Unified combatant command of the United States Armed Forces responsible for cyber operations
POPULARITY
Richard Jackson, Oklahoma deputy attorney general for cybersecurity technology and digital assets, joins James Poulos to discuss what the government can do at the state level to protect the digital rights of Americans. As the United States struggles to compete technologically with China, the U.S. government is even farther behind protecting the digital infrastructure we have. For years the U.S. has prioritized ground military combat and did not innovate or advance tech as China has. Jackson argues that our current blind reliance on technology has left a lot of weak points that make us susceptible to attacks. His work emphasizes cybersecurity and digital information defense to protect against digital attacks at the state level. They also discuss how the United States Cyber Command and Space Command are great predictors of how the World War III will go. With U.S. satellites and Elon Musk's Starlink, Jackson has hope that the U.S. government is cooperating with industry to narrow the gap between us and China. Sponsors: RidgeRunner is ready to help you find the ideal property! Visit ridgerunnerusa.com today for more information. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Moments in Leadership, retired U.S. Marine Corps Master Gunnery Sergeant Scott Stalker discusses the lessons learned over his career, including his time in the Defense Intelligence Agency, United States Cyber Command, the National Security Agency, and in his final assignment with United States Space Command. Hear the story of how a MGySgt became a CSEL, a billet normally filled by a SgtMaj and his philosophy on “Best Player”. Additionally, we chat about his time in the Joint POW/MIA Accounting Command and Marine Corps Forces Special Operations Command (MARSOC).Support this project on Supercast: Moments In Leadership SupercastVisit the Moments in Leadership website: Follow on Instagram: Email: themiloffice@gmail.com
On this episode we are joined by the amazing Maureen "Marty" Fromuth. Marty currently serves in the Air Force Reserves as the Chief of Staff for Legislative Affairs at United States Cyber Command. Her career spans nearly 17 years in and out of government and the tech industry. Tune in to hear Marty dive into topics like Housewives, the importance of vulnerability and learning from failure. Hosted on Acast. See acast.com/privacy for more information.
In this episode of 12 Geniuses, Scott Stalker joins the show to talk about his career transition, the future of space exploration, and the signals the wars in Ukraine and Middle East are sending us about the future. Scott has been a guest of 12 Geniuses twice in the past while he was Command Senior Enlisted Leader of US Space Command in Colorado Springs, CO. After 31 years of dedicated service, Scott retired from the United States Marine Corps in August of 2023. In this discussion, he shares some of the important lessons he learned from his own career transition. He talks about being prepared for opportunities before they arrive, the importance of activating his personal network and having respected supporters ready to advocate for him, and why it is critical to know his value and worth. Scott believes anyone going through a career transition should understand what they love and enjoy. He said he took a test of his personal strengths to help determine that. He also shared his belief that transition is a journey and he is actively preparing for where that journey may take him years into the future. The second part of the conversation focuses on the potential of space - mining, tourism, and colonization. Scott talks about how investment in space will continue and grow significantly in the next decade. He cites regulation as one of the challenges to current expansion, however, he believes that - much like the International Space Station - there will be space hotels in the future where humans will be able to take vacations. Scott talks about the incredibly valuable resources - precious metals and water - in space available for mining that will keep the Earth economy going. He truly believes humans “will be a multi-planetary species.” He notes that the current advances in space are not led by governments as in the past. Instead, it is commercial investments like Space X that are leading the way. The conversation finishes with Scott's assessment of the wars in Ukraine and the Middle East. He talks about the signals they are sending about the future. Traditional assessment of an enemy involves thinking about the weather, the enemy, and the terrain. Scott says the war in Ukraine has demonstrated that another assessment variable needs to be added to this list - “the will” of the leader and the people. He believes other governments are watching the international support of Ukraine with caution. Scott Stalker served on active duty in the United States Marine Corps for 31 years, retiring in August 2023. While on active duty, Scott served as the Command Senior Enlisted Leader for the Defense Intelligence Agency, United States Cyber Command, National Security Agency, and in his final assignment with United States Space Command. He served in a multitude of locations during his distinguished military career to include combat operations in Somalia and Iraq and was assigned to Marine Corps Forces Special Operations Command from 2010 to 2014.Scott has a bachelor's degree in intelligence studies and a master's degree in cybersecurity, as well as an organizational leadership certificate from Harvard Kennedy School of Government. He completed studies at John Hopkins University School of Advanced International Studies, where he became a SECDEF Strategic Thinkers Program CAPSTONE graduate.Scott currently serves as a senior consultant and executive advisor for several different corporations. He is a keynote speaker for high-profile events within the federal government, intelligence community and national security sector and serves on the boards of several businesses and nonprofits. Additionally, Scott currently serves as a senior fellow for the National Defense University.Previous episodes with Scott Stalker:The Future of War with MGySgt Scott H. Stalker from November 10, 2020Leadership and Love with MGySgt Scott Stalker from November 9, 2022
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Brian Russell returns to the Cognitive Crucible to discuss his latest article: The Tie that Binds – Cyberspace as the Core of All Domain Maneuver Warfare. Research Question: Brian Russell asks the following: how to assess the effectiveness and risk of employing AI generated cyber weapons: AI on the AI so to speak. There are two resources: Phoenix Cast Cyber Fires Episode Dr. Christopher Whyte's piece in the latest Cyber Defense Review titled Beyond "Bigger, Faster, Better:" Assessing Thinking About Artificial Intelligence and Cyber Conflict. Resources: Cognitive Crucible Podcast Episodes Mentioned #13 Brian Russell on Behind Enemy Lines #132 Brian Russell on OIE Truths The Tie that Binds – Cyberspace as the Core of All Domain Maneuver Warfare by Brian Russell Joint Cyber Warfighting Architecture (JCWA) Expeditionary Cyberspace Operations, Paul Schuh, Cyber Defense Review Beyond “Bigger, Faster, Better:” Assessing Thinking About Artificial Intelligence and Cyber Conflict by Dr. Christopher Whyte Cyber Fires, Phoenix Cast PW Singer and Emerson T Brooking, Foreign Affairs) Gaza and the Future of Information Warfare Wiring the Winning Organization: Liberating Our Collective Greatness through Slowification, Simplification, and Amplification by Gene Kim and Steven J. Spear Planes, Trains, and Automobiles Link to full show notes and resources Guest Bio: Brian Russell is the founder of Information Advantage and a Key Terrain Cyber Senior Fellow. He is a retired Marine Corps artillery officer, with previous assignments as the commanding officer of II Marine Expeditionary Force Information Group (II MIG) and 1st ANGLICO. His combat deployments include serving as the Military Transition Team Leader in Habbaniyah, Iraq, the executive officer of Brigade Headquarters Group in Helmand Province, Afghanistan and Plans Director in Bagram, Afghanistan. Some of his notable staff assignments include: Operations Directorate at Marine Corps Special Operations Command, Operations Directorate at United States Cyber Command, and U.S. Plans Directorate at Marine Corps Forces Cyberspace Command. He recently joined Peraton as a Cyber and Information Warfare subject matter expert. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
In this episode of Raven Conversations, Maj. Gen. Charles Jeffries discusses his experiences in the National Guard and the United States Cyber Command. He also talks about how the National Guard provided him with valuable skillsets that bridged into his civilian career at Microsoft. Original music by Meta Essence
In this inspiring episode, we delve into the extraordinary life and career of Master Gunnery Sergeant (MGySgt) Scott H. Stalker, the Command Senior Enlisted Leader (CSEL) of United States Space Command. With roots in Lebanon, New Hampshire, MGySgt Stalker's journey began as a Marine in 1993, and since then, he has served in various critical roles, including the Defense Intelligence Agency, United States Cyber Command, and the National Security Agency. Join us as we explore MGySgt Stalker's diverse assignments and deployments, including combat tours and contingency operations. From his leadership roles within Marine Corps units to his contributions in intelligence and cyber domains, we uncover the depth of his experience and the significant impact he has made in the realm of national security. MGySgt Stalker's journey serves as a testament to resilience, dedication, and the pursuit of excellence in service to his country. Through his remarkable educational achievements, including degrees in Intelligence Studies and Cybersecurity, as well as executive education from prestigious institutions like Harvard Kennedy School of Government and Johns Hopkins University, we gain insights into MGySgt Stalker's commitment to continuous learning and leadership development. Furthermore, we explore the vital role of family as he and his wife nurture their three children, forming the core of "Team Stalker." This episode offers a compelling narrative of MGySgt Scott H. Stalker's journey, showcasing his unwavering dedication, sacrifices, and the inspiring leadership he embodies as a senior enlisted leader in the United States Space Command.
