Skip to main content
Cookies Policy
Detailed information on the use of cookies on this website is provided in our Privacy Policy. By closing this message and proceeding, you consent to our use of cookies in accordance with our Cookies Policy.

We have implemented new login procedure. Learn More

  • icon-facebook
  • icon-linkedin
  • icon-twitter

The Changing Nature og Cyber Warfare

Cyber Warfare: From Conventional through the Grey Zone to Hybrid Warfare. Countering the emerging threat though Threat Informed Resilience

Event Start: Wed 29 Nov 12:00 PM
Event Finish: Wed 29 Nov 01:30 PM


Registration End Date: Tue 28 Nov 10:32 AM

This presentation aims to explore the emergence of cyber warfare to its current prevalence, taking into account well known state based grey zone activity such as espionage, through to the deployment of destructive cyber warfare capabilities such as wiper malware.<br> <br>Glenn will commence by providing an overview of cyber warfare, articulating the strategic fit in current definitions. This overview will define the largely agreed definitions and scope of conventional warfare, grey zone warfare and hybrid warfare. To fully articulate the scope, we will discuss the major activities that may be engaged within these definitions, such as conventional kinetic strikes, mis/disinformation, political and economic coercion, propaganda, and espionage through to deployment of destructive cyber weapons.<br> <br>Glenn will also describe the relative advantages of cyber warfare to the attacker, from the difficulty of attribution, geographic advantages; as well as other less considered benefits like cost and return on investment.<br> <br>We will then explore anecdotal case studies highlighting the integration of cyber warfare into hybrid operations, including the use of cyber tools for intelligence gathering, deception, and coordination of kinetic attacks. Glenn will illustrate known examples of hybrid warfare, starting with NotPetya in 2017, through to the current impact of wiper malware like HermeticWiper in 2022. The discussion will examine examples of hybrid warfare activity: including network intrusions, denial-of-service attacks, and data manipulation.<br> <br>This analysis will be based upon both Open-Source Intelligence and data from FortiGuard Labs telemetry – which clearly depicts the global emergence and variance of cyber warfare elements such as wiper malware.<br> <br>It is certain that most nations are already experiencing Grey Zone activity. Adversaries are exploiting the ambiguity of cyber operations, hiding within the blurred lines between state-sponsored and criminal activities.<br> <br>Grey zone activities are critical in the execution of hybrid warfare elements, as the enable the adversary to perform deep reconnaissance and intelligence gathering. The adversary will understand system architectures, structures, processes, and people within their target organisation. This gives the adversary intelligence on the attack surface and defence systems they must defeat. This activity within the grey zone also facilitates proactive prepositioning – enabling access for subsequent activity.<br> <br>Finally, the presentation will investigate the boundary and linkages between offensive activities in the perspective of a strategic, offensive cyber operation. This presentation will use the Kill Chain and MITRE ATT&amp;CK frameworks to model a hybrid warfare operation, isolate the key defensive points, propose defensive strategies, and explain the critical importance of proactive resilience.<br><br>* If you are experiencing trouble when registering please email Lauren Hall at<br><br> 


Professional Development

Contact Details

event sponsors

  • Fortinet

Share this event:





Glenn Maiden

Glenn Maiden

Glenn has more than25 years’ experience in different roles across the technology sector with a solid background in Defence, intelligence, national security, and government affairs.

Glenn forged his cyber career in the Australian Defence Security Community. This included intelligence collection, analysis and reporting, and importantly, supporting priority Defence operations.

Key achievements:

•Established the project team that developed the World Economic Forum Centre for Cybersecurity's ground-breaking CyberCrime Atlas.
•Co-founded the $140M Australian Cybersecurity Cooperative Research Centre.
•Established the 24x7 Security Operations Centre for the $1B Lockheed Martin / Defence Centralised Processing project.
•As the IT Security Advisor to the Australian Tax Office; rewrote the enterprise cybersecurity policy, co-designed the enterprise cyber risk management framework and built Australia's largest IRAP cyber compliance team.
•As Director Geospatial Exploitation at the Australian Geospatial Intelligence Organisation, led Australia's first human terrain intelligence collection and analysis in Afghanistan.
•Worked and learned alongside the best in the world at the Australian Signals Directorate. 

Show More
48-50 Smith Street,Darwin,NT,Australia

  • where

  • Darwin Innovation HUB
    48-50 Smith Street
    Darwin NT 0800
  • when

  • Event Start: Wed 29 Nov 12:00 PM
    Event Finish: Wed 29 Nov 01:30 PM
  • event price

  • -

Recommended Events

Event Terms and Conditions


  • ACS reserves the right to change the program at any time. Every effort will be made to ensure a program of equivalent standard and members are updated with changes.
  • All dietary requirements are considered, however we cannot guarantee a 100% allergen free environment.
  • ACS reserves the right to prohibit entry or eject any person from an ACS event based on behaviour deemed inappropriate by ACS staff, its agents and/or others working under its authority.
  • Filming or streaming by attendees is not permitted. If an attendee is found to be doing so they will be asked to leave the event immediately and further action may be taken.
  • Photography and/or filming may take place during this event, by accepting these terms you consent to this. Please let a member of ACS know if you do not want your picture taken.

COVID-19 Event Attendance Compliance

By registering to attend an ACS in person event you are agreeing to the below terms and conditions

  • If an attendee is displaying flu or cold like symptoms in the days leading up to the event and therefore is not able to attend, ACS will refund the registration fee.
  • If an attendee comes to an event and is displaying flu or cold like symptoms they will be asked to leave
  • We ask all ACS members to respect the social distancing guidelines, if an attendee repeatedly disregards these guidelines, they may be asked to leave
  • ACS reserves the right to cancel the event within 24 hours' notice if either the speaker or the event host has advised us that they are exhibiting flu or cold like symptoms
  • All attendees must provide a valid phone number and email address to be contacted on if there is reason to notify about a possible COVID-19 exposure

Personal information collection notice

By registering for this event, you are providing personal information to the Australian Computer Society. In accordance with the ACS Privacy Policy, ACS collects personal information through registrations and attendances at its events for the purposes of:

  • organising and providing the various professional development events held by the ACS (including for example, courses, conferences, seminars, workshops, launches);
  • processing and managing event registrations (including catering for dietary requirements);
  • maintaining event attendance records;
  • contacting registered event guests with information in regard to the event and seeking post-event feedback;
  • communicating with you to in relation to future events or ACS products, courses, services, promotions or other products or services that ACS reasonably thinks may be of interest to attendees;
  • processing and responding to attendee inquiries; and
  • conducting research to improve its events and better understanding needs. 

If the required information is not provided, we or any involved third parties, may not be able to respond to you, update you, or provide appropriate services or events to you.

We may obtain personal information directly from you or from someone who registers for the event on your behalf. If you provide us with personal information about another person, you must do so only with their consent and agree to make them aware of this privacy notice.

ACS may share your personal information with third parties for the collection purposes noted above or as set out in our Privacy Policy, where it is reasonably necessary for, or directly related to, one or more of our activities, or required by law.

When you register to participate in an overseas event, we may send personal information we collect overseas.

See our Privacy Policy at for more information about our privacy practices.