Military Veterans as Information Security Professionals March 12-13, 2015 Mr. Sale Lilly Operation PAVE Paving Access For Veterans Employment
Overview Operation PAVE Introduction, Fayetteville Partners Growth of Cyber Attacks Predictable Military Veterans As Part Of The Solution Barriers Conclusion
Cybersecurity Woes Why is 2015 So Much Worse Than 1985? Collaboration Not Compartmentalization Point of Access: Hardware Not Software Cold War Drove Espionage, Not Commerce = Poorly Suited To Handle Intrusions in The Present Images Descending: Steve Jobs and Steve Wozniak, Apple Lisa, Migs and St. Basils in Moscow
Personnel As Part of The Solution Why are Vets Culturally a Better Fit For Cybersecurity Roles? Threat Constructionists By Training Information Is Already Compartmentalized Human Intelligence Assets Critical = Culturally Suited To Handle Intrusions in The Future Images: Force Protection Conditions, Cover Sheets for Classified Information, KGB Spies Robert Hanssen/Aldrich Ames
Example: Initial Clue Of SpearPhising In Text, APT We’ll tomorrow review the SharePoint training Subject + Time + Verb + Object Time + Subject + Verb + Object 我们 明天 复习 连点培训
Example: Viruses and W32.Stuxnet Target Acquisition Criteria Collateral Damage Considerations Real Time ‘Battle Damage Assessment’ INFECT BENIGN UNKNOWN DESIGN
Military Employment Barriers Why are Vets Not Filling Key Roles? Geography & Location Age (No Portfolio, Not Enough Mischief) Knowledge = Braking Effect On Veteran Impact in InfoSec Industry
Conclusion Where can you find the range of skill sets that include: – Cryptographers/Linguists – Social Network Analysts – Risk Vulnerability Assessment – Human Terrain Analysts In any sizable number?