C2 Matrix | SANS@MIC Talk

Subscribers:
64,200
Published on ● Video Link: https://www.youtube.com/watch?v=VVSoUWnrWuw



Category:
Guide
Duration: 58:27
1,101 views
27


Command and Control is one of the most important tactics in the MITRE ATT&CK matrix as it allows the attacker to interact with the target system and realize their objectives. Organizations leverage Cyber Threat Intelligence to understand their threat model and adversaries that have the intent, opportunity, and capability to attack. Red Team, Blue Team, and virtual Purple Teams work together to understand the adversary Tactics, Techniques, and Procedures to perform adversary emulations and improve detective and preventive controls.

The C2 Matrix was created to aggregate all the Command and Control frameworks publicly available (open-source and commercial) in a single resource to assist teams in testing their own controls through adversary emulations (Red Team or Purple Team Exercises). Phase 1 lists all the Command and Control features such as the coding language used, channels (HTTP, TCP, DNS, SMB, etc.), agents, key exchange, and other operational security features and capabilities. This allows more efficient decisions making when called upon to emulate and adversary TTPs.

It is the golden age of Command and Control (C2) frameworks. Learn how these C2 frameworks work and start testing against your organization to improve detective and preventive controls.

The C2 Matrix currently has 35 command and control frameworks documented in a Google Sheet, web site, and questionnaire format.

https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0

https://www.thec2matrix.com/

https://ask.thec2matrix.com/

https://howto.thec2matrix.comhttps://howto.thec2matrix.co

Speaker Bio
Jorge Orchilles has been involved in Information Technology since 2001. He began his career as a network and system administrator for a small private high school. Realizing his passion for IT, he founded The Business Strategy Partners in 2002 providing consulting services to residential, small, and medium businesses. While gaining work experience, he was a very involved, full-time student in Florida International University (FIU). He founded the FIU MIS Club and was later contracted to work on the University's Active Directory Migration Project. After successful and on time completion of the project, he was employed by Terremark in 2007, a datacenter and cloud service provider acquired by Verizon. Jorge helped build and secure Terremark's Infrastructure as a Service (IaaS) solution first called Collocation 2.0 and then "The Enterprise Cloud" in 2008. Jorge developed a large interest in Information Security and was promoted to a Security Operations Center Analyst position in 2009. After a year of defending critical infrastructure for federal and commercial customers, he moved to an offensive analyst position with a large, global financial institution in 2010. Since then, Jorge has performed hundreds of application and infrastructure vulnerability assessments and penetration tests. His leadership gained him various promotions and opportunities to lead various teams within the offensive information security team of over 140 ethical hackers including the Advanced Penetration Team (Red Team), the Responsible Vulnerability Disclosure program, and the Cloud Security program.




Other Videos By SANS Institute


2020-05-05Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
2020-05-05Accessing Data in the Cloud | SANS@MIC Talk
2020-04-30The SANS | GIAC Cybersecurity Training Experience: Get Ready for Something Phenomenal
2020-04-30Reflections of a New CISO: 5 Lessons Learned | SANS@MIC Talk
2020-04-30Driving Cybersecurity Change – Establishing a Culture of Protect, Detect and Respond Highlights
2020-04-28Modern Domain Deception - Risks, Limits and potentiality | SANS@MIC Talk
2020-04-28What Students Are Saying About SANS Live Online - New SANS Training Platform
2020-04-23Secure Video Conferencing - What to Train Your Workforce On | SANS@MIC Talk
2020-04-21Learning From The Adversary: Automated Malware Analysis For The Win! | SANS@MIC Talk
2020-04-21Self-Compiling Malware | SANS@MIC Talk
2020-04-17C2 Matrix | SANS@MIC Talk
2020-04-14SANS Live Online - New Online Training Platform
2020-04-14Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
2020-04-14Check out SEC573! More Python3! More Pywars! | SANS@MIC Talk
2020-04-10How Threats are Responding to COVID-19 | STAR Webcast
2020-04-09Take Back The Advantage - Cyber Deception for the Win | SANS@MIC Talk
2020-04-07Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk
2020-04-07Domain Password Auditing with the Cloud | SANS@MIC Talk
2020-04-07SANS Institute - Self Paced Online Training
2020-04-06ZOMG It's ZOOM! - Don't worry, it's safe. As long as you follow some rules. - SANS Webcast
2020-04-03What Every Pen Tester Needs to Know About ICS



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
C2
C2 matrix
command and control