Mr. Sale T. Lilly IV, "Military Veterans as Information Security Professionals" , Cybersecurity Technical Training Panel
Download
Report
Transcript Mr. Sale T. Lilly IV, "Military Veterans as Information Security Professionals" , Cybersecurity Technical Training Panel
Military Veterans as Information
Security Professionals
March 12-13, 2015
Mr. Sale Lilly
Operation PAVE
Paving Access For Veterans Employment
Overview
•
•
•
•
•
Operation PAVE Introduction, Fayetteville Partners
Growth of Cyber Attacks Predictable
Military Veterans As Part Of The Solution
Barriers
Conclusion
Cybersecurity Woes
Why is 2015 So Much Worse Than 1985?
Collaboration Not Compartmentalization
Point of Access: Hardware Not Software
Cold War Drove Espionage, Not Commerce
=
Poorly Suited To Handle Intrusions in The Present
Images Descending: Steve Jobs and Steve Wozniak, Apple Lisa, Migs and St. Basils in Moscow
Personnel As Part of The Solution
Why are Vets Culturally a Better Fit For
Cybersecurity Roles?
Threat Constructionists By Training
Information Is Already Compartmentalized
Human Intelligence Assets Critical
=
Culturally Suited To Handle Intrusions in The Future
Images: Force Protection Conditions, Cover Sheets for Classified Information, KGB Spies Robert Hanssen/Aldrich Ames
Example: Initial Clue Of
SpearPhising In Email Text, APT1 2013
We’ll tomorrow review the SharePoint training
Subject + Time
Time
+ Subject
我们
明天
+ Verb
+ Verb
复习
+ Object
+ Object
连点培训
Example: Viruses and W32.Stuxnet
Target Acquisition Criteria
Collateral Damage Considerations
Real Time ‘Battle Damage Assessment’
BENIGN
UNKNOWN
BENIGN
INFECT
DESIGN
Military Employment Barriers
Why are Vets Not Filling Key Roles?
Geography & Location
Age (No Portfolio, Not Enough Mischief)
Knowledge
=
Braking Effect On Veteran Impact in InfoSec Industry
Conclusion
• Where can you find the range of skill sets that
include:
– Cryptographers/Linguists
– Social Network Analysts
– Risk Vulnerability Assessment
– Human Terrain Analysts
In any sizable number?