Kuboid
Open Luck·Kuboid.in
Security BSides2025
Open in YouTube ↗

Slaying Dragons Together: Multidisciplinary Team Approaches to Conquering Common Security Challenges

Security BSides San Francisco104 views44:5210 months ago

This talk discusses the importance of building multidisciplinary teams to address complex security challenges by integrating technical, strategic, business, and communication expertise. It highlights the development of collaborative frameworks like MITRE ATT&CK and MITRE Engage to standardize threat intelligence and improve defensive posture. The speakers emphasize the necessity of aligning security goals with business objectives and fostering trusted relationships across different organizational roles. The presentation serves as a strategic guide for security leaders to improve organizational resilience through cross-functional collaboration.

Beyond the Silo: How Multidisciplinary Teams Actually Break Security Deadlocks

TLDR: Security research often fails to move the needle because it lacks context from business and strategy stakeholders. By integrating technical, strategic, and business perspectives, teams can build more effective defensive frameworks like MITRE ATT&CK and MITRE Engage. This approach moves security from a technical checkbox to a risk-based strategy that actually protects organizational assets.

Technical researchers and penetration testers often operate in a vacuum. You find a critical vulnerability, write a proof-of-concept, and submit a report. Then, you wait. Sometimes the fix is deployed, but often the report sits in a queue, ignored because it doesn't align with the current business priorities or the organization's risk appetite. This disconnect is the primary reason why security programs fail to mature. The real-world risk is not just the vulnerability itself, but the inability to communicate its impact in a language that stakeholders understand.

The Mechanics of Collaborative Frameworks

The most successful security frameworks, such as MITRE ATT&CK, did not emerge from a single researcher’s desk. They were born from the necessity to categorize adversary behavior in a way that both technical teams and executive leadership could digest. When you look at a technique like T1595 Active Scanning, you aren't just looking at a network event. You are looking at a business risk that requires a specific defensive response.

The power of these frameworks lies in their ability to standardize the conversation. When a red team uses Caldera to automate adversary emulation, they aren't just running scripts. They are testing the organization's ability to detect and respond to specific behaviors that have been mapped to real-world threats. This is the bridge between offensive research and defensive operations. Without this bridge, your findings are just noise.

Bridging the Gap Between Tech and Strategy

Technical experts often struggle to speak "executive." You might see a clear path to exploitation, but if you cannot explain why that path matters to the bottom line, your work will not get the resources it needs. This is where the multidisciplinary approach becomes critical. You need a team that includes:

  • Technical Experts: Those who understand the bits, bytes, and protocols.
  • Strategists: Those who understand the long-term roadmap and market trends.
  • Business Leaders: Those who own the risk and the budget.
  • Marketing and Communications: Those who can articulate the security narrative.

When these groups work together, they can identify common ground. For example, instead of just reporting a vulnerability, a multidisciplinary team can frame it as a threat to a specific business objective. This changes the conversation from "we need to patch this" to "we need to mitigate this risk to protect our revenue stream."

Practical Application for Pentesters

On your next engagement, try to look beyond the technical exploit. When you find a way to perform T1592 Gather Victim Host Information, ask yourself: what business process does this host support? What is the impact if this host is compromised? If you can include this context in your report, you will find that your findings are taken much more seriously.

The goal is to move from being a "bug finder" to a "risk advisor." This doesn't mean you stop being technical. It means you use your technical skills to inform a broader strategy. If you are a bug bounty hunter, look at the OWASP Top 10 not just as a list of bugs, but as a list of business risks. When you submit a report, explain the business impact clearly. This is how you get your reports triaged faster and paid higher bounties.

The Defensive Reality

Defenders are overwhelmed. They are dealing with thousands of alerts every day. If you want your research to be useful, you have to help them prioritize. Frameworks like MITRE Engage help defenders understand not just how to detect an attack, but how to actively engage with the adversary to gather intelligence. This is a shift from passive defense to active, intelligence-led security.

If you are working with a blue team, ask them what their biggest pain points are. Are they struggling with visibility? Are they missing certain types of alerts? Use your offensive knowledge to help them fill those gaps. This is the essence of "slaying dragons together." It is not about one person having all the answers; it is about building a team that can ask the right questions.

Stop working in isolation. The next time you find a bug, take a step back and consider the broader context. Who cares about this bug? Why do they care? How can you help them care more? The most effective security researchers are those who can translate technical complexity into business value. Start building your own collaborative ecosystem today, whether that means engaging with your internal security team or participating in public research communities. Your work will be more impactful, and you will be more effective at your job.

Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in