First Principle Approach
He devised a RINSE Attack Life Cycle approach to bridge communications & understanding between business & technical collaborators. RINSE model explains the conditions for any successful attacks & prescribes repeatable defensive tactics to disrupt attacks based on first principles.
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F522cee69-7068-498b-9792-eef4249b1467%2FhandBulb.png?table=block&id=57c15481-cd42-4146-ab06-f5e49d66d3c3&cache=v2)
Explain Visually
Jym was an Executive Producer of a Work-Plan Seminar video segment during his National Service (Singapore's conscription) specialising in Contingency Planning, it helped him honed his media communications skills. He recently produced a short explainer video (embedded below) for a corporate visit.
FreeEDR is his latest creation, translating publicly funded research works to a Minimal Viable Product that helps Small-Medium Enterprise improve Cyber-Security posture.
![Video preview](https://i.ytimg.com/vi/znZ5cKfNHSc/hqdefault.jpg)
Notes
Notes
Why Free
Cyber Security in 7 weeks
Risk Management
Mental Models for Cyber Defense - Part 1 of 3 - Attack Surface Management is a PRIORITY
- RINSE & Repeat!
- Code Execution Model
![Why Attack Surface Management matters most?](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F932cdefc-c0f7-43a9-a5c8-bd1fccb8c8a6%2Fp0tjghm6lz0z.jpg?table=block&id=8cdcb27f-92a6-44b5-80cf-858640dbaea1&cache=v2)
Why Attack Surface Management matters most?
Windows Events - Part 1 of 3 - Process Auditing
Windows Events - Part 2 of 3 - Sysmon
![Windows Events - Part 3 - Disrupt Code Execution with ETW](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fcb710c42-6f27-4631-8b77-9f91da2a8b9e%2FSOIN0621254_1560x880_desktop.jpg?table=block&id=933ad6d7-2d55-482d-aa33-e67504da8343&cache=v2)
Windows Events - Part 3 - Disrupt Code Execution with ETW
![Mental Models Explained](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fb1c968f0-1d14-467e-9e38-9bf43cfacc92%2Fwisdom.jpg?table=block&id=b1fcc6a3-63c2-44b7-bc07-437028c4505b&cache=v2)
Mental Models Explained
![AutoTTP](https://www.notion.so/image/https%3A%2F%2Fgithub.com%2Fjymcheong%2FAutoTTP%2Fblob%2Fmaster%2Fscreenshots%2Fttp.png%3Fraw%3Dtrue?table=block&id=48ce9fde-775d-4f14-b12d-4ce9bbc8d7be&cache=v2)
AutoTTP
Notion Relational Tags
Scaling Limitations of Real-Time Databases
Flsun QQ Notes
![Attack Detection vs Disruption](https://www.notion.so/image/https%3A%2F%2Fprod-files-secure.s3.us-west-2.amazonaws.com%2F20090e4f-677b-41f9-8a68-f5933ade3641%2F417d0940-7246-4343-8fcc-4950c890e066%2Flamson1.jpg.png?table=block&id=31577086-e791-410f-94e3-caecab903f9b&cache=v2)
Attack Detection vs Disruption
Tags