

Trey Bilbrey
Head of SCYTHE Labs,
Tampa, Florida, United States
Actions
Trey Bilbrey is the Lead of SCYTHE Labs, specializing in Purple Team Exercises, Threat Emulation, Critical Infrastructure, and holistic cyber operations. Trey's 15+ years of industry experience has allowed him to become an excellent educator, defender of networks, and a cultivator of cybersecurity professionals. Prior to joining SCYTHE, Trey held positions at notable organizations such as Hack The Box (HTB Academy content Developer), The Army Corps of Engineers (ICS/SCADA Penetration Testing), and a veteran of the United States Marine Corps (Defensive and Offensive Cyber Operations). Current certifications include the CISSP, GICSP, GCIP, and K>FiveFour RTAC.
Area of Expertise
Topics
Threat Emulation 101
In the realm of cybersecurity, Threat Emulation is akin to a skilled wizard mastering the arcane arts of replicating real-world threats and their myriad behaviors to scrutinize the defenses of an organization. This mystical practice involves crafting Intelligence-driven scenarios, woven with the threads of reality, to mimic the nefarious maneuvers of creatures that lurk in the shadows. By summoning these simulated events, organizations can fortify their defenses, sharpening their blades against the invisible foes that threaten their digital realms.
Embark on a quest with Trey, the seasoned Threat Emulator, as he unveils the secrets of this mystical art.
Power To The Purple
Title: Power To The Purple
Abstract:
The modern cybersecurity realm is no longer one where defenders can work in a vacuum and be successful. Conversely, many people are starting to lose faith in the value of penetration testing as a mechanism to measure their organizational security posture. A collaborative milestone driven approach where Red and Blue teams operate in tandem, is necessary to ensure a proactive approach to enhancing the security of our organizations. This is where Purple Teaming comes into play. In this 2-hour hands-on workshop you will be introduced to Purple Team Exercises and play the role of a Cyber Threat Intelligence analyst, Red Team operator, and Blue Team security analyst.
We have set up an isolated environment for each attendee to go through a Purple Team Exercise following the Purple Team Exercise Framework (PTEF). This event will give participants a chance to test out new tools, techniques, and procedures learned during the workshop.
- Key Take Aways:
- Learn the basics of Purple Teaming through the study of the PTEF.
- Setup and utilize Command and Control (C2) frameworks.
- Consume Cyber Threat Intelligence from a known adversary.
- Extract adversary behaviors/TTPs and map them to the MITRE ATT&CK framework.
- Play the Red Team by creating and executing adversary emulation plans.
- Emulate the adversary behaviors in a simulated organization to determine how it would stand up to the adversary.
- Play the role of the Blue Team to hunt for malicious behavior and Indicators of Compromise.
- Deploy and utilize popular defensive tooling such as Sysmon, log ingestors, and SIEMS to aide in threat hunting.
Red Team Village at DEFCON 32 Sessionize Event
Adversary Village at DEF CON 32 Sessionize Event
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top