Paul's Blog

THOUGHTS ON CYBER WARFARE

Gartner Security & Risk Management Summit – Discount for CSFI Members!

 

 

 

 

 

At the end of the day it is all about risk management! The Gartner conference will teach you plenty of strategies to help you deal with risk in cyberspace. If you have never attended this event it is time you do! Take advantage of the CSFI discount!

Gartner will provide CSFI Members a $300 discount off the Standard Registration fee to the Summit. MUST use Priority code GARTCSFI

11 – 14 June 2012 | National Harbor, MD (Washington, D.C. area)
http://www.gartner.com/technology/summits/na/security/

Strategic Roadmaps to Secure the Enterprise and Reduce Risk

As the premier gathering of enterprise IT security and risk management executives, the Gartner Security & Risk Management Summit 2012 takes a comprehensive look at the entire spectrum of IT security, business continuity management and risk, including: network and infrastructure security, identity and access management, compliance, privacy, fraud, business continuity management, and resilience. This year’s summit offers over 140 sessions and five in-depth, role-based programs:

CISO Program
IT Security
Risk Management and Compliance
Business Continuity Management (BCM)
New! The Business of IT Security and Risk

Hot topics to be covered:

Cloud & security
Advanced persistent threats
Secure mobile applications
Risk management & compliance
Identity management

I will be attending the event! Please feel free to contact me if you would like to get together.

Regards,

Paul de Souza, CSFI Founder Director

 

 

Filed under: Cybersecurity

MARFORCYBER presents at George Washington University

Thursday, May 10, 2012

MARFORCYBER – GWU – CSFI (Unclass Event)

 

GWU-CSFI-MARFORCYBER Event

At the invitation of GW’s College of Professional Studies and the Cyber Security Forum Initiative (CSFI), Lt. Col. Yaroslaski and Major Guess-Johnson from the Marine Forces Cyberspace Command (MARFORCYBER) addressed a large group of students from the Security and Safety Leadership master’s program, GW faculty, and special guests.  In their presentation, Lt. Col. Yaroslaski and Major Guess-Johnson covered various elements of their work, including the current cyber environment (exploitation, disruption, and destruction), and the role of the Marine Corps in cyberwarfare.  They also explored the USCYBERCOM operational construct, highlighting the DOD Global Information Grid Ops (DGO), Defensive Cyberspace Operations (DCO), and Offensive Cyberspace Operations (OCO).

USMC Lt. Col. Yaroslask MARFORCYBER

According to Dr. Frederic Lemieux, Director of the master’s program in Security and Safety Leadership, “the presentation is an eye opener on current and near future challenge of traditional military force applied to cyberwar operations. We are proud as an institution of higher education to contribute in transferring knowledge on pressing issues that must be addressed by professionals working in the cybersecurity field.”

Dr. Frederic Lemieux and USMC Major Guess-Johnson MARFORCYBER

 

 

 

 

 

Master of Professional Studies degree in Security and Safety Leadership (SSL)

Program Contacts

Program Representative
Melinda Hull
703.248.6208
mhull@gwu.edu

Program Director
Frederic Lemieux, Ph. D.
703.248.6210
flemieux@gwu.edu

 

Filed under: Cybersecurity

4th International Conference on Cyber Conflict – NATO Cooperative Cyber Defence Centre of Excellence

CSFI

International Conference on Cyber Conflict is NATO CCD COE’s annual conference and the next one will be held on June 5-8, 2012 in Tallinn, Estonia.

For the fourth year in a row the NATO Cooperative Cyber Defence Centre of Excellence invites experts from government, military, academia and the private sector to Tallinn to discuss recent trends in cyber security.

In 2012 the conference will focus on military and paramilitary activities in cyberspace. This topic will be explored from the political, legal and technical perspectives within two parallel tracks: the Law & Policy Track and the Technical Track.

Introduction to Computers and Networks

This workshop is targeted at non-technical experts who would like to have a deeper understanding of the technical side of cyber. Laptops are not required for this workshop.

The workshop is conducted in cooperation with the Cyber Security Forum Initiative (CSFI).

