The Changing Nature of Cyber Warfare
Cyber Warfare: From Conventional through the Grey Zone to Hybrid Warfare. Countering the emerging threat though Threat Informed Resilience
About this event
Glenn will commence by providing an overview of cyber warfare, articulating the strategic fit in current definitions. This overview will define the largely agreed definitions and scope of conventional warfare, grey zone warfare and hybrid warfare. To fully articulate the scope, we will discuss the major activities that may be engaged within these definitions, such as conventional kinetic strikes, mis/disinformation, political and economic coercion, propaganda, and espionage through to deployment of destructive cyber weapons.
Glenn will also describe the relative advantages of cyber warfare to the attacker, from the difficulty of attribution, geographic advantages; as well as other less considered benefits like cost and return on investment.
We will then explore anecdotal case studies highlighting the integration of cyber warfare into hybrid operations, including the use of cyber tools for intelligence gathering, deception, and coordination of kinetic attacks. Glenn will illustrate known examples of hybrid warfare, starting with NotPetya in 2017, through to the current impact of wiper malware like HermeticWiper in 2022. The discussion will examine examples of hybrid warfare activity: including network intrusions, denial-of-service attacks, and data manipulation.
This analysis will be based upon both Open-Source Intelligence and data from FortiGuard Labs telemetry – which clearly depicts the global emergence and variance of cyber warfare elements such as wiper malware.
It is certain that most nations are already experiencing Grey Zone activity. Adversaries are exploiting the ambiguity of cyber operations, hiding within the blurred lines between state-sponsored and criminal activities.
Grey zone activities are critical in the execution of hybrid warfare elements, as the enable the adversary to perform deep reconnaissance and intelligence gathering. The adversary will understand system architectures, structures, processes, and people within their target organisation. This gives the adversary intelligence on the attack surface and defence systems they must defeat. This activity within the grey zone also facilitates proactive prepositioning – enabling access for subsequent activity.
Finally, the presentation will investigate the boundary and linkages between offensive activities in the perspective of a strategic, offensive cyber operation. This presentation will use the Kill Chain and MITRE ATT&CK frameworks to model a hybrid warfare operation, isolate the key defensive points, propose defensive strategies, and explain the critical importance of proactive resilience.
* If you are experiencing trouble when registering please email Lauren Hall at Lauren.Hall@acs.org.au
Speakers
Glenn forged his cyber career in the Australian Defence Security Community. This included intelligence collection, analysis and reporting, and importantly, supporting priority Defence operations.
Key achievements:
•Established the project team that developed the World Economic Forum Centre for Cybersecurity's ground-breaking CyberCrime Atlas.
•Co-founded the $140M Australian Cybersecurity Cooperative Research Centre.
•Established the 24x7 Security Operations Centre for the $1B Lockheed Martin / Defence Centralised Processing project.
•As the IT Security Advisor to the Australian Tax Office; rewrote the enterprise cybersecurity policy, co-designed the enterprise cyber risk management framework and built Australia's largest IRAP cyber compliance team.
•As Director Geospatial Exploitation at the Australian Geospatial Intelligence Organisation, led Australia's first human terrain intelligence collection and analysis in Afghanistan.
•Worked and learned alongside the best in the world at the Australian Signals Directorate.
Proudly sponsored by
Event Location
Event Terms & Conditions
Registration
- Payment in full is required the time of booking in order for the registration to be valid.
- To avoid disappointment, ensure you pay for your booking(s) before the registration closing date. Anyone that has not received a confirmation email will not be on the event attendance list and therefore will not be admitted to the event.
- Online registration ends at the time stated on the event registration page.
Cancellation and Refund
All cancellations must be processed through the website, a refund will only be considered if it is at least 3 working days prior to the event.
Disclaimer
- ACS reserves the right to change the program at any time. Every effort will be made to ensure a program of equivalent standard and members are updated with changes.
- All dietary requirements are considered, however we cannot guarantee a 100% allergen free environment.
- ACS reserves the right to prohibit entry or eject any person from an ACS event based on behaviour deemed inappropriate by ACS staff, its agents and/or others working under its authority.
- Filming or streaming by attendees is not permitted. If an attendee is found to be doing so they will be asked to leave the event immediately and further action may be taken.
- Photography and/or filming may take place during this event, by accepting these terms you consent to this. Please let a member of ACS know if you do not want your picture taken.
COVID-19 Event Attendance Compliance
By registering to attend an ACS in person event you are agreeing to the below terms and conditions
- If an attendee is displaying flu or cold like symptoms in the days leading up to the event and therefore is not able to attend, ACS will refund the registration fee.
- If an attendee comes to an event and is displaying flu or cold like symptoms they will be asked to leave
- We ask all ACS members to respect the social distancing guidelines, if an attendee repeatedly disregards these guidelines, they may be asked to leave
- ACS reserves the right to cancel the event within 24 hours' notice if either the speaker or the event host has advised us that they are exhibiting flu or cold like symptoms
- All attendees must provide a valid phone number and email address to be contacted on if there is reason to notify about a possible COVID-19 exposure
Personal information collection notice
By registering for this event, you are providing personal information to the Australian Computer Society. In accordance with the ACS Privacy Policy, ACS collects personal information through registrations and attendances at its events for the purposes of:
- organising and providing the various professional development events held by the ACS (including for example, courses, conferences, seminars, workshops, launches);
- processing and managing event registrations (including catering for dietary requirements);
- maintaining event attendance records;
- contacting registered event guests with information in regard to the event and seeking post-event feedback;
- communicating with you to in relation to future events or ACS products, courses, services, promotions or other products or services that ACS reasonably thinks may be of interest to attendees;
- processing and responding to attendee inquiries; and
- conducting research to improve its events and better understanding needs.
If the required information is not provided, we or any involved third parties, may not be able to respond to you, update you, or provide appropriate services or events to you.
We may obtain personal information directly from you or from someone who registers for the event on your behalf. If you provide us with personal information about another person, you must do so only with their consent and agree to make them aware of this privacy notice.
ACS may share your personal information with third parties for the collection purposes noted above or as set out in our Privacy Policy, where it is reasonably necessary for, or directly related to, one or more of our activities, or required by law.
When you register to participate in an overseas event, we may send personal information we collect overseas.
See our Privacy Policy at https://www.acs.org.au/privacy-policy.html for more information about our privacy practices.