Paul's Blog

THOUGHTS ON CYBER WARFARE

Gartner Security & Risk Management Summit – Discount for CSFI Members!

 

 

 

 

 

At the end of the day it is all about risk management! The Gartner conference will teach you plenty of strategies to help you deal with risk in cyberspace. If you have never attended this event it is time you do! Take advantage of the CSFI discount!

Gartner will provide CSFI Members a $300 discount off the Standard Registration fee to the Summit. MUST use Priority code GARTCSFI

11 – 14 June 2012 | National Harbor, MD (Washington, D.C. area)
http://www.gartner.com/technology/summits/na/security/

Strategic Roadmaps to Secure the Enterprise and Reduce Risk

As the premier gathering of enterprise IT security and risk management executives, the Gartner Security & Risk Management Summit 2012 takes a comprehensive look at the entire spectrum of IT security, business continuity management and risk, including: network and infrastructure security, identity and access management, compliance, privacy, fraud, business continuity management, and resilience. This year’s summit offers over 140 sessions and five in-depth, role-based programs:

CISO Program
IT Security
Risk Management and Compliance
Business Continuity Management (BCM)
New! The Business of IT Security and Risk

Hot topics to be covered:

Cloud & security
Advanced persistent threats
Secure mobile applications
Risk management & compliance
Identity management

I will be attending the event! Please feel free to contact me if you would like to get together.

Regards,

Paul de Souza, CSFI Founder Director

 

 

Advertisements

Filed under: Uncategorized

MARFORCYBER presents at George Washington University

Thursday, May 10, 2012

MARFORCYBER – GWU – CSFI (Unclass Event)

 

GWU-CSFI-MARFORCYBER Event

At the invitation of GW’s College of Professional Studies and the Cyber Security Forum Initiative (CSFI), Lt. Col. Yaroslaski and Major Guess-Johnson from the Marine Forces Cyberspace Command (MARFORCYBER) addressed a large group of students from the Security and Safety Leadership master’s program, GW faculty, and special guests.  In their presentation, Lt. Col. Yaroslaski and Major Guess-Johnson covered various elements of their work, including the current cyber environment (exploitation, disruption, and destruction), and the role of the Marine Corps in cyberwarfare.  They also explored the USCYBERCOM operational construct, highlighting the DOD Global Information Grid Ops (DGO), Defensive Cyberspace Operations (DCO), and Offensive Cyberspace Operations (OCO).

USMC Lt. Col. Yaroslask MARFORCYBER

According to Dr. Frederic Lemieux, Director of the master’s program in Security and Safety Leadership, “the presentation is an eye opener on current and near future challenge of traditional military force applied to cyberwar operations. We are proud as an institution of higher education to contribute in transferring knowledge on pressing issues that must be addressed by professionals working in the cybersecurity field.”

Dr. Frederic Lemieux and USMC Major Guess-Johnson MARFORCYBER

 

 

 

 

 

Master of Professional Studies degree in Security and Safety Leadership (SSL)

Program Contacts

Program Representative
Melinda Hull
703.248.6208
mhull@gwu.edu

Program Director
Frederic Lemieux, Ph. D.
703.248.6210
flemieux@gwu.edu

 

Filed under: Uncategorized

4th International Conference on Cyber Conflict – NATO Cooperative Cyber Defence Centre of Excellence

CSFI

International Conference on Cyber Conflict is NATO CCD COE’s annual conference and the next one will be held on June 5-8, 2012 in Tallinn, Estonia.

For the fourth year in a row the NATO Cooperative Cyber Defence Centre of Excellence invites experts from government, military, academia and the private sector to Tallinn to discuss recent trends in cyber security.

In 2012 the conference will focus on military and paramilitary activities in cyberspace. This topic will be explored from the political, legal and technical perspectives within two parallel tracks: the Law & Policy Track and the Technical Track.

Introduction to Computers and Networks

This workshop is targeted at non-technical experts who would like to have a deeper understanding of the technical side of cyber. Laptops are not required for this workshop.

The workshop is conducted in cooperation with the Cyber Security Forum Initiative (CSFI).

The Estonian cyber center in Tallinn is affiliated with NATO

9:00-11:00 Internet and Internet Communication
Presenters: Roger Kuhn (CSFI) and Don Eijndhoven (CEO Argent Consulting/CSFI)
During this session, the architecture and the main components of the Internet will be described. Terms like “router”, “data packet”, “Tier 1 ISP” or “bit” will be explained. Further, it will be shown how information is passed through the Internet. The audience will also be provided information on possibilities and limits of blocking Internet communication at the “boarders” of a State.

