Military Veterans as Information Security Professionals March 12-13, 2015 Mr. Sale Lilly Operation PAVE Paving Access For Veterans Employment.

Slides:



Advertisements
Similar presentations
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Advertisements

Personalisation Implications for the workforce. On the internal workforce –What does the new agenda mean for social care staff? –What changes will we.
Career Planning and Development. 9-1 Career Opportunities  Goals  Describe the steps in the career planning process  Identify the main sources of career.
© 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Public Building Trustworthy Systems Overview and Strategy 2013 RSA Conference January.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands.
Overview and Introduction
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
March 3, ORGANIZING TO MAKE A PROFIT OBJECTIVES By the end of the session, participants should be able to: Appreciate the need for planning before.
Introduction to Network Defense
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
SEC835 Database and Web application security Information Security Architecture.
Cyber vs Legislation and Ethics Colonel John Doody Panel Chair.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
Study Results Advanced Persistent Threat Awareness.
Welcome Abacoa Property Owner’s Assembly Welcome Abacoa Property Owner’s Assembly Robert Burns Senior Vice President Robert Burns Senior Vice President.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Cutting to the Core: Curriculum Strategies to Address Outsourcing Dr. Brenda McAleer and Dr. Joseph Szakas The University of Maine at Augusta.
C11- Managing Knowledge.
Communications-Electronics Security Group. Excellence in Infosec.
Exporting Your Product or Service Growing your business by selling to buyers in international markets.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Cyber Terrorism Shawn Carpenter Computer Security Analyst
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
IT Acquisitions from the Risk Manager’s Perspective Jeffrey Posluns, CRMP,CGEIT, CISM, CISSP-ISSMP Chairman Governance Risk Compliance Security International.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Of XX Cybersecurity in Government Contracting, Acquisition and Procurement Nicholas R. Schacht ©2015 PubKLearning. All rights reserved.1 KnowCyber improves.
SecSDLC Chapter 2.
11 th Grade Graduation Project.  Military  The nature of work depends on type of job you are doing in the military.  Must be both physically, educationally,
FFIEC Cyber Security Assessment Tool
Websense SLP (Software Licensing Program) Sherri Conover Websense Business Unit Manager March 17, 2010.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Risk Identification and Risk Assessment
As a leader in the pharmaceutical industry, Eli Lilly employs more than 41,000 people worldwide and markets its medicines in 143 countries. This global,
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
MIS323 – Business Telecommunications Chapter 10 Security.
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Information Management System Ali Saeed Khan 29 th April, 2016.
Enterprise Security Management Franklin Tinsley COSC 481.
Real Life Scenario An employee in the Finance and Business Operations receives a targeted phishing . Follows instructions and infects his or.
Memory Protection through Dynamic Access Control Kun Zhang, Tao Zhang and Santosh Pande College of Computing Georgia Institute of Technology.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Society for Maintenance and Reliability Professionals (SMRP)
LIZ MOODY OPEN UNIVERSITY. LIZ MOODY OPEN UNIVERSITY.
Creating Skills-Based Job Postings: An Overview Guide
Team 1 – Incident Response
Associate Degree in Cyber security
CAPABILITY BRIEFING July 21, 2017 Joe Guirreri, PMP, ITIL Mobile: Office: Isaac Newton Square Suite.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
CYB 100 Become Exceptional/ newtonhelp.com. CYB 100 All Assignments For more course tutorials visit uophelp.com is now newtonhelp.com
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Cambridge National Certificate in Information Technologies
Cybersecurity ATD Scenario conclusion
Networking for Home and Small Businesses – Chapter 8
Cyber Risk & Cyber Security
Students The number in the lower left corner of each slide is the page number in the O’Brien textbook to which the material refers. The slides in this.
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Resulting in increased training revenue
Presentation transcript:

Military Veterans as Information Security Professionals March 12-13, 2015 Mr. Sale Lilly Operation PAVE Paving Access For Veterans Employment

Overview Operation PAVE Introduction, Fayetteville Partners Growth of Cyber Attacks Predictable Military Veterans As Part Of The Solution Barriers Conclusion

Cybersecurity Woes Why is 2015 So Much Worse Than 1985? Collaboration Not Compartmentalization Point of Access: Hardware Not Software Cold War Drove Espionage, Not Commerce = Poorly Suited To Handle Intrusions in The Present Images Descending: Steve Jobs and Steve Wozniak, Apple Lisa, Migs and St. Basils in Moscow

Personnel As Part of The Solution Why are Vets Culturally a Better Fit For Cybersecurity Roles? Threat Constructionists By Training Information Is Already Compartmentalized Human Intelligence Assets Critical = Culturally Suited To Handle Intrusions in The Future Images: Force Protection Conditions, Cover Sheets for Classified Information, KGB Spies Robert Hanssen/Aldrich Ames

Example: Initial Clue Of SpearPhising In Text, APT We’ll tomorrow review the SharePoint training Subject + Time + Verb + Object Time + Subject + Verb + Object 我们 明天 复习 连点培训

Example: Viruses and W32.Stuxnet Target Acquisition Criteria Collateral Damage Considerations Real Time ‘Battle Damage Assessment’ INFECT BENIGN UNKNOWN DESIGN

Military Employment Barriers Why are Vets Not Filling Key Roles? Geography & Location Age (No Portfolio, Not Enough Mischief) Knowledge = Braking Effect On Veteran Impact in InfoSec Industry

Conclusion Where can you find the range of skill sets that include: – Cryptographers/Linguists – Social Network Analysts – Risk Vulnerability Assessment – Human Terrain Analysts In any sizable number?