SlideShare a Scribd company logo
Gajraj Singh
Vice President Product Marketing
Tripwire
cyberwar (noun)
Pronunciation: (/ˈsībərˌwôr/)
After land, sea, air and space,
warfare has entered the fifth domain: cyberspace.
The use of computer technology to disrupt the activities of a state or organization, especially
the deliberate attacking of information systems for strategic or military purposes
But there are few, if any, rules in this domain!
In fact, Cyberwar is NOT a defined term
of art in law or legal convention.
NATO Tries to Define Cyberwar
2014 summit declaration states, a certain threshold must be met to consider
invoking Article 5, the collective defense clause.
But how do we define “thresholds” in cyberspace?
1. Confidentiality – breaches have been treated as crimes
2. Availability – e.g. DDoS campaign against Estonia.
Espionage, sabotage, and crime but not an act of war
3. Integrity – e.g. Infecting industrial control systems.
Could be catastrophic
A small number of cyber attacks involve data manipulation, and even fewer
pose militaristic threats.
Five Pillars: Pentagon, United States military strategy for cyberwarfare
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
GROWTH
COMPETITIVENESS
OPS EFFICIENCY
CUSTOMER
EXPERIENCE
VISIBILITY
ADAPTIVENESS
RESPONSIVENESS
CONTROL
DIGITAL BUSINESS
SOURCE: Strategic and Int’l Studies
DEFEND AND PROTECT
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Reducing Risk Exposure
Detect & Respond to Threats
Drive Operational Efficiency
Integration&Automation
9,500+
Customers in
96 Countries
$$$
Profitable
475+
Employees
$167M
FY2015
Revenue
Reduce attack surface
Detect advanced threats
Business agility
Optimize resources
Reduce business risk
INTEGRATION
AUTOMATION
CONTEXT
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Real-time change detection
and audit tracking helps
maintain continuous
compliance
700+ policy and platform
support
Auto discovery and
inventory of all assets,
hardware and software
in scope.
Rapid discovery of gaps.
Audit and ensure patch
process through
integrated configuration,
vulnerability and log
management
Update with built-in
remediation guidance
Policy and compliance
content updates,
vulnerabilities and
security frameworks.
Evaluate ‘drift’ from
baseline – who, what,
when, why
Assist security and
compliance with
evidence & workflows
Automate IT and
security workflows and
processes
Quickly adapt & update
based on risk &
business priorities
Trusted: By over half of Fortune 500 and over 9,500+ customers worldwide
Advanced: Integrity monitoring, configuration and risk assessment portfolio
Open: Built for integration and automation across the security and IT ecosystem
Resilient: Proven, reliable platform for security, compliance and IT operations
cyberwar
Overview
enemy
Economy of Bad
battlefield
Shifting Landscape
yourself
Confidence
battle
Tips & Resources
tripwire.com | @TripwireInc
Download
from
www.tripwire.com

More Related Content

PPTX
Cyber security
PPTX
Cybersecurity Risks for Businesses
PDF
Securing the Cloud by Matthew Rosenquist 2016
PDF
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
PDF
Cybersecurity Skills in Industry 4.0
PDF
True Cost of Data Breaches
PPTX
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PDF
12 Top Talks from the 2016 R-CISC Summit
Cyber security
Cybersecurity Risks for Businesses
Securing the Cloud by Matthew Rosenquist 2016
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Cybersecurity Skills in Industry 4.0
True Cost of Data Breaches
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
12 Top Talks from the 2016 R-CISC Summit

What's hot (17)

PDF
Pivotal Role of HR in Cybersecurity
PPTX
Threat Intelligence Market
PPTX
Enterprise Cyber Security 2016
PDF
Insights into cyber security and risk
 
PDF
Cyber Secuirty Visualization
PPTX
Security Trend Report, 2017
PPTX
Integrated Response with v32 of IBM Resilient
PDF
Cybersecurity solution-guide
PDF
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
PDF
IT Security - Guidelines
PDF
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
PDF
Digital Transformation and Security for the Modern Business Part 1 – Finance
PDF
CSE 2016 Future of Cyber Security by Matthew Rosenquist
PDF
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
PPTX
Cyber Security for the Small Business Experience
PPTX
Are You Ready to Move Your IAM to the Cloud?
PDF
"Thinking diffrent" about your information security strategy
Pivotal Role of HR in Cybersecurity
Threat Intelligence Market
Enterprise Cyber Security 2016
Insights into cyber security and risk
 
Cyber Secuirty Visualization
Security Trend Report, 2017
Integrated Response with v32 of IBM Resilient
Cybersecurity solution-guide
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
IT Security - Guidelines
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Digital Transformation and Security for the Modern Business Part 1 – Finance
CSE 2016 Future of Cyber Security by Matthew Rosenquist
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
Cyber Security for the Small Business Experience
Are You Ready to Move Your IAM to the Cloud?
"Thinking diffrent" about your information security strategy
Ad

Viewers also liked (20)

