ll learn how these nation-state groups think and how to better organize, train, equip, perform intelligence analysis, and employ deception to defend your networks.

The designation of cyberspace as a NATO and U.S. military operational domain and subsequent application of military doctrine to cyberspace operations has shed light on new tactics and techniques for network defense. In this course, we will introduce you to the intricacies of this complex new landscape through discussion and hands-on exercises.

We designed this course for security professionals who would like to apply military cyber operations concepts to defending their enterprise and for NATO, DoD, contractor, and other government personnel who need to know more about the emerging field of Cyber Operations. Whether you like it or not, if you are charged with defending a network, you are facing nation-state adversaries. It is no longer sufficient to be “just a little more secure than the other guy.” Our enemies in the digital world will target both of you. And they will probably be successful. Furthermore, they don’t discriminate between government and private industry. They will attack them all and take whatever might prove useful in the future.

We will teach you how the enemy uses military strategies to attack your network, and how you can use similar strategies to defend it. Publicly available information, software and hardware monocultures, porous attack surfaces, and ever present vulnerabilities have the defender always playing catch up. This course will help defenders generate the information, disinformation, and intelligence strategies that will to put you and your assets in a position of tactical strength, not weakness. Many of today’s best practices are stuck in the individual and small team model, we’ll provide you an entirely new arsenal of military grade strategies and tactics that scale to the enterprise-level and will help you fend off even nation-state adversaries. In addition, you will also learn how to reverse enemy strategy and tactics to help predict their next moves so you can counter them in advance.

This course was developed by career Army officers with a combined 50+ years of experience and all material discussed will be unclassified. The views expressed in course are those of the authors and do not reflect the official policy or position of the U.S. Department of the Army, the Department of Defense, or the United States Government.

Who Should Attend this Training?

Anyone responsible for defending a network and interested in new defensive techniques and approaches based on military doctrine and strategy. Our material is appropriate for hands-on network defenders as well as executives responsible for network defense.

Requirements

  • General understanding of network security concepts and how they are traditionally applied.

  • Prior familiarity with military tactics or doctrine is not required.

  • Preferred tool for taking notes.

  • All course materials will be provided. Students will be provided with: Printed course notebook Book on military strategy and cybersecurity

About the Speaker