in Derry, Ireland. First computer was an Amstrad CPC 464, favourite game was Shinobi but preferred sports over computers, and still would today. 2000 Graduated from college and started working on an Internet Infrastructure team, learning about firewalls, dns, anti-virus etc. 2016 Moved to the US Owned all “player security”, including “anti cheat” where we built my first “purple” team. 2008 Final requirement for GSE - proctored GSEC, and met Steve Sims for the first time :) 2021 Joined Brex Led all of Security, now the CISO. Integrated purple into how we operate 2013 Took on my first security leadership role @ Riot Games - building a team and program from scratch, making every mistake in the book. 2000 2013 XXXX 2010 2016 2021 2024 2024 Sans Hackfest Los Angeles
and develops ways to prevent and mitigate them. Blue Team members monitor systems, detect suspicious activity, and respond to incidents. 01 02 03 The offensive team that simulates cyberattacks to identify vulnerabilities and test incident response. Red Team members are experts in offensive security, such as ethical hackers and penetration testers. Facilitates communication and collaboration between Red and Blue teams to improve an organization's security posture. Huh???
Sending the report to the boss rather than the blue team Simply disconnecting / removing accounts 01 02 03 04 05 Not sharing TTPs or IOCs Different roadmaps Disconnects
are shipped securely Reduce security risk to the business and the customers Make the secure way, the “easy” way, i.e. the default behaviour 01 02 03 04 05 Serve the business Enable the company to pass the various security compliance standards, and continue to operate
security review process Same rituals together (demos, stand-ups) Encourage red and blue teamers to have 1-1s 01 02 03 04 05 Same team, i.e. same reporting structure below CISO Share - reports, code, alerting configuration, tooling etc