The Ukraine war took an unexpected turn — into Russia. The spectacular march on Moscow by Vladimir Putin's rebellious henchman exposed the strongman's surprising weakness. During these dramatic events, the Russian nuclear superpower teetered on the edge of chaos. And as America ramps up support for Ukraine, an unstable Russia is now an even bigger threat to the global democratic order.Fernando is joined by Admiral Mike Rogers who unravels the web of Ukraine war politics, shedding light on the almost Russian coup. Drawing upon his extensive experience as the former director of the National Security Agency (NSA), commander of the United States Cyber Command, and chief of the Central Security Service, Admiral Rogers shares unique, fresh insights into what's really happening in a Russia destabilized by Putin's war. Rogers is a member of Issue One's National Council on Election Integrity and Council for Responsible Social Media.
Col. Candice Frost, JIOC Commander at United States Cyber Command joins Carolyn and Mark to talk about her journey as a lifelong-learner, and how she is applying her skills to the innovative work at Cyber Command. From the importance of public-private partnerships, to teaching our kids healthy cyber security habits, Col. Frost offers her valuable insights on how we can all think innovatively and better secure our nation.Episode Table of Contents[0:29] Col. Frost's Journey to Being the JIOC Commander at US Cyber Command[8:04] How US Cyber Command Came to Be[16:04] Understanding the Nature and Psychology of War[23:35] The Parts Played by US Cyber Command in Our Security[30:46] The Thrill of Working at US Cyber Command[37:55] How US Cyber Command Keeps Everyone Safe[44:31] Nothing is True and Everything is PossibleEpisode Links and ResourcesCol. Frost LinkedInU.S. Cyber CommandAfternoon Cyber TeaClick Here PodcastSpies Lies and AlgorithmsNothing is True and Everything is PossibleThe Wires of War
Be sure to visit the Irregular Warfare Initiative's new website to see all of the new articles, podcast episodes, and other content the IWI team is producing! How much of a role have cyber warfare and digital information operations played since Russia's invasion of Ukraine? What about since 2014, when Russia seized Crimea and backed proxy forces in the eastern Donbas region? What lessons on cyber resilience emerge from an examination of Ukraine’s defense against Russian cyber actions? And what do Russia’s cyber operations against Ukraine tell us about the way it conceptualizes and organizes cyber activities? To explore these questions, this episode features a conversation with Gavin Wilde, a senior fellow in the Technology and International Affairs Program at the Carnegie Endowment for International Peace and former director for Russia, Baltic, and Caucasus affairs at the National Security Council, and Jason Kikta, who served for over twenty years in the United States Marine Corps, including seven years at United States Cyber Command designing and managing the national counter-APT and counter-ransomware missions. Intro music: "Unsilenced" by Ketsa Outro music: "Launch" by Ketsa CC BY-NC-ND 4.0
Our guest, Charlie Moore, is a recently retired USAF Lieutenant General who sits down to share his story from flying high in the air to becoming a bigwig in the cyber community. He was most recently the Deputy Commander of the United States Cyber Command, and also spent part of his career as a human factors engineer working on human interfaces for fighter aircraft. When he first began his Air Force career, he was a member of the last class entering into the Academy that was not issued desktop computers. Charlie discusses how this changed as the year went on and how that impacted his career both in and out of the military. Charlie worked for different companies over the years to further his career and his goals, and discusses how his flying career has helped him and says, "I was extremely passionate about the flying aspect of my career for 25 years and I became even more passionate about operating in this space." We thank Charlie for sharing his story with us.
Our guest, Charlie Moore, is a recently retired USAF Lieutenant General who sits down to share his story from flying high in the air to becoming a bigwig in the cyber community. He was most recently the Deputy Commander of the United States Cyber Command, and also spent part of his career as a human factors engineer working on human interfaces for fighter aircraft. When he first began his Air Force career, he was a member of the last class entering into the Academy that was not issued desktop computers. Charlie discusses how this changed as the year went on and how that impacted his career both in and out of the military. Charlie worked for different companies over the years to further his career and his goals, and discusses how his flying career has helped him and says, "I was extremely passionate about the flying aspect of my career for 25 years and I became even more passionate about operating in this space." We thank Charlie for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Our guest on this week's episode is Brett Williams, a retired Major General from the United States Air Force and one of the nation's leading consultants and experts on cybersecurity. Williams is the former director of operations at the United States Cyber Command, where he led a team of 400 people responsible for the global operations and protection of all Department Of Defense computer networks. After retiring from a 33-year military career, General Williams co-founded a business called IronNet Security. He discusses the threats our computer systems face, why supply chains are critical to our national defense, and what supply chain managers can do to better safeguard their data.A slowing economy continues to affect the trucking sector. We've seen falling demand for services since the end of last year, driven by inflation, concerns of a recession, and a general sense of uncertainty in the economy. An industry report out this week shows that carriers will continue to compete for limited demand–at least through the first quarter.The latest tech was on display this week at the National Retail Federation show in New York. We'll tell you about some of the newest technology designed for retail fulfillment and in-store sales.DC Velocity's sister publication CSCMP's Supply Chain Quarterly offers a podcast series called Supply Chain in the Fast Lane. It is co-produced with the Council of Supply Chain Management Professionals. The third season of eight episodes has fully launched and focuses on attracting and retaining labor in our supply chains. Go to your favorite podcast platform to subscribe.Articles and resources mentioned in this episode:IronNet SecurityCarriers will continue to compete for limited demandWalmart boosts investment in GoLocal delivery as a service platformVisit DCVelocity.com for the latest news. Visit Supply Chain QuarterlyListen to CSCMP and Supply Chain Quarterly's Supply Chain in the Fast Lane podcastListen to Supply Chain Quarterly's Top 10 Supply Chain Threats podcastSend feedback about this podcast to podcast@dcvelocity.com.Podcast is sponsored by: BeckoffOther linksAbout DC VELOCITYSubscribe to DC VELOCITYSign up for our FREE newslettersAdvertise with DC VELOCITYTop 10 Supply Chain Management Podcasts
