Mr. Sale T. Lilly IV, "Military Veterans as Information Security Professionals" , Cybersecurity Technical Training Panel
Download ReportTranscript Mr. Sale T. Lilly IV, "Military Veterans as Information Security Professionals" , Cybersecurity Technical Training Panel
Military Veterans as Information Security Professionals March 12-13, 2015 Mr. Sale Lilly Operation PAVE Paving Access For Veterans Employment Overview • • • • • Operation PAVE Introduction, Fayetteville Partners Growth of Cyber Attacks Predictable Military Veterans As Part Of The Solution Barriers Conclusion Cybersecurity Woes Why is 2015 So Much Worse Than 1985? Collaboration Not Compartmentalization Point of Access: Hardware Not Software Cold War Drove Espionage, Not Commerce = Poorly Suited To Handle Intrusions in The Present Images Descending: Steve Jobs and Steve Wozniak, Apple Lisa, Migs and St. Basils in Moscow Personnel As Part of The Solution Why are Vets Culturally a Better Fit For Cybersecurity Roles? Threat Constructionists By Training Information Is Already Compartmentalized Human Intelligence Assets Critical = Culturally Suited To Handle Intrusions in The Future Images: Force Protection Conditions, Cover Sheets for Classified Information, KGB Spies Robert Hanssen/Aldrich Ames Example: Initial Clue Of SpearPhising In Email Text, APT1 2013 We’ll tomorrow review the SharePoint training Subject + Time Time + Subject 我们 明天 + Verb + Verb 复习 + Object + Object 连点培训 Example: Viruses and W32.Stuxnet Target Acquisition Criteria Collateral Damage Considerations Real Time ‘Battle Damage Assessment’ BENIGN UNKNOWN BENIGN INFECT DESIGN Military Employment Barriers Why are Vets Not Filling Key Roles? Geography & Location Age (No Portfolio, Not Enough Mischief) Knowledge = Braking Effect On Veteran Impact in InfoSec Industry Conclusion • Where can you find the range of skill sets that include: – Cryptographers/Linguists – Social Network Analysts – Risk Vulnerability Assessment – Human Terrain Analysts In any sizable number?