The presentation discusses the need for a framework to measure the effectiveness of disruptive cyber operations and calls for the cybersecurity community to use and develop these frameworks.
- A three-year disruption operation was conducted to stop the spread of malware, but the authors of the malware quickly responded with new versions that bypassed defensive mitigations.
- The lack of delay from the other side suggests that a new offensive posture is making it more difficult for network defenders to protect their systems.
- The presentation proposes a framework to measure the effectiveness of disruptive cyber operations and calls for the cybersecurity community to use and develop these frameworks.
- The framework has some shortcomings, such as the effects of technical developments and geopolitical events, but the direction of the trend is more important than the exact numbers.
- The community needs to start measuring and sharing results openly to show evidence of the outcomes of their work and to convince policymakers and executives to take action.
The presenter shared an anecdote about how difficult it can be to find data and analyze it to understand what is happening in the cybersecurity landscape. They emphasized the importance of being transparent about the shortcomings of the framework and controlling for factors that could impact the analysis. They also stressed the need to focus on the direction of the trend rather than the exact numbers to send alarm signals for persistent engagers.