A Sugar Hill family is staying with relatives after a fire destroyed their home on Friday, according to Gwinnett fire officials. Captain Ryan McGiboney said firefighters were called to the home on the 5700 block of Avonley Creek Drive at 12:54 p.m. and arrived a few minutes later to find heavy flames coming from the house. A 9-1-1 caller said the homeowner worked at night, but no one had seen him escape from the house. There were three cars parked in the home's driveway when firefighters arrived. As it turned out, the homeowner and his wife were outside the home and crews found them standing on a sidewalk. the homeowner confirmed to fire officials that the home had been vacant when the fire broke out. Firefighters used a ladder truck to knock out most of the flame and then used handlines to extinguish remaining hot spots. The cause of the fire has not been determined. McGiboney said said the family that lived at the home will stay with family members while repairs are made to their house. Hebron Christian senior Libby Jackson placed 16th out of 40 athletes in the pole vault at the Birmingham-Southern College Indoor Track and Field Invitational this past Friday. Jackson's best vault was 11 feet, 2 inches. She won last season's Class A Private state championship at 11-0, and was Gwinnett County champion at 11-1. On Sunday, the United States Marshals Service announced it has caught an international fugitive and child sexual predator from Gwinnett County who had been on the lam for nearly five years. U.S. Marshals teamed up Mexican authorities to arrest Brad A. Hatter of Gwinnett on December 3. Hatter was sent back to Georgia on December 4 and placed into detention where officials with the U.S. Marshals Service said he remains. In December 2005 in Gwinnett, Hatter, 58, was arrested for attempting to meet a 9-year-old girl for sexual activity. Officials said Hatter organized the encounter online and then went to the planned rendezvous location, where he was apprehended. In May of 2007, he was convicted of attempting to entice a minor to engage in sexual activity and sentenced to 108 months in prison. He was released from detention in September 2017 with the legal requirement to register as a sex offender and report to a supervising Federal Probation officer. On January 21st, 2018, Hatter allegedly stopped reporting to his probation officer, stopped registering as a sex offender and went into hiding. Probation officials immediately contacted the U.S. Marshals, who began their hunt. During the five-year search for Hatter, information was developed that he had left the United States and traveled to the Philippines. Later, he was located in Mexico — where he worked as a teacher. On Saturday, with the investigative assistance of the United States Marshals Service and after a brief pursuit, Hatter was apprehended by Mexican authorities, the U.S Marshals Service said. On Sunday, Hatter was returned to the United States and immediately placed into detention. In his job as a mentor, trainer and assessor at Carrier Strike Group 4 in Norfolk, Virginia, Chief Petty Officer Reza Ghorashi-Sarvestani is responsible for utilizing his vast technical knowledge and training to help thwart cyber attacks on the U.S. Navy's East Coast fleet. And yet it seems that every time he visits family and friends in his hometown of Suwanee, this tech whiz comes close to getting lost. Reza says he has to use GPS to get around the growing town. For much of his 16-year career in the Navy, Reza has deployed on submarines and various commands in support of the Navy's information warfare and operations. Reza's main job is to bring sailors up to speed on the latest in cyber defense, on land and at sea. A 2004 graduate of North Gwinnett High School, he enrolled in Georgia Perimeter College right after graduation, but felt what he was learning wasn't lining up with his professional interests. Referring to himself as an “East Coast sailor all my life,” Reza began his Naval career as a fire control technician on submarines in Groton, Connecticut. He then began training to be an Information Systems Technician and pulled double duty on subs, taking the “side job” of tending to the vessel's computer network. He then taught incoming Information Systems Technicians in Groton (location of the Naval Submarine Base New London) and in 2012 transitioned into a Cryptologic Technicians Networks expert and was stationed with Crypto Warfare Group 6 in Fort Meade, Maryland (home of the National Security Agency, United States Cyber Command, the Central Security Service and the Defense Information Systems Agency). Prior to his arrival at Norfolk Naval several months ago, Reza was attached to Navy Cyber Defense Operations Command in Suffolk, Virginia, for four years. He said in his new position he enjoys “the best of both worlds.” The long lines to get into the new Whataburger location in Kennesaw could be a look into what can be expected at The Exchange @ Gwinnett next year when the Buford Whataburger location opens its doors. Whataburger announced earlier this year that the Buford store would be one of six locations that the Texas-based restaurant chain planned to open in Georgia in 2023. Construction on the Buford restaurant has proceeded in the months since then, but the chain has not yet announced an exact opening date. The restaurant will have 3,746-square feet of space, according to development permits filed with Gwinnett County in March. In addition to the Buford location, which will overlook Buford Drive at the entrance to the Exchange @ Gwinnett, Whataburger will open locations in Cumming, Commerce, Dawsonville and two locations in Athens in 2023. A Woodstock location was expected to open by the end of this year. Last year, Snellville officials said the developer working on the Scenic Pointe on Scenic Highway had been in talks to include a Whataburger location in that development, and even included a rendering of a Whataburger location in its proposed site elevations that were submitted to city officials for consideration. A Snellville location was not mentioned in the chain's announcement about its metro Atlanta expansion in March, but county records show Whataburger submitted a building permit application to Gwinnett officials two days before Thanksgiving for a new store at 1436 Scenic Highway. The Kennesaw location opened to long lines of cars on Monday. On Friday, the drive-thru line for the restaurant wrapped around the building and out of parking lot and down a street behind the store. Two Cobb County police officers were on hand to direct traffic. Gwinnett County police have asked the Georgia Bureau of Investigation to look into an officer involved shooting that resulted in the death of a man early Saturday morning in unincorporated Norcross. Gwinnett police were called to 1250 Tech Drive at about 1 a.m. on a report from a security guard about a suspicious person. The man was allegedly wielding a knife as he approached the security guard while she was in her patrol car in front of Food Depot and asked her if she was armed. A GCPD patrol officer and his supervisor were the first to arrive on scene. They both observed the man with a knife in his hand and proceeded to give verbal commands. The man refused demands to drop his knife and ran towards one of the officers. Both officers discharged their firearms. The suspect was shot in the torso. It is not clear what the man intended to do, according to police. The GBI has been requested because it was an officer-involved shooting.See omnystudio.com/listener for privacy information.
At the Institute of Critical Infrastructre Technology Awards Dinner and Gala on 11/10/22, Federal Drive host Tom Temin caught up with two honorees: Kemba Walden, the Principal Deputy National Cyber Director and Candice Frost, the JIOC Commander at United States Cyber Command.
