An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
7th Army Training Command
7th ATC
Search 7th ATC:
Search
Search
Search 7th ATC:
Search
Home
About Us
Mission
Our History
Leadership
Staff
Chaplain
G1
G2
G3
G4
G6
G8
IG
MRA
Public Affairs
Protocol
SJA
SHARP
Directorates and Commands
Combined Arms Training Center
Grafenwoehr Training Area
International Special Training Centre
Joint Multinational Readiness Center
Joint Multinational Simulation Center
Noncommissioned Officer Academy
Training Support Activity Europe
Units
Joint Multinational Training Group-Ukraine
Georgian Defense Readiness Program-Training
HHC
Environment
Competitions
Europe Best Sniper Team
USAREUR-AF International Tank Challenge
USAREUR-AF Best Squad
European Best Medic Competition
Exercises
Allied Spirit
Combined Resolve
Saber Junction
Media & News
Uebungsbetrieb
Newcomers
A to Z
Contact Us
Home
:
Media & News
:
Video
DVIDSVideoPlayer
Playlist:
Search Results
Video by Steven Stover
Player Embed Code:
Download
Embed
Share
AvengerCon VIII: Should the Army Lead with Threat Intelligence or Compliance-Driven Security Programs
780th Military Intelligence Brigade (Cyber)
Feb. 29, 2024 | 18:03
Presented by Karlo Arozqueta
Synopsis:
An ever-growing number of DoD leaders have become frustrated with the burdensome and arduous RMF and ATO process. They have been asking, “Is there a better way?”. While cyber compliance policy will always remain critical, there is acknowledgment that an intelligence-led security approach is more nimble and cost-effective. As a result, some organizations are pivoting from event-driven cybersecurity syndrome (where alerts, incidents, breaches, audits, compliance, and privacy take precedence), to an approach that embraces cyber insights, signals, and intelligence as guiding principles.The Google Mandiant team will discuss unique approaches to data intelligence gathering, research, curation, and dissemination solutions. These intelligence subscriptions enable services to obtain unique threat actor data as they continuously navigate towards an even stronger cybersecurity posture.
Boiler:
AvengerCon VIII is complete! We had over five hundred attendees, including hundreds remotely, as well as more than thirty presentations, and half a dozen villages.
Thank you everyone who attended, to our dedicated volunteers, and to our friends at the Georgia Cyber Center, CyberFIC, ArCTIC, and ACI! Without all of you this event wouldn't have been what it is, and we're looking forward to seeing you next time!
AvengerCon is a free security event organized by volunteers from the U.S. Army’s 780th Military Intelligence Brigade (Cyber) to benefit the hackers of the U.S. Department of Defense community. The event is open to all DoD service members and employees, and related partners supporting cyberspace missions. AvengerCon features presentations, hacker villages, training workshops, and much more.
The views expressed are those of the presenter, and do not reflect the official position of the 780th Military Intelligence Brigade (Cyber), the Department of the Army, or Department of Defense.
https://www.army.mil/article/274161/avengercon_viii_army_cybers_homegrown_hacker_con_returns
More
Tags
Army Cyber
AvengerCon VIII
More
Up Next
33:50
AvengerCon VIII: AdTech and Military-Friendly Banks – Data Vulnerabilities for Servicemembers, Families, and Veterans
32:31
AvengerCon VIII: Blockchain Forensics and Incident Response
27:22
AvengerCon VIII: Collective Cyber Defense: Getting From Theory to Reality
38:39
AvengerCon VIII: Cyber: The Next Generation
33:00
AvengerCon VIII: Hiding in Plain Sight: Tracking Malware Abusing Web Applications
38:26
AvengerCon VIII: An intern's journey in Evading EDRs
35:06
AvengerCon VIII: Laundering Information: Building Perceived Legitimacy
43:27
AvengerCon VIII: Information Operations Tactics of "Pig Butchering" Scam Rings
27:34
AvengerCon VIII: Six Years Later: Spectre, Meltdown, and the Relevance of Hardware Security
Now Playing
AvengerCon VIII: Should the Army Lead with Threat Intelligence or Compliance-Driven Security Programs
29:39
AvengerCon VIII: Homestation Training as Code: a framework to define, build, and use code-driven technical training materials
36:43
AvengerCon VIII: Big Game Hunting - Scanning the Internet for Malware
39:32
AvengerCon VIII: WO Panel: Hacking Cyber Operations and Network Defender Training, A Bold Step Toward Army Modernization.
2:40
AvengerCon VIII - Capt. Jacob HeyBey
23:34
AvengerCon VIII: Steganography: Nothing To See Here! (updated)
More Videos