John Daniele

John Daniele is a cybersecurity professional with over 20 years of consulting experience. John has supported clients in both the private and public sector including banking, resources, law-enforcement and defense organizations. His areas of expertise include: Digital Forensics & Incident Response, Threat Hunting and Threat Intelligence. John is an alumnus of KPMG and EY where he served as National Practice Leader for Cyberforensics. He also previously served as a vulnerability researcher and analyst at the Communications Security Establishment (CSE), a civilian forensics analyst at Ontario Provincial Police (OPP) and investigator with the Correctional Investigation and Security Unit (CISU) of Ontario.

Malign Influence Kill Chain

The Malign Influence Playbook Whether threat actors or influence operators are organizing a targeted or broadscale malign influence activity, both follow a similar operational workflow or “kill chain,” as described below: The malign influence or disinformation kill chain was devised by the MITRE Corporation in support of efforts by the US Office of the Director …

Malign Influence Kill Chain Read More »

Countering Disinformation Campaigns

Investigating, analyzing and countering malign influence operations Disinformation or malign influence campaigns are increasingly being used by a range of domestic political and criminal threat actors to exert coercive or covert control over a targeted audience. Given their highly targeted and dynamic nature, there is no systematic or codified way to stop malign influence campaigns. …

Countering Disinformation Campaigns Read More »

Cyber Threat Intelligence

What we aim to achieve with this article, is to share specific ways that cyber intelligence analytical techniques and collection methods can be integrated into broader intelligence processes. We therefore present a more structured approach to cyber intelligence collection, processing, analysis and dissemination. The cyber intelligence dimension to each phase of the intelligence lifecycle is discussed and potential benefits explored.

International Cyber Norms

DNC Cybersecurity has been deeply involved in advocacy work concerning the development of international cyber norms. In an increasingly interconnected world, the need to distinguish between the actions and behaviours of nation states that are lawful and appropriate and those that are illegitimate is essential for the prevention of global cyberwar.

Cyber Threat Hunting

Cyber threat hunting is a proactive strategy to detect threats that evade traditional approaches to security operations. Threat hunting involves the systematic and continuous searching of networks and endpoints, for anomalies and outliers that indicate threat activity. Instead of relying solely upon automated detection mechanisms, which rely upon more passive means of identifying threats, threat hunting applies a more agile strategy to root out cyber adversaries that are hidden within your business environment.