Just when you thought you had a month free of the Cyberlaw Podcast, it turns out that we are persisting, at least a little. This month we offer a bonus episode, in which Dave Aitel and I interview Michael Fischerkeller, one of three authors of "Cyber Persistence Theory: Redefining National Security in Cyberspace." The book is a detailed analysis of how cyberattacks and espionage work in the real world—and a sharp critique of military strategists who have substituted their models and theories for the reality of cyber conflict. We go deep on the authors' view that conflict in the cyber realm is all about persistent contact and faits accomplis rather than compulsion and escalation risk. Dave pulls these threads with enthusiasm. I recommend the book and interview in part because of how closely the current thinking at United States Cyber Command is mirrored in both.
Just when you thought you had a month free of the Cyberlaw Podcast, it turns out that we are persisting, at least a little. This month we offer a bonus episode, in which Dave Aitel and I interview Michael Fischerkeller, one of three authors of "Cyber Persistence Theory: Redefining National Security in Cyberspace." The book is a detailed analysis of how cyberattacks and espionage work in the real world—and a sharp critique of military strategists who have substituted their models and theories for the reality of cyber conflict. We go deep on the authors' view that conflict in the cyber realm is all about persistent contact and faits accomplis rather than compulsion and escalation risk. Dave pulls these threads with enthusiasm. I recommend the book and interview in part because of how closely the current thinking at United States Cyber Command is mirrored in both.
Philanthropy, Cybersecurity, and Bringing the Energy.In this episode of The Outspoken Podcast, host Shana Cosgrove talks to Tasha Cornish, Executive Director at Cybersecurity Association of Maryland, Inc. (CAMI). Tasha discusses how her work has helped improve the nation, from running a human services nonprofit during COVID to defending the country from cyber attacks during the Russian invasion of Ukraine. She also explains why cybersecurity is important for every business and why information truly is power within the IT sector. Tasha gives advice to those entering the world of cybersecurity and reveals what advice she's seeking out for where she's at in her own career. Lastly, Tasha tells us about her adventure journey from snowboarding, scuba diving, running marathons, and possibly even CISSP. QUOTES “There's a very interesting debate when it comes to the human factor of cybersecurity. It's a combination of training your staff but also making sure that your networks are not over privileging your staff, that they have access to all these systems they don't need to access. [...] Which gets a lot of pushback of course from people who are trying to work hard and be productive, but it does help protect our systems” - Tasha Cornish [29:13] “Like anything else, if you don't have the people and processes in place to use these [cybersecurity] products, they're kind of useless.” - Tasha Cornish [30:20] “[Local governments] are a huge target [...] It's a lot, for schools and hospitals really, so we are out here trying to be a good source of information. And those folks are understaffed often, their security teams are strapped ” - Tasha Cornish [33:42] TIMESTAMPS [00:04] Intro [01:31] Meet Tasha Cornish [03:38] Tasha's Work at a Nonprofit During COVID [04:32] How Tasha Started on her Career Path [08:56] Tasha's Experience During COVID [10:15] Starting at CAMI [14:04] CAMI's Mission [16:24] Size, Scale, and Impact of CAMI [24:32] CAMI's Cybersecurity Role in the Russo-Ukrainian War [25:56] CISA [32:00] CAMI's Goals for 2022 [33:14] Cybersecurity Bills in the Maryland House [38:06] Choosing Priorities in the Cybersecurity [39:04] CAMI's Board [43:51] Advice for People Getting Started [45:36] WiCyS [49:40] Tasha's Book Recommendation [50:40] Tasha's Surprising Fact [52:27] Outro RESOURCES https://www.akc.org/dog-breeds/shiba-inu/ (Shiba Inu) https://www.smocbaltimore.org/ (Saint Mary's Outreach Center) https://www.nei.nih.gov/ (National Eye Institute (NEI)) https://www.thebodypro.com/article/prevention-works-close-end-month (Prevention Works!) https://www.gwu.edu/ (The George Washington University) https://www.jhu.edu/ (Johns Hopkins University) http://honfest.net/ (HONFest) https://www.nps.gov/places/star-spangled-banner-flag-house.htm (Star Spangled Banner Flag House) https://amhistory.si.edu/starspangledbanner/making-the-flag.aspx (Mary Pickersgill) https://amhistory.si.edu/starspangledbanner/ (History of The Star Spangled Banner) https://www.linkedin.com/in/keithdaw/ (Keith Daw) https://www.linkedin.com/in/emrosenberg/ (Eric Rosenberg) https://www.linkedin.com/in/shelleyjlombardo/ (Shelley Lombardo) https://commerce.maryland.gov/fund/programs-for-businesses/buy-maryland-cybersecurity-tax-credit (Buy Maryland Cybersecurity (BMC) Tax Credit) https://www.linkedin.com/in/rongula/ (Ron Gula) https://www.linkedin.com/in/cyndigula/ (Cyndi Gula) https://datatribe.com/ (Data Tribe) https://www.nsa.gov/ (National Security Agency (NSA)) https://www.cybercom.mil/ (United States Cyber Command) https://www.ftmeadealliance.org/ (Fort Meade Alliance) https://hubzonecouncil.org/National-HUBZone-Conference (National HUBZone Conference) https://www.cfr.org/global-conflict-tracker/conflict/conflict-ukraine (Russo-Ukrainian War) https://www.cisa.gov/shields-up (CISA's Shields Up Initiative) https://www.cisa.gov/ (Cybersecurity and Infrastructure Security Agency (CISA))...
