Building Cyber Warriors

Building Cyber Warriors

Building Cyber Warriors Jeff Moulton, CISSP, PMP Director, Information Operations and Program Development Pentagon Cyber Strategy Building Cyber Warriors 2011 GTRI Overview - 3 Overview • Historical context • What’s worked • What hasn’t worked • How do we get where we want to be Objective assessment . PAST . PRESENT . Additional duty . Defined career paths . Compliance-based (IA . Compliance-based (IA controls) controls) . “Platform IT” -- bolt it on . Bolt it on . Understaffed . Understaffed . Marginally trained . Somewhat trained . Underfunded . LOTS of $’s -- (CNCI) . Not on PM’s critical path . On PM’s critical path . Patch & Pray . Patch & Pray . NTK/NTA . NTK/NTA/NTS What’s worked? • It’s cool to be a cyber person! • Cyber is in every sentence – getting the word out! • Cyber is the 5th dimension of warfare • Cyber is getting funding What hasn’t worked • Throwing $’s at the problems • Status quo • Senior management attention • Compliance mentality • Cyber recruiting Definition of Insanity: doing the same thing over and over and expecting a different outcome! Senior Management Attention “Exciting Cyber Careers” Would this attract you? 2011 GTRI Overview - 9 So What’s the Problem? • Thinking too small • One size does not fit all • Jack of all trades, master of none • Need to Know, Need to Access, Need to Share SHARE TO WIN! Thinking too small • Service-Specific Cyber Workforce • Social Engineering Research & Development (SERD) • CAP-Model • Innocentive Model Stereotypical Cyber Warrior? “I can run CENTCOM from here and still participate in simultaneous Tetris Penelope Garcia from "Criminal Minds" the Behavioral Analysis Unit at Quantico: tournaments.” Sunshine, 2011 GTRI Overview - 12 One size doesn’t fit all OCO CND CAT DFT Risk Management Operating Systems Compiler Design Programming Computer Hardware Architecture Discrete Math & Algorithms Jack of All Trades - Master of None Offensive Cyber Operations (OCO): - PYSOPS/HUMINT/SOINT - Operations, weapons platforms - SCADA, Electrical Engineering - Title 10/50/18 Computer Network Defense (CND): - Scanning, patching, Prin of Lease Priv - Audit Logs - IDS, IPS, FW, back up & recovery - Cyber exercises - Title 10 OCO CND CAT DFT Crisis Action Team (CAT): - Incident Response & Disaster Recovery - Hot site/Alternative - Certification & Accreditation - Risk Management Digital Forensics Team (DFT): - Rules/Preservation of Evidence - Incident Response - Consequence Management - Title 18 SERD the NERDS • Fight like they fight • SERD • 1 + 1 = 3 • Share (collaborate & graduate) • This is a “linked-in” generation – EXPLOIT IT! • NTK, NTA, NTS SHARE TO WIN Benchmark Best Practices • Gaming Industry • Banks • Military Medical /Legal Community Please contact us at anytime Jeff Moulton Director of Information Operations & Program Development Georgia Tech Research Institute [email protected] www.gtri.gatech.edu Cyber Warriors Need to Share Whose got your data? Accountability is a MUST 2011 GTRI Overview - 19 Test & Evaluation’s Role • Give Feedback to the Functional Managers • Work with the Program Managers • Migrate to a Risk-based Approach • Eliminate Duplication .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    20 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us