Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why You Must Think Like Your Adversary After a Data Breach
Cybersecurity

Why You Must Think Like Your Adversary After a Data Breach

Robert WoodBy Robert WoodDecember 7, 2022Updated:December 8, 20224 Mins Read
Facebook Twitter LinkedIn Email
adversary data breach
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The log-driven approach, which entails using hard data to find the breach’s root cause and identify the scope of the damages, is a common method for investigating data breaches. Sometimes, we don’t have all the logs we might need. In those cases, stepping back to think about the breach from our adversary’s perspective can provide imaginative ideas that can drive the investigation forward. In this analysis, I’ll describe how thinking like your adversary, in combination with other essential tactics, can enhance your data breach investigation.

Forming an Attacker Profile

To start the conversation, you need to identify potential adversaries, tactics, and motivation. A natural next step would be to browse the MITRE ATT&CK framework groups repository, which gathers together much of the work done across the cybersecurity industry to identify threat actor groups; break down their capabilities; and then map those capabilities to a typically used set of tactics, techniques, and procedures (TTPs); and, finally, tie it all together with threat intelligence. This work, while valuable, can get precise and, amid a fast-moving investigation, may be more of a distraction than a value add. But if you have a team who is well versed in using and navigating the ATT&CK framework, then lean into it.

However, I am personally a big advocate of a slightly more abstract grouping of attacker profiles. Sandia National Labs has used this tool over time (see table II in this paper) to map out several adversary groupings and their relative motivations and capabilities. One thing that I love about it is the incorporation of elements like intensity and stealth preferences as well as the range of capabilities (kinetic, physical, technical). You can also adapt it for your own purposes and environment. For example, expanding on technical capabilities to include on-prem networks, cloud, or software-as-a-service (SaaS).

Structured Ideation

Once you’ve identified some adversaries, tactics, or motivations, I’d recommend pulling a diverse group of people together for structured ideation. Ideally, participants shouldn’t all come from the security team: Pull in developers, product managers, or data stewards. The group size and process intensity should be tailored according to the situation’s immediacy. As you go through structured ideation, keep in mind that it is sometimes advantageous to move faster and perhaps repeat the process multiple times; learning and adaption speed is a key success metric for defenders as much as it is for the adversary.

Think of this step as brainstorming though your frame for ideation is set up in a very particular way.

  1. Describe the position. Set the stage for each participant by describing the position you’d like them to embody and think through. For example, you’d like them to think about an adversary targeting us to disrupt system operations and instigate downtime that impacts end users or our ability to deliver mission capability.
  2. Go through the attack process for ideas. Go through several stages of the attack process to gather ideas from the group. For example, if you know a breach started through stolen credentials that were accidentally checked into a git repository, cycling through the following sorts of questions can help:
    • Where else might these credentials have gone or be used for?
    • Would this team or similar users be doing something similar in other systems?
    • Given the initial compromise, what would the adversary want to do next at different points in time: immediately, within a week, within a month, etc.?

This process can be very effective if you split into small breakout groups and divide your time into ideation and group presentations. Cycling through each of the question areas with ideation and presentation loops can also give each small team a chance to regroup and expand their ideas. It may also be useful to hold off on presentations until you reach the end of the question cycles to avoid creating a groupthink bias amongst your breakout teams.

Tying It Together

You’re now ready to pull the results of this ideation process, whether it’s done at a larger scale or a smaller one into security operations and incident management processes. You can take the ideas and turn them into threat hunt tasks, SIEM queries, or firewall rules that will help guide the search.

Even if security teams don’t have all the visibility they need, they can still see and explore their environment by looking through the adversary lens. This process of hunting and ideation can help identify blind spots that compliance frameworks cannot. Ultimately, thinking like an adversary helps ensure that security teams respond as effectively as they can to a breach.

click here to join the conversation on LinkedIn

Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cyber Attack Cybersecurity Cybersecurity channel featured framework SaaS
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined

June 26, 2025

Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System

June 26, 2025

The AI Economy: Oracle More Valuable than Disney + Uber + Goldman Sachs Combined!!!

June 26, 2025

Agentic AI in Government: Salesforce Achieves FedRAMP High for Agentforce and More

June 25, 2025
Add A Comment

Comments are closed.

Recent Posts
  • The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined
  • Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System
  • The AI Economy: Oracle More Valuable than Disney + Uber + Goldman Sachs Combined!!!
  • Agentic AI in Government: Salesforce Achieves FedRAMP High for Agentforce and More
  • Snowflake Ventures Invests in Diskover to Tackle Unstructured Data at Scale

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.