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this bonus episode, Col. Brian Russell discusses Gladiator School, which is the official podcast of II MEF Information Group. Gladiator School places you and the experts into the arena. Whether you're a Marine, member of the DoD or a civilian, Gladiator School has something for you. Resources: Here's where you can listen to or watch Gladiator School Apple/iTunes Spotify YouTube Also mentioned: MCPD-7 Learning Guest Bio: Colonel Brian Russell is the commanding officer of II Marine Expeditionary Force Information Group (II MIG) in Camp Lejeune, North Carolina. He commissioned as a Marine Corps Officer in December 1995 from North Carolina State University. Upon completion of basic officer training he went on to become a field artillery officer. His combat deployments include serving as the Military Transition Team Leader in Habbaniyah, Iraq, the executive officer of Brigade Headquarters Group in Helmand Province, Afghanistan and Plans Director in Bagram, Afghanistan. Some of his notable staff assignments include: Operations Directorate at Marine Corps Special Operations Command, Operations Directorate at United States Cyber Command, and U.S. Plans Directorate at Marine Corps Forces Cyberspace Command. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
Those on the red team may not be household names to the everyday person, but they are absolute legends and icons in the world of cybersecurity and hacking. While we have our personal favorite hackers between the two of us, we also invite our guest, Davin Jackson, to share his favorite cybersecurity legends and the lessons he's learned from them. Timecode Guide: [00:50] The importance of red teaming, especially during this season [02:17] Ron and Chris' first experience working in a red team environment [11:23] Communication and collaboration between blue and red [16:53] Knowledge gained from Davin Jackson's humble beginnings in tech [22:19] Gaining the blue perspective with Hacker Valley Blue Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac, the proactive cybersecurity management platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley Legends, Icons, Teachers, and Friends From Marcus Carey to Johnny Long, we're excited to share the legends that had an early influence and lasting impact on our careers in cybersecurity. While our two backgrounds in red teaming are different, we can attribute so much of our success and our ability to share our knowledge with all of you to the experts that were willing to invite us to join and learn the best hacking techniques alongside them. “I think that's the most important thing in red teaming, it's passing that knowledge on to someone else.” - Chris Cochran Communication, collaboration, and community instead of red vs blue It is not two teams with two separate fights when we're talking about red teams and blue teams. Often, when cybersecurity is too focused on this split between offensive and defensive, we forget to collaborate and fall short of improving on issues we discovered. Communication between red and blue can be a costly struggle, which is why we're happy to see our sponsor PlexTrac stepping in to develop communication technology for these teams. “There's this push and pull of collaboration. On one hand, you want the red team to work autonomously…but on the other hand, they do need insight if you're going to go deeper and deeper.” - Ron Eddings Legends met, lessons learned, tech loneliness understood In the latter half of our episode, we're joined by Hacker Valley Blue host Davin Jackson, also known as DJax Alpha. Davin started his cybersecurity journey with no computer of his own. Working his way up from basic tech jobs at corporations like Circuit City, lessons Davin learned from the legends he looked up to include finding a mentor, focusing on networking (even when it feels like a dead end), and being always willing to share what you've learned. “It's about consistency, and you have to have self control and discipline…It's one thing to get it, but it's another to maintain that success.” - Davin Hacking the Vocabulary: Pen test — Pen test, or penetration testing, is a method of identifying and testing vulnerabilities and gaps in an IT security system that could be exploited. This can also be referred to as “ethical hacking”. Popping a shell — A slang term for when a hacker exploits a security vulnerability to make a program run a hacker code. Red team — A group within an organization made up of offensive security experts who try to attack an organization's cybersecurity defenses. Blue team — A group of defensive security experts within the same organization that defends against and responds to the red team attack. Additional resources to check out: Marcus J Carey, Johnny Long/Hackers for Charity, United States Cyber Command, Booz Allen Hamilton ---------- Spend some time with our guest, Davin Jackson (DJax Alpha/Alpha Cyber Security) on his website, Twitter, Instagram, Facebook, and on the Hacker Valley Blue podcast. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochan on Twitter and LinkedIn
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, the Deputy Commandant for Information, Lt. Gen. Matthew Glavy discussed the Marine Corps newest doctrinal pub: MCDP 8 Information. MCDP 8 is the Marine Corps' capstone service doctrine that describes the purpose and mechanics of the Information warfighting function. The Marine Corps information warfighting function is a framework that Marines use to plan and execute operations for the purpose of creating and exploiting information advantages in pursuit of mission objectives, in any warfighting domain. Resources: Cognitive Crucible Podcast Episodes Mentioned #38 Lori Reynolds on Operations in the Information Environment #70 William Hess on the Information Environment and Adapting the Military #13 Brian Russell on Behind Enemy Lines Marine Corps Deputy Commandant for Information ESTABLISHMENT OF THE INFORMATION MANEUVER 1700 OCCUPATIONAL FIELD 17XX Guide posted on the DC I Website for your reference Information as a Joint Function MARINE CORPS BULLETIN 5400 ESTABLISHMENT OF INFORMATION AS THE SEVENTH MARINE CORPS WARFIGHTING FUNCTION MCDP 8, Information: A new Marine Corps doctrine for the information warfighting function by Mr. Eric X. Schaner https://mca-marines.org/wp-content/uploads/MCDP-8-Information.pdf Link to full show notes and resources https://information-professionals.org/episode/cognitive-crucible-episode-95 Guest Bio: Lieutenant General Glavy was commissioned in May 1986 through the United States Naval Academy. Upon receiving his wings in September of 1988, he was selected to fly the CH-46 Sea Knight. Assignments in the Operating Forces include: Weapons and Tactics Instructor and Embark Officer, HMM-261 (REIN); Aircraft Maintenance Officer, and Executive Officer, HMM-265 (REIN); Current Operations Officer, G-3, 1st MAW; Commanding Officer, HMM-265 (REIN); Commanding General, 2d Marine Aircraft Wing, and Commanding General, U.S. Marine Corps Forces Cyberspace Command. Assignments in the Supporting Establishment include: Platoon Commander, Officer Candidate School; Operational Test Director, White House Liaison Officer, Presidential Command Pilot and Commanding Officer, HMX-1. Headquarters and Staff Assignments: Plans, Policy and Operation, HQMC; Information Operations, Joint Staff J3; HQMC Aviation, Expeditionary Enablers Branch; Assistant Deputy Commandant for Aviation, Marine Corps Staff; Deputy Director of Current Operations, United States Cyber Command. Military Education: The Amphibious Warfare School, Marine Corps Command and Staff College and Marine Corps War College. Master's degrees in both Military Studies and Strategic Studies and a Bachelor of Science in Systems Engineering from the United States Naval Academy About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn.
As Master Guns is on his way to retire I want to honor him by playing a clip from our original conversation recorded in Dec 2021. Full Interview Here: https://www.herofrontpodcast.com/mgysgt-scott-h-stalker-of-spacecom-contested-space-the-next-great-power-conflict-lets-talk-all-things-space-command/ MGySgt SCOTT H. STALKER Command Senior Enlisted Leader Master Gunnery Sergeant Scott H. Stalker became the Command Senior Enlisted Leader of United States Space Command on Aug. 28, 2020. He is a native of Lebanon, New Hampshire. He has served as the Command Senior Enlisted Leader for the National Security Agency, the Defense Intelligence Agency and United States Cyber Command. Master Gunnery Sergeant Scott H. Stalker became the Command Senior Enlisted Leader of United States Space Command on Aug. 28, 2020. He is a native of Lebanon, New Hampshire. He has served as the Command Senior Enlisted Leader for the National Security Agency, the Defense Intelligence Agency and United States Cyber Command. Source: Spacecom.mil We talk about Elon Musk, China, Russia, Mental Health, PTSD, resiliency, cyber attacks, emerging technologies, and of course...SPACE. Let's get after it!
The Ukrainian government has said its websites and banks have been hit by cyber attacks. Two state-owned banks, PrivatBank and Oschadbank, had been targeted by “massive” denial of service attacks and other failures which interrupted banking services. We hear from General Keith Alexander, the former director of the US National Security Agency and founding commander of United States Cyber Command. Earlier this month, after years of delay, a deal was signed by the French energy giant Total Energies giving the green light to a controversial pipeline running from Uganda to Tanzania. The project's backers say it will usher in economic development across the region, but activists question the environmental impact of the project, as the BBC's Joshua Thorpe has been finding out. A new study has found that a quarter of the world's rivers contain potentially toxic levels of pharmaceutical drugs and it's been concluded that the pharmaceutical products found in them are a threat to human health and aquatic life. We get details from Dr Veronica Edmonds Brown, an Aquatic Ecologist at The University of Hertfordshire. Jamie Robertson is joined throughout the programme by Sushma Ramachandran, journalist and columnist at The Tribune in Delhi, and Andres Franzetti, Chief Executive Officer at The Risk Cooperative from Washington. Picture: PrivatBank logo is displayed on a mobile phone screen. Credit: Beata Zawrzel/NurPhoto via Getty Images
This week's Reagan Forum Podcast goes back to last month's Reagan National Defense Forum, for our 4th panel of the day, entitled Defense in the Digital Age: US Cyber Capabilities and the Future of Warfare. The panel included Representative Mike Gallagher, Admiral Michael Gilday, Chief of Naval Operations for the US Navy, Dr. Alex Karp, Cofounder and CEO of Palantir Technologies, and General Paul Nakasone, Commander of the United States Cyber Command. The panel was moderated by New York Times reporter Julian Barnes.
