Introduction:

1. Objectives of the workshop

2. Expected outcomes

  • Spreadsheet that list all the consolidated successful attack vectors
  • ime permitting, spreadsheets that will enumerate mitigations and gaps

Session 1:

3. Compare the campaigns discussed so far and enumerate causes that allowed the attacks to be instantiated

  • Have we captured enough?

4. Work through the attack vectors used for each campaign

5. Can we distinguish more prevalent attacks?

6. Document commonalities in attack vectors

7. Discuss mitigations

BREAK

Session 2:

8. Continue discussion on mitigation of attacks

9. Identify main gaps


  • No labels