UnICORN Library

SCYTHE aims to educate and engage in order to inspire the art of the possible in cybersecurity. Adversarial threats, risk management, and security innovation don’t pause when working from home. We have curated a collection of presentations, research, and conversations from our team. Come enjoy our library and stay tuned for the new unicorn content that will be added regularly.

PRESENTATIONS

Bryson Bort's presentation at Advanced Persistent Talks - Adversarial Emulation

The presentation goes through multiple considerations of the entire red team lifecycle. Concluding with how we can work on these activities towards a purple team approach.

VIEW

Wild West Hackin' Cast by Adam Mashinchi - Quickstart Guide to MITRE ATT&CK: the Do's and Don'ts when using the Matrix

This webcast will provide the audience with a very fast, yet very practical, overview of ATT&CK; as well as how it is being utilized well, and not-so-well, in the industry.

VIEW

Bryson Bort & Chris Kreb’s ICS Discussion at RSA Conference 2020

They talk about the vision for community engagement, training and partnership to provide interactive simulated control systems environments.

VIEW

Liz Wharton and Suchi Pahi’s presentation at ShmooCon 2020 - Face/Off: Action Plan for Perils & Privileges of Facial Recognition

This presentation talks about current facial recognition use cases, growing regulatory concerns, the consequences of facial recognition, and what you can do.

VIEW

BrightTALK Webinar by Liz Wharton - A Game of Risk

Third parties continue to be a rising cause for costly breaches. Approach mitigating these costs through basic board game strategies: identify an organization's third party landscape, observe threat movements, and strengthen internal resources.

VIEW

Bryson Bort’s presentation at WWHF 2019 - Adversarial Emulation

This talk goes through multiple considerations of the entire red team lifecycle including walking through open source toolsets.

VIEW

Bryson Bort’s presentation at DerbyCon 2019 - Adversarial Emulation

Learn to move your defenses and understanding beyond a detection-based approach which has repeatedly been demonstrated to fail.

VIEW

Bryson Bort’s presentation in the ICS Village at DEF CON 27 - ICS/IOT Threat Landscape

Get a high-level overview summary of the threats against ICS we've seen in the past year including techniques, actor attribution, motivation, and the intelligence lifecycle.

VIEW

VIDEOS

Check out our SCYTHE 2.5 demonstration video!
Improve your risk posture and find your cybersecurity blindspots.

EVALUATE

Simulating Ransomware Attacks with SCYTHE - PSW #627

VIEW

Security Weekly Black Hat 2019

VIEW

ITSP Magazine Unusual Gatherings - Holiday 2019 Edition

VIEW

The Political Knowledge Gap in Cybersecurity on Capitol Hill

VIEW

Bryson Bort, SCYTHE pt.1 - Derbycon8

VIEW

Bryson Bort, SCYTHE pt.2 - Derbycon8

VIEW

PODCASTS

Innovate at the edge

Bryson Bort shares insights on community led inventiveness behind the launch of the SCYTHE Marketplace and its Advisory Council.

VIEW

What is the SCYTHE Marketplace?

Adam Mashinchi discusses how the SCYTHE Marketplace expands effective threat emulation that keeps pace with the latest trends and how developers can get involved.

VIEW

Interview with Chloé Messdaghi

SCYTHE had the opportunity to sit down and talk with Advisory Council member, Chloé Messdaghi during ShmooCon 2020. Here what she had to talk about.

VIEW

Mistaken Identity

Interview Lawyer, Cyber Security and Privacy maven Liz Wharton regales us with tales of her hand-to-hand combat experience with the Atlanta Ransomware of 2018, and then unfolds the current state of facial recognition in all its manifold splendor.

VIEW

Security Sandbox: Not Doing it Alone with Bryson Bort

On this episode, Bryson Bort talks about his companies GRIMM and SCYTHE, his time in the army, and his very important announcement regarding the names of some unicorns.

VIEW

What Is Real-ID And Why Should You Care | A Conversation With Elizabeth Wharton & Steve Luczynski

Liz and Steve talk with ITSP about what Real-ID is and what you need to know about it.

VIEW

let our tech speak for itself

Know where you stand with SCYTHE. Talk to us to start the evaluation process today! We’d love to talk to you about how SCYTHE can fit into your cybersecurity workflow.