Master Gunnery Sergeant Scott H. Stalker became the Command Senior Enlisted Leader of United States Space Command on Aug. 28, 2020. He is a native of Lebanon, New Hampshire. He has served as the Command Senior Enlisted Leader for the National Security Agency, the Defense Intelligence Agency and United States Cyber Command. Source: Spacecom.mil We talk about Elon Musk, China, CCP, Russia, Mental Health, PTSD, CRISPR, resiliency, cyber attacks, emerging technologies, leadership philosophy, our nations threats, and of course...SPACE. Let's get after it! More on Master Guns: MGySgt Stalker's joint operational deployments include tours with the U.S. Army's 25th Infantry and 101st Airborne Division, the U.S. Navy's USS Guam LPH-9, USS Nassau LHA-4, USS Nashville LPD-13, USS Blue Ridge LCC-19 and the U.S. Air Force 31st OSS. His deployments with the Corps include tours with HMM-365, Marine All-Weather Fighter Attack Squadron 332, 26 MEU (SOC), 1st Bn 7th Marines, RCT-7, 1st Marine Division, 2nd Marine Division and 3rd Marine Division. Additionally, he deployed multiple times to South East Asia while assigned to the Joint POW/MIA Accounting Command. His combat and contingency deployments include Operation Restore Hope in Somalia; Deny Flight and Provide Promise in Bosnia-Herzegovina; Silver Wake, conducting a Non-Combatant Evacuation Operation in Albania, Guardian Retrieval in the Democratic Republic of the Congo; a Unit Deployment Program, Okinawa, Japan; and Operation Iraqi Freedom I, II, V, VII and VIII. Additional garrison assignments include Joint Intelligence Center Pacific, Marine Corps Intelligence Activity, Marine Corps Forces Special Operations Command, Marine Corps Forces Cyberspace Command and the Senior Enlisted Advisor to the Joint Chiefs of Staff J2. MGySgt Stalker is a graduate of the MAGTF Basic and Intelligence Chief's Course (Honor Graduate); Army Air Assault School, SNCO Advanced and Career Course (Distinguished Graduate), Joint Senior Enlisted Leader PME I and II and the National Defense University's KEYSTONE. He has a BA in Intelligence Analysis, an MS in Cybersecurity and a graduate certificate in Leadership from Harvard-Kennedy School of Government. He is currently pursuing an MA in Military History. Having served in a variety of theaters with multiple combat tours and contingency operations, MGySgt Stalker's awards, badges, devices and decorations are consistent with those of most Marines who have had the honor to serve the U.S. over a period of decades and the good fortune to return home safely. Source: Spacecom.mil
Hosts Ron and Chris welcome you to today's episode! This episode of Hacker Valley Studio is the start of a new season, Hacker Valley Blue, a series dedicated to threat intelligence, exclusively for listeners. The episode begins with Ron and Chris sharing their backgrounds in threat intelligence and cybersecurity. Chris picked intelligence as his job field in the United States Marine Corps, and eventually went on to The National Security Agency and United States Cyber Command. He focused on the how, who, and what of all the cyber-attacks happening at the time. Chris then went on to create his own company, and do consulting work in threat intelligence for over a decade. Throughout the episode, you will hear about what threat intelligence can do for businesses. Ron and Chris discuss how analysts can build rapport with the employees and stakeholders using their intelligence, and what questions companies should ask of analysts for the best results. They do this by walking listeners through Chris' EASY framework. 1:07 - The new season of Hacker Valley Blue is introduced. 3:43 - Chris shares his background in intelligence. 6:15 - Ron shares his background in intelligence 11:43 - What can threat intelligence do for an organization? 17:50 - The EASY Framework 18:41 - Elicit Requirements 21:40 - Asses Collection Plan 26:03 - Strive for Impact 30:24 - Yield the Feedback Links: Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ronald Eddings on Twitter Follow Chris Cochran on Twitter Learn more about the episode sponsor, RiskIQ
Ann Johnson, Corporate Vice President, Security, Compliance, and Identity at Microsoft discusses the recent cyberattacks on the US supply chain with Admiral (RET) Michael Rogers, former Head of United States Cyber Command. Mike gives his perspective on the frailty of today's supply chain (particularly in the US) and the massive risk of failing to secure it. Don't miss this fascinating discussion about the growing sophistication of cybercrime and the necessity of public-private partnerships to stop it.
Join us in The BreakLine Arena as we share a compelling conversation with Lieutenant General Vince Stewart, former Deputy Commander, United States Cyber Command and 20th Director of the Defense Intelligence Agency.In this conversation, Lt. Gen. Stewart shares lessons from his childhood as a first-generation Jamaican immigrant, the importance of mentorship and sponsorship over the course of his 38 years of service in the US Marine Corps, as well as deeper insight into the dichotomy of being a person of color in America.If you have not had the opportunity to read his moving OpEd, it can be found at: https://taskandpurpose.com/opinion/vincent-stewart-racism-black-lives-matter/If you like what you've heard, please subscribe, follow and rate our show. To learn more about BreakLine Education, check us out at breakline.org.
In this episode of Chattinn Cyber, Marc Schein interviews retired Lieutenant General Vince Stewart. He is the Chief Innovation and Business Intelligence Officer at Ankura and Founder/CEO of Stewart Global Solutions. In previous roles, he has served as the Director of Intelligence at the USMC, Commanding General of the Marine Forces Cyberspace Command, Director of the Defense Intelligence Agency, and Deputy Commander of the US Cyber Command. Born in Jamaica, Vince was determined to live the American dream. In 1971, he and his sister joined their mother in the US with nothing but hope and a vision — no titles, no special privileges, only the basics. He learned to play American football and started at Western Illinois University with a scholarship, eventually being recruited into the US Army ROTC program. He was determined to serve and give back to the country that gave him all these opportunities. 38 years later, Vince retired with many medals and distinctions, all of which he modestly credits to the individuals who served beside him. Vince speaks deeply to his transition from public to private sector and how despite many years of experience, many challenges still emerged. While in the public sector he was executing the budgets, the private sector forced him to maneuver making the budget and consider the margins in order to facilitate it. The heavy reliance on litigation in the private sector was also a learning point for Vince. Vince strongly advocates for “collective defense” – a collaboration between organizations and government agencies for sharing intelligence and solutions to win the fight against the very real threats in cyberspace. Around 60% of large companies ($100 million +) never recover from a data breach. Vince explains the misconception that large companies are the only ones at risk – some criminals want $20 million, but some want just $5000! The mere fact that we all have data that we want to protect is a point of great interest to nation-states and criminals. As a company, around 70% of breaches are as a result of insider activity. Vince talks about the evolution of phishing and how susceptible many people are to those types of schemes. About 5% of people are curious enough to open an email with the subject line “don’t open this email.” What about the other 95%? Smarter criminals are developing socially engineered phishing, in the form of ads tailored to a person’s interests – you see the ad and you click on the link. To learn more about Vince’s incredible career, from landing in America with nothing but the basics, to climbing the ladder and becoming the Deputy Commander of the United States Cyber Command, listen to this episode of Chattinn Cyber with Marc Schein.