11:00-11:30 Coffee Break

11:30-12:30 “tracking cyber tracks” with “Analyzing / Investigating Advanced
Presenters: Paul de Souza (CSFI) and Keren Elazari (VERINT)
The evolving cyber threat landscape has demonstrated in recent years the gap between the level of security and visibility afforded by classic IT Security solutions and the obvious need for powerful and comprehensive data gathering mechanisms and analysis methods to enable investigation of cyber attacks. Accordingly, more and more security organizations worldwide are looking into employing further analytics and forensic technologies at an ever increasing scale. These technologies include: Network forensics, deep packet inspection (DPI), full packet capture, net flow analysis, traffic intelligence, cyber intelligence, network analysis & visibility (NAV) , advanced HIPS and NIDS & next generation firewalls. In the workshop, we will present in brief & examine some of the available technologies and methods, and explain how they can be utilized in order to investigate and analyze sophisticated cyber attacks.

12:30-14:30 Lunch

14:30-15:30 Botnets
Presenters: Jeff Bardin (Treadstone 71)
The audience will be provided the information of what botnets are and how they are set up. The main criminal areas of the usage of botnets will be shown. Additionally, cases of main “real-life” botnets as well as their take-down by law enforcement authorities will be presented. This will include the explanation of the possibilities of monitoring, taking-over and taking-down of botnets.

15:30-16:30 Computer Emergency Response Teams (CERTs)
Presenter: Col (r) Marc Jamison (L3 STRATIS) and Christopher Taylor (Director of Forensics, Cytech Services)
The nature and working area of CERTs will be presented. Especially, it will be shown what measures CERTs usually use in order to monitor and protect a computer network. In this context, also the potential need and actual extend of national, bi-lateral and international (e.g. FIRST) cooperation between CERTs will be explained. This will include a general description of the information which of the exchange would be desirable.

 

Cyber Attack Scenario Discussion

Cyber Attack Scenario Discussion: Hacker? Criminal? Hactivist Group? Nation State?
Time:
8 June 10:00 – 11:40 and 12:10 – 12:50

Moderated by Colonel Timothy Evans, Esq., LL.M. of the 175th Network Warfare Squadron Ft. Meade, Maryland

A panel of experts walks you through the key points, concerning a realistic cyber attack scenario, in determining the intent and attribution of a cyber attack. For full description, please download the flyer here (PDF).

Panel members include Chris Painter, Cyber Coordinator, U.S. State Department, Megan Stifel, U.S. Department of Justice, Trent Teyema, Federal Bureau of Investigation, David Smith, Director, Georgia Security Analysis Center, Tbilisi, Sue Lee, Johns Hopkins University Applied Physics Lab, Laurel, MD, Jaan Priisalu, Director General, Estonian Information Systems Authority (RIA) and David Ferbrache, Head of Cyber Policy and Plans, UK Defence Cyber Security Programme.

* Views presented by panelists are personal and do not represent official organisational or US Government policy positions.

Paul de Souza, CSFI Founder Director

 

 

Filed under: Uncategorized

Fundamentals of Chinese Information Warfare And Impacts on the Western World

I had the opportunity to attend the event at the Potomac Institute Cyber Center: “Fundamentals of Chinese Information Warfare and Impacts on the Western World” With William T. Hagestad II, Author of “21st Century Chinese Cyberwarfare”. We had a full room with the event being moderated by Amb. David J. Smith (Ret.), Potomac Institute Senior Fellow and Director, Potomac Institute Cyber Center, and special guests Dr. James Mulvenon, Vice President, Intelligence Division and Director, Center for Intelligence Research and Analysis, Defense Group, Inc. and Mark Stokes, Executive Director, Project 2049 Institute.

Watch the video here:


I highly recommend William T. Hagestad II as a speaker on the subject of Chinese Cyber Warfare. William T. Hagestad II will be also developing CSFI training material, and I am honored to welcome him as a new member of our team of CSFI authors!

Paul de Souza and William T. Hagestad II

William’s first book, 21st Century Chinese Cyber Warfare”  was published on 1 March 2012!

This single volume of information about the People’s Republic of China and her cyber warfare doctrinal development and history can be ordered either directly on this website – (HERE) or via Amazon.com

Lieutenant Colonel (RET) William Hagestad is an internationally recognized subject matter expert on the Chinese People’s Liberation Army & Government Information Warfare. He advises international intelligence organizations, military flag officers, and multi-national commercial enterprises with regard to their internal IT security governance and external security policies. The linguistic, historical, cultural, economic and military aspects of the Chinese Cyber Warfare are his forte. When national cyber security or protection of intellectual property is in question from Chinese Cyber Threats, Hagestad is consulted.

Enlisting in the United States Marine Corps in 1981, LtCol Hagestad’s military experience and service spans over 27 years. He served in numerous command posts, including acting as the Anti-Terrorism Office for Marine Central Command during the initial build-up and subsequent operations in Iraq during 2002-2003, and serving with both I and II Marine Expeditionary Force (MEF) and the US Army’s 1st Armored Division in Ramadi, Al-Anbar Province Iraq during 2006-2007. His personal decorations in the Navy Commendation Medal, Navy include the Achievement Medal with Gold Star, Operation Iraqi Freedom Medal with single campaign star, and the Global War on Terrorism Medal He continued to serve in an advisory position as an Anti-Terrorism/Force Protection Officer until retiring in 2011.

