UNCLASSIFIED // WEBINAR RECORDING // NOW AVAILABLE
Watch The Recording
COUNTER-INTELLIGENCE
FOR CONTRACTORS
A former CIA Officer's Briefing on Q3 2025 DIB Threats and How to Defend Your Organization
+56%
Ransomware Surge (Q3)
74%
Attacks via Phishing
10+
Active Ransomware Variants
4
APT Groups Covered
Watch the Full Webinar
Duration: ~45 minutes | Recorded February 4, 2025
What's Covered
1
Q3 2025 Threat Landscape
Direct from DC3 DCISE: ransomware trends, initial access vectors, and emerging phishing tactics targeting the DIB
2
Why China Targets YOUR Organization
Intelligence perspective on nation-state motivations, collection requirements, and why SMBs are prime targets
3
The Typhoons: Silk, Salt & Friends
Deep dive on active Chinese APTs — their tradecraft, targets, and how they operate
4
CMMC as Counter-Intelligence
Reframe compliance as defense against nation-state collection — not just a checkbox exercise
5
Actionable Takeaways
What to do Monday morning to harden your organization against the threats discussed
Your Speakers
Ross Young
Former CIA Officer | Ex-CISO
10+ years CIA • CISO at TEAM8, Capital One • Co-host, CISO Tradecraft • OWASP TaSM Creator
Franco Velasquez
Founder, HostBreach Cyber Solutions
OSINT-powered threat intelligence and CMMC readiness for DIB contractors
✓ Data sourced from DC3 DCISE Q3 2025 Report (Published Dec 17, 2025)
Threats Covered in This Briefing
SILK TYPHOON
CHINASupply chain specialists exploiting trusted relationships and cloud environments. If you're in a prime's supply chain, you're a target.
SALT TYPHOON
CHINAInfrastructure specialists who compromised major U.S. telecom providers. Building persistent access for long-term intelligence collection.
RANSOMWARE SURGE
+56% Q3Akira, BlackCat, Lynx, Play and more actively targeting DIB. 74% of initial access through phishing campaigns.
ZERO-DAY EXPLOITS
ACTIVESharePoint "ToolShell" campaign hit 54+ orgs. VMware privilege escalation in the wild. Your perimeter is under attack.
Want to Know What Adversaries See About Your Organization?
Our Executive Cyber Exposure Intel Briefing shows you exactly what's visible from the outside — the same signals threat actors use during target selection.
Request Your Briefing →