In this episode, Don MacPherson is joined by MGySgt Scott H. Stalker, the Command Senior Enlisted Leader of United States Space Command. They discuss the future of war, including new technology, how we fight, and the importance of protecting equal access to space. They also discuss new and developing threats against American democracy, the dangers of misinformation and manipulation, and the ways in which the United States military is preparing to protect its citizens from new technologies.MGySgt Scott H. Stalker has dedicated his career to serving in the United States military. After numerous combat and contingency deployments and decades of service, MGySgt Stalker accepted garrison assignments that include Joint Intelligence Center Pacific, Marine Corps Forces Special Operations Command, and the Senior Enlisted Advisor to the Joint Chiefs of Staff J2. Prior to accepting his current position, MGySgt Stalker served as the Command Senior Enlisted Leader for the National Security Agency, the Defense Intelligence Agency, and United States Cyber Command.
“A man who trusts nobody is apt to be the kind of man nobody trusts.” In this episode, I interview Colonel Billy Pope, Chief of the Future Operations Division at United States Cyber Command. We talk about his recently earned opportunity to serve at the next level of command, how to develop a culture of trust at multiple levels within an organization, and how academia has positively shaped his leadership style both as a student and as an instructor.Purchase my new book “No Pressure...But Don’t Mess This Up” here: http://www.constantelevation.co/shop
Marine Corps Colonel Brian Russell discusses his experiences with Joint Task Force ARES, allied and joint force partnerships, and lessons learned which are relevant for synchronizing operations in the Information Environment going forward. He also provides an overview of the Marine Corps' information operations capability: the Marine Expeditionary Force Information Group (II MEF Information Group) -- collect, protect, and project. Click here for full show notes & resources Colonel Brian Russell is the commanding officer of II Marine Expeditionary Force Information Group (II MIG) in Camp Lejeune, North Carolina. He commissioned as a Marine Corps Officer in December 1995 from North Carolina State University. Upon completion of basic officer training he went on to become a field artillery officer. His combat deployments include serving as the Military Transition Team Leader in Habbaniyah, Iraq, the executive officer of Brigade Headquarters Group in Helmand Province, Afghanistan and Plans Director in Bagram, Afghanistan. Some of his notable staff assignments include: Operations Directorate at Marine Corps Special Operations Command, Operations Directorate at United States Cyber Command, and U.S. Plans Directorate at Marine Corps Forces Cyberspace Command. IPA is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, you can connect directly with The Cognitive Crucible podcast host, John Bicknell on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
Hosts Ron and Chris welcome you to today’s episode! This episode of Hacker Valley Studio is the start of a new season, Hacker Valley Blue, a series dedicated to threat intelligence, exclusively for listeners.The episode begins with Ron and Chris sharing their backgrounds in threat intelligence and cybersecurity. Chris picked intelligence as his job field in the United States Marine Corps, and eventually went on to The National Security Agency and United States Cyber Command. He focused on the how, who, and what of all the cyber-attacks happening at the time. Chris then went on to create his own company, and do consulting work in threat intelligence for over a decade.Ron has always had an interest in cybersecurity, and at 16 he found a mentor who took him under his wing in the trade. After a couple of years working in offensive attacks, he transitioned to a job building intelligence tools that dealt with threat data. While Chris focused more on the operational side of threat intelligence, Ron’s was more technical, and their experience converged well.Throughout the rest of the episode, you will hear about what threat intelligence can do for businesses. Ron and Chris discuss how analysts can build rapport with the employees and stakeholders using their intelligence, and what questions companies should ask of analysts for the best results. They do this by walking listeners through Chris’ EASY framework.1:07 - The new season of Hacker Valley Blue is introduced.3:43 - Chris shares his background in intelligence.6:15 - Ron shares his background in intelligence11:43 - What can threat intelligence do for an organization?17:50 - The EASY Framework18:41 - Elicit Requirements21:40 - Asses Collection Plan26:03 - Strive for Impact30:24 - Yield the FeedbackLinks:Learn more about Hacker Valley StudioSupport Hacker Valley Studio on PatreonFollow Hacker Valley Studio on TwitterFollow Ronald Eddings on TwitterFollow Chris Cochran on TwitterLearn more about the episode sponsor, RiskIQ
Explore the hidden corners of the internet and the stolen identities that live there with today's guest, Amyn Gilani, Vice President of Product at 4iQ. He talks about his path from red teaming to cyber attribution intelligence, where bad guys hide on the internet, and what it's like to be “on a mission to unmask cybercriminals.”– Get free training for your entire cybersecurity team (10 or more): https://www.infosecinstitute.com/cyberwork– Enter code “cyberwork” to get 30 days of free training with Infosec Skills: https://www.infosecinstitute.com/skills/– View transcripts and additional episodes: https://www.infosecinstitute.com/podcastAmyn Gilani is the Vice President of Product at 4iQ, a Los Altos-based adversary intelligence company. Previously, he was a Chief Technologist at Booz Allen Hamilton where he provided expertise to federal and commercial clients focusing on incident response, red teaming, threat hunting and cybersecurity operations engineering. Prior to joining Booz Allen, Amyn was a Vice President in Information Security at Goldman Sachs where he led red team operations and emulated sophisticated attacks against securities trading platforms and payment systems. He began his career serving in the United States Air Force as an intelligence analyst and was on detail at the National Security Agency and United States Cyber Command.About InfosecAt Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certifications and skills development training. We also empower all employees with security awareness and training to stay cybersecure at work and home. Founded by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.
Chief Master Sergeant of The Air Force Kaleth O. Wright talks leadership, lessons learned, and shared experiences with Master Gunnery Sergeant (MGySgt) Scott H. Stalker, the Command Senior Enlisted Leader of United States Cyber Command and the National Security Agency.
Lt Gen (retired) Kevin McLaughlin has over 35 years of experience in the space and cyberspace business with a focus on creating and leading large-scale, innovative, global organizations, and with unique strengths in operations, strategic planning, policy development, organizational transformation, and human capital development. He is the Director of the Program for Cyber Policy, Strategy, and Security and an Adjunct Professor of Practice at the George Bush School of Government and Public Service at Texas A&M University. As the founder and President of McLaughlin Global Associates LLC, Gen McLaughlin serves as a director on several corporate boards and advises clients on cyberspace and space operations, defense, risk management, strategy formulation and implementation, domestic and international policy, and government and private sector business opportunities. Gen. McLaughlin’s last active duty assignment was as the Deputy Commander of United States Cyber Command at Ft Meade, Maryland from 2014 - 2017. In this capacity, he directed 12,000 personnel and a $525M budget to defend the nation’s largest information network, provide offensive cyberspace options to commanders, and protect critical U.S. infrastructure from cyber-attacks. Before joining U.S. Cyber Command, Gen McLaughlin led 24th Air Force, the U.S. Air Force’s organization of 4,500-personnel that organized, trained, and equipped cyber forces to execute global cyberspace operations.Prior to his assignment at 24th Air Force, Gen McLaughlin spent thirty years as a leader of large, complex, and highly technical organizations associated with some of the world’s most critical space organizations including the squadron that operates the Global Positioning System and the Air Force operations group that operates over 170 satellites for national leadership, U.S. and allied military, and civil and federal agencies. He also served as the only active-duty staff member on the Commission to Assess National Security Space Management and Organization (AKA The Rumsfeld Space Commission) in 2000-2001.