LtCol Hagestad provides current cyber threat assessments to international defense, intelligence and law enforcement entities. He speaks both domestically and internationally on the Chinese Cyber Threat. His first book, “21stCentury Chinese Cyber Warfare” was published March 2012.

LtCol Hagestad holds a Master of Science in Security Technologies from the College of Science & Engineering, University of Minnesota and a Master of Science in the Management Of Technology from the Technological Leadership Institute, University of Minnesota. He received a Bachelor of Arts in Mandarin Chinese, with minor emphasis in Classical Chinese and Modern Japanese, also from the University of Minnesota.

 

Paul de Souza, CSFI Founder Director

 

Filed under: Uncategorized

IDGA’s Cyber Warfare & Security Summit

 

IDGA’s Cyber Warfare & Security Summit (http://bit.ly/JlwFUw) is coming up this June in Arlington, VA and as a CSFI group member you are eligible for a 20% discount off standard rates.

Access the agenda at:

http://bit.ly/JlwFUwWays to Register
Online: http://bit.ly/JlwFUw
Phone: 1-800-882-8684
Email: idga@idga.org
Promo Code: CSFI_CW12
Expiration Date: May 18

This year’s event will cover in-depth discussions about the current plan scenarios for cyber attacks and the importance of international alliances for cyber security. In addition, the summit will have insightful case studies such as ‘protecting networks’ and ‘which government and private company systems are most in danger’.

Hear from leading experts such as:

–  Brigadier General Michael Stone, Assistant Adjutant General, Michigan National Guard
– Lieutenant Colonel (ret.) William Hagestad II, Chief Cyber Security Strategist
– Mark J. Morrison, CRISC, Defense Intelligence Officer, Cyber Directorate for Analysis, DIA
– Scott Borg, CEO, Cyber Consequences Unit

CSFI is an IDGA’s media sponsor!

CSFI Mission

“To provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners.”

Filed under: Uncategorized

Become a CSFI-DCOE (Defensive Cyberspace Operations Engineer)

Become a CSFI-DCOE (Defensive Cyberspace Operations Engineer). This is a unique CSFI certification track covering cyber operations (full spectrum). This track is designed to give the cyber warrior of today advanced capabilities.

Who Needs to Attend

Anyone interested in the field of cyber warfare/cyber operations and/or looking to expand a cyber security career, including cyber commanders, information operations officers, information security/assurance professionals, cyber security consultants, cyber strategists, military members (J2, J3, J6, J9 types), SOC/NOC security analysts, network security engineers, penetration testers, auditors, government officials, and security engineers

CSFI-DCOE (Defensive Cyberspace Operations Engineer)

Track 1: Introduction To Cyber Warfare
Training Dates:

  • May 14 – 16
  • June 25 – 27
  • July 30 – August 1
  • August 27 – 29
  • September 24 – 26
  • October 29 – 31

Tracks 2 & 3: Malware Analysis & Reversing Workshop, CSFI-DCOE Labs with Hands-On Training, and Final Test
Training Dates:

  • November 5 – 8

Contact us to reserve your seat now: contact@csfi.us

 

Filed under: Uncategorized

CSFI Blog Calendar

May 2012
M T W T F S S
« Mar   Jun »
 123456
78910111213
14151617181920
21222324252627
28293031  

Enter your email address to follow this blog and receive notifications of new posts by email.

CSFI Twitter

Career Thoughts

I am humbled and honored to have the opportunity to manage and run one of the biggest and most active forums on the Internet dealing with cyber warfare and cyber security – CSFI (The Cyber Security Forum Initiative). With over 16 years of cyber security experience, I continue to actively raise Cyber Warfare/Cyber Security awareness worldwide. I have worked as a Chief Security Engineer for AT&T, where I designed and approved secure networks for MSS. I have also consulted for several governments, military and private institutions on best network security practices throughout my career.

CSFI and its divisions CSFI-CWD (Cyber Warfare Division), CSFI-LPD (Law and Policy Division) and CSFI-WD (Wireless Division) continue to grow and expand with more than 60,000 information security members.

One of my personal goals is to serve our security community to the best of my abilities, in the protection and defense of our American national security interests, the American people, and that of our international partners. I am always ready to serve and to give of my time and skills to help our society with the growing problems we experience in cyberspace. I thank God and my family for the opportunities I have had in life and the most precious of all opportunities, which is the chance to serve others. I love what I do, and I appreciate all the support I have received from friends, family and our CSFI members.

___________________________________________

Paul de Souza, CSFI Founder Director