Mr. Sale T. Lilly IV, "Military Veterans as Information Security Professionals" , Cybersecurity Technical Training Panel

Download Report

Transcript Mr. Sale T. Lilly IV, "Military Veterans as Information Security Professionals" , Cybersecurity Technical Training Panel

Military Veterans as Information
Security Professionals
March 12-13, 2015
Mr. Sale Lilly
Operation PAVE
Paving Access For Veterans Employment
Overview
•
•
•
•
•
Operation PAVE Introduction, Fayetteville Partners
Growth of Cyber Attacks Predictable
Military Veterans As Part Of The Solution
Barriers
Conclusion
Cybersecurity Woes
Why is 2015 So Much Worse Than 1985?
 Collaboration Not Compartmentalization
 Point of Access: Hardware Not Software
 Cold War Drove Espionage, Not Commerce
=
Poorly Suited To Handle Intrusions in The Present
Images Descending: Steve Jobs and Steve Wozniak, Apple Lisa, Migs and St. Basils in Moscow
Personnel As Part of The Solution
Why are Vets Culturally a Better Fit For
Cybersecurity Roles?
 Threat Constructionists By Training
 Information Is Already Compartmentalized
 Human Intelligence Assets Critical
=
Culturally Suited To Handle Intrusions in The Future
Images: Force Protection Conditions, Cover Sheets for Classified Information, KGB Spies Robert Hanssen/Aldrich Ames
Example: Initial Clue Of
SpearPhising In Email Text, APT1 2013
We’ll tomorrow review the SharePoint training
Subject + Time
Time
+ Subject
我们
明天
+ Verb
+ Verb
复习
+ Object
+ Object
连点培训
Example: Viruses and W32.Stuxnet
Target Acquisition Criteria
Collateral Damage Considerations
Real Time ‘Battle Damage Assessment’
BENIGN
UNKNOWN
BENIGN
INFECT
DESIGN
Military Employment Barriers
Why are Vets Not Filling Key Roles?
 Geography & Location
 Age (No Portfolio, Not Enough Mischief)
 Knowledge
=
Braking Effect On Veteran Impact in InfoSec Industry
Conclusion
• Where can you find the range of skill sets that
include:
– Cryptographers/Linguists
– Social Network Analysts
– Risk Vulnerability Assessment
– Human Terrain Analysts
In any sizable number?