How are our identities stolen? What happens to our identity information after its been stolen? Once we realize we've been hacked, what can we do to mitigate the damage and recover from the consequences? I'll discuss this and much more with Amyn Gilani from 4iQ - including why you shouldn't be participating in all those fun social media quizzes. Amyn Gilani leads strategy and product at 4iQ. Previously, he was a Chief Technologist at Booz Allen Hamilton where he provided expertise to federal and commercial clients focusing on incident response, red teaming, threat hunting, and cybersecurity operations engineering. Prior to joining Booz Allen, Amyn was a Vice President in Information Security at Goldman Sachs where he led Red Team Operations and emulated sophisticated attacks against securities trading platforms and payment systems. He began his career serving in the United States Air Force as an intelligence analyst and was on detail at National Security Agency and United States Cyber Command. Further Info: 4iQ: https://4iq.com/Report identity theft and other resources: https://www.identitytheft.gov/Defending Digital podcast: https://defendingdigital.com/carey-parker-firewalls-dont-stop-dragons/
This week Alex and Phil join Harrison to discuss Operation Soft Cell, a campaign that has been actively compromising telecommunications organizations since early 2017. Other highlights from the week include focus on a new cyber espionage campaign, known as Operation BouncingGolf, targeting Middle Eastern individuals’ mobile devices; the Russia-associated threat group “Turla”, which has demonstrated new tools and capabilities in three campaigns; and media allegations that the United States Cyber Command has targeted Iranian espionage groups. The team ends the week with a discussion around some new research Alex put out around Libra cryptocurrency impersonations. Check out Alex’s blog at https://www.digitalshadows.com/blog-and-research/facebooks-libra-cryptocurrency-cybercriminals-tipping-the-scales-in-their-favor/ Full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-20-jun-27-jun-2019. Heads-up, we’ll be off for the 4th of July next week, but check out our intelligence summary report at https://resources.digitalshadows.com/weekly-intelligence-summary.
On today's episode of Loud & Clear, Brian Becker and John Kiriakou are joined by Juan Carlos Ruiz, cofounder of the New Sanctuary Movement.President Trump over the weekend abruptly postponed his already announced immigration raids and said he would give Congress two weeks to make changes to the asylum law before sending agents from Immigration and Customs Enforcement around the country to seize and deport undocumented migrants. The raids had been set to begin yesterday in 10 major cities around the country. The United States Cyber Command, an adjunct of the National Security Agency, on Thursday initiated a cyber attack against an Iranian intelligence group that US officials say planned the attacks against oil tankers in the Gulf of Oman in recent weeks. The Iranian government announced today that it was aware of the cyber attack but that it failed and there was no damage. Meanwhile, Mike Pompeo is in Saudi Arabia meeting with the King and Crown Prince and the government of Bahrain is going forward with plans to host a “Peace to Prosperity” workshop tomorrow and Wednesday, despite the fact that neither the Israelis nor the Palestinians will attend. Kathy Kelly, co-coordinator of Voices for Creative Non-Violence, joins the show. Yet another Democrat--former Admiral and Representative Joe Sestak--has jumped into the Democratic race for President. That makes 25, maybe 26 Democrats running for President. The lesser-knowns will have a change to make their cases to the American public during debates this week on MSNBC. And Pete Buttigieg, who’s been embraced by the party establishment and much of the corporate media, is facing fierce criticism for his handling of a police killing of a Black resident of South Bend. Brian and John speak with Anoa Changa, the Director of Political Advocacy and a Managing Editor of Progressive Army, and host of the show The Way With Anoa, and Walter Smolarek., a Sputnik News analyst and one of the producers of this show. In March, Turkish President Recep Tayyip Erdogan nullified the results of the Istanbul mayoral race, saying that his AKP party’s candidate lost only because of voting irregularities. He forced a re-vote, which took place over the weekend. Instead of Erdogan’s candidate losing by 13,000 votes, as he did in March, he lost by a massive 775,000 votes. The stinging rebuke ended 25 years of AKP rule in Istanbul. Sputnik news analyst Walter Smolarek joins the show. Monday’s segment “Education for Liberation with Bill Ayers” is where Bill usually helps us look at the state of education across the country. What’s happening in our schools, colleges, and universities, and what impact does it have on the world around us? Today, Dr. Kevin Kumashiro, an internationally recognized expert on educational policy, school reform, and educational equity and social justice, and the former dean of the School of Education at the University of San Francisco joins Brian and John. In this segment, which we call The Week Ahead, the hosts take a look at the most newsworthy stories of the coming week and what it means for the country and the world, including the upcoming G20 summit, the Democratic debate, tensions in the Middle East and more. Sputnik News analysts and producers of this show Nicole Roussell and Walter Smolarek join the show.Monday’s regular segment Technology Rules with Chris Garaffa is a weekly guide on how monopoly corporations and the national surveillance state are threatening cherished freedoms, civil rights and civil liberties. Web developer and technologist Chris Garaffa joins the show.
Host Jim Lewis interviews Keith Alexander, a retired four-star general who served as commander of the United States Cyber Command and director of the National Security Agency in the Bush and Obama administrations. Listen in to hear how General Alexander helped establish and structure U.S. Cyber Command. General Alexander talks about NSA modernization, the different responsibilities that the Department of Defense, Federal Bureau of Investigation, and the Department of Homeland Security have to address cybersecurity threats; the current threats in cyberspace; and the merits of persistent engagement.
Host Jim Lewis interviews Keith Alexander, a retired four-star general who served as commander of the United States Cyber Command and director of the National Security Agency in the Bush and Obama administrations. Listen in to hear how General Alexander helped establish and structure U.S. Cyber Command. General Alexander talks about NSA modernization, the different responsibilities that the Department of Defense, Federal Bureau of Investigation, and the Department of Homeland Security have to address cybersecurity threats; the current threats in cyberspace; and the merits of persistent engagement.
A panel of national security experts discusses what actions constitute a "cyber attack," when a state can respond to a cyber attack through the use of armed force and how the Law of Armed Conflict applies to cyber attacks and state responses. The panel consists of Col. Gary Corn, staff judge advocate to the United States Cyber Command; retired Col. Gary Brown, former staff judge advocate to the United States Cyber Command; retired Maj. Gen. Charles Dunlap Jr., executive director of the Center on Law, Ethics and National Security at Duke University; and Capt. Todd Huntley, faculty at the Army Judge Advocate General's Legal Center and School. (University of Virginia School of Law, Nov. 15, 2017)