PPTX
Tripwire University Boot Camp – Economy of Bad
PPTX
Tripwire University Boot Camp – The Shifting Landscape: Know Your Battlefield
PPTX
Leveraging Change Control for Security
PPTX
PCI Change Detection: Thinking Beyond the Checkbox
PPTX
Taking the Pain out of PCI Compliance
PPTX
Survival of the Fittest: How to Build a Cyber Resilient Organization
PPTX
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
PDF
Keep Your Guard: Stay Compliant and Be Secure
PPTX
Threat Intelligence from Honeypots for Active Defense
PPTX
"Backoff" Malware: How to Know If You're Infected
PPTX
Achieving Continuous Monitoring with Security Automation
PPTX
8 Tips on Creating a Security Culture in the Workplace
PPTX
An Essential Guide to EU GDPR
PPTX
Overload: Critical Lessons from 15 Years of ICS Vulnerabilities
PPTX
3 Success Stories on the Tripwire Enterprise Journey
PPTX
Tripwire IP360 Vulnerability Management
PPTX
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
PPTX
Breaking In and Breaking Records – A Look Back at 2016 Cybercrimes
PDF
How to Protect Your Organization from the Ransomware Epidemic
PPTX
Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
Tripwire University Boot Camp – Economy of Bad
Tripwire University Boot Camp – The Shifting Landscape: Know Your Battlefield
Leveraging Change Control for Security
PCI Change Detection: Thinking Beyond the Checkbox
Taking the Pain out of PCI Compliance
Survival of the Fittest: How to Build a Cyber Resilient Organization
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
Keep Your Guard: Stay Compliant and Be Secure
Threat Intelligence from Honeypots for Active Defense
"Backoff" Malware: How to Know If You're Infected
Achieving Continuous Monitoring with Security Automation
8 Tips on Creating a Security Culture in the Workplace
An Essential Guide to EU GDPR
Overload: Critical Lessons from 15 Years of ICS Vulnerabilities
3 Success Stories on the Tripwire Enterprise Journey
Tripwire IP360 Vulnerability Management
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Breaking In and Breaking Records – A Look Back at 2016 Cybercrimes
How to Protect Your Organization from the Ransomware Epidemic
Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
Ad

Similar to Tripwire University: Cyberwar Boot Camp – Introduction and Overview (20)

PDF
Cybersecurity and-cyberwar-singer-en-22186
PDF
Francesca Bosco, Le nuove sfide della cyber security
PDF
Understanding the 'physics' of cyber-operations - Pukhraj Singh
PPTX
Cyber war or business as usual
PDF
Cyber War, Cyber Peace, Stones and Glass Houses
PDF
Cyber warfare capabiliites : A Reality Check
PDF
Cyber Security, Cyber Warfare
PDF
Exp w22 exp-w22
PPTX
Cyber War, Cyber Peace, Stones, and Glass Houses
PPTX
Cyber Security Tools to be used for CS .pptx
ODP
CWFI Presentation Version 1
PDF
Cyber weapons 1632578286
PPTX
Honeypots in Cyberwar
PPTX
CYB205-1 Evolving Threat Landscapes_01.pptx
PDF
CYB205-1 Evolving Threat Landscapes_01.pdf
PDF
cyber war ppt.pptx.pdf downloads free for mca
PPTX
Cyber Warfare 4TH edition
PPTX
Cyber war a threat to indias homeland security 2015
PDF
20101012 isa larry_clinton
PPTX
Basic Cyber Security for beginners .pptx
Cybersecurity and-cyberwar-singer-en-22186
Francesca Bosco, Le nuove sfide della cyber security
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Cyber war or business as usual
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber warfare capabiliites : A Reality Check
Cyber Security, Cyber Warfare
Exp w22 exp-w22
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber Security Tools to be used for CS .pptx
CWFI Presentation Version 1
Cyber weapons 1632578286
Honeypots in Cyberwar
CYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pdf
cyber war ppt.pptx.pdf downloads free for mca
Cyber Warfare 4TH edition
Cyber war a threat to indias homeland security 2015
20101012 isa larry_clinton
Basic Cyber Security for beginners .pptx

More from Tripwire (20)

PDF
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
PDF
Data Privacy Day 2022: Tips to Ensure Data Privacy
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PPTX
Tripwire Energy Working Group: TIV Demo
PPTX
Tripwire Energy Working Group Session w/Dale Peterson
PPTX
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
PPTX
Tripwire Energy Working Group: Customer Session with Chase Cole
PPTX
Tripwire Energy Working Group: Keynote w/Patrick Miller
PDF
World Book Day: Cybersecurity’s Quietest Celebration
PDF
Tripwire Retail Security 2020 Survey: Key Findings
PDF
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
PDF
The Adventures of Captain Tripwire: Coloring Book!
PDF
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
PDF
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
PDF
Tripwire 2019 Skills Gap Survey: Key Findings
PDF
A Look Back at 2018: The Most Memorable Cyber Moments
PPTX
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
PDF
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
PPTX
Defend Your Data Now with the MITRE ATT&CK Framework
PPTX
Defending Critical Infrastructure Against Cyber Attacks
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Data Privacy Day 2022: Tips to Ensure Data Privacy
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Keynote w/Patrick Miller
World Book Day: Cybersecurity’s Quietest Celebration
Tripwire Retail Security 2020 Survey: Key Findings
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
The Adventures of Captain Tripwire: Coloring Book!
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
Tripwire 2019 Skills Gap Survey: Key Findings
A Look Back at 2018: The Most Memorable Cyber Moments
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Defend Your Data Now with the MITRE ATT&CK Framework
Defending Critical Infrastructure Against Cyber Attacks

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
cuic standard and advanced reporting.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
MIND Revenue Release Quarter 2 2025 Press Release
cuic standard and advanced reporting.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
sap open course for s4hana steps from ECC to s4
Programs and apps: productivity, graphics, security and other tools
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Empathic Computing: Creating Shared Understanding
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation theory and applications.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Understanding_Digital_Forensics_Presentation.pptx

Tripwire University: Cyberwar Boot Camp – Introduction and Overview