Bryson Bort's presentation at Advanced Persistent Talks - Adversarial Emulation
The presentation goes through multiple considerations of the entire red team lifecycle. Concluding with how we can work on these activities towards a purple team approach.
Wild West Hackin' Cast by Adam Mashinchi - Quickstart Guide to MITRE ATT&CK: the Do's and Don'ts when using the Matrix
This webcast will provide the audience with a very fast, yet very practical, overview of ATT&CK; as well as how it is being utilized well, and not-so-well, in the industry.
Bryson Bort & Chris Kreb’s ICS Discussion at RSA Conference 2020
They talk about the vision for community engagement, training and partnership to provide interactive simulated control systems environments.
Liz Wharton and Suchi Pahi’s presentation at ShmooCon 2020 - Face/Off: Action Plan for Perils & Privileges of Facial Recognition
This presentation talks about current facial recognition use cases, growing regulatory concerns, the consequences of facial recognition, and what you can do.
BrightTALK Webinar by Liz Wharton - A Game of Risk
Third parties continue to be a rising cause for costly breaches. Approach mitigating these costs through basic board game strategies: identify an organization's third party landscape, observe threat movements, and strengthen internal resources.
Bryson Bort’s presentation at WWHF 2019 - Adversarial Emulation
This talk goes through multiple considerations of the entire red team lifecycle including walking through open source toolsets.
Bryson Bort’s presentation at DerbyCon 2019 - Adversarial Emulation
Learn to move your defenses and understanding beyond a detection-based approach which has repeatedly been demonstrated to fail.
Bryson Bort’s presentation in the ICS Village at DEF CON 27 - ICS/IOT Threat Landscape
Get a high-level overview summary of the threats against ICS we've seen in the past year including techniques, actor attribution, motivation, and the intelligence lifecycle.
Check out our SCYTHE 2.5 demonstration video!
Improve your risk posture and find your cybersecurity blindspots.
Innovate at the edge
Bryson Bort shares insights on community led inventiveness behind the launch of the SCYTHE Marketplace and its Advisory Council.
What is the SCYTHE Marketplace?
Adam Mashinchi discusses how the SCYTHE Marketplace expands effective threat emulation that keeps pace with the latest trends and how developers can get involved.
Interview with Chloé Messdaghi
SCYTHE had the opportunity to sit down and talk with Advisory Council member, Chloé Messdaghi during ShmooCon 2020. Here what she had to talk about.
Interview Lawyer, Cyber Security and Privacy maven Liz Wharton regales us with tales of her hand-to-hand combat experience with the Atlanta Ransomware of 2018, and then unfolds the current state of facial recognition in all its manifold splendor.
Security Sandbox: Not Doing it Alone with Bryson Bort
On this episode, Bryson Bort talks about his companies GRIMM and SCYTHE, his time in the army, and his very important announcement regarding the names of some unicorns.
What Is Real-ID And Why Should You Care | A Conversation With Elizabeth Wharton & Steve Luczynski
Liz and Steve talk with ITSP about what Real-ID is and what you need to know about it.