9:00-11:00 Internet and Internet Communication
Presenters: Roger Kuhn (CSFI) and Don Eijndhoven (CEO Argent Consulting/CSFI)
During this session, the architecture and the main components of the Internet will be described. Terms like “router”, “data packet”, “Tier 1 ISP” or “bit” will be explained. Further, it will be shown how information is passed through the Internet. The audience will also be provided information on possibilities and limits of blocking Internet communication at the “boarders” of a State.

11:00-11:30 Coffee Break

11:30-12:30 “tracking cyber tracks” with “Analyzing / Investigating Advanced
Presenters: Paul de Souza (CSFI) and Keren Elazari (VERINT)
The evolving cyber threat landscape has demonstrated in recent years the gap between the level of security and visibility afforded by classic IT Security solutions and the obvious need for powerful and comprehensive data gathering mechanisms and analysis methods to enable investigation of cyber attacks. Accordingly, more and more security organizations worldwide are looking into employing further analytics and forensic technologies at an ever increasing scale. These technologies include: Network forensics, deep packet inspection (DPI), full packet capture, net flow analysis, traffic intelligence, cyber intelligence, network analysis & visibility (NAV) , advanced HIPS and NIDS & next generation firewalls. In the workshop, we will present in brief & examine some of the available technologies and methods, and explain how they can be utilized in order to investigate and analyze sophisticated cyber attacks.

12:30-14:30 Lunch

14:30-15:30 Botnets
Presenters: Jeff Bardin (Treadstone 71)
The audience will be provided the information of what botnets are and how they are set up. The main criminal areas of the usage of botnets will be shown. Additionally, cases of main “real-life” botnets as well as their take-down by law enforcement authorities will be presented. This will include the explanation of the possibilities of monitoring, taking-over and taking-down of botnets.

Cyber Attack Scenario Discussion

Cyber Attack Scenario Discussion: Hacker? Criminal? Hactivist Group? Nation State?
Time:
8 June 10:00 – 11:40 and 12:10 – 12:50

Moderated by Colonel Timothy Evans, Esq., LL.M. of the 175th Network Warfare Squadron Ft. Meade, Maryland

A panel of experts walks you through the key points, concerning a realistic cyber attack scenario, in determining the intent and attribution of a cyber attack. For full description, please download the flyer here (PDF).

Panel members include Chris Painter, Cyber Coordinator, U.S. State Department, Megan Stifel, U.S. Department of Justice, Trent Teyema, Federal Bureau of Investigation, David Smith, Director, Georgia Security Analysis Center, Tbilisi, Sue Lee, Johns Hopkins University Applied Physics Lab, Laurel, MD, Jaan Priisalu, Director General, Estonian Information Systems Authority (RIA) and David Ferbrache, Head of Cyber Policy and Plans, UK Defence Cyber Security Programme.

* Views presented by panelists are personal and do not represent official organisational or US Government policy positions.

Paul de Souza, CSFI Founder Director

Filed under: Cybersecurity

Fundamentals of Chinese Information Warfare And Impacts on the Western World

I had the opportunity to attend the event at the Potomac Institute Cyber Center: “Fundamentals of Chinese Information Warfare and Impacts on the Western World” With William T. Hagestad II, Author of “21st Century Chinese Cyberwarfare”. We had a full room with the event being moderated by Amb. David J. Smith (Ret.), Potomac Institute Senior Fellow and Director, Potomac Institute Cyber Center, and special guests Dr. James Mulvenon, Vice President, Intelligence Division and Director, Center for Intelligence Research and Analysis, Defense Group, Inc. and Mark Stokes, Executive Director, Project 2049 Institute.

Watch the video here:


I highly recommend William T. Hagestad II as a speaker on the subject of Chinese Cyber Warfare. William T. Hagestad II will be also developing CSFI training material, and I am honored to welcome him as a new member of our team of CSFI authors!

Paul de Souza and William T. Hagestad II

William’s first book, 21st Century Chinese Cyber Warfare”  was published on 1 March 2012!

This single volume of information about the People’s Republic of China and her cyber warfare doctrinal development and history can be ordered either directly on this website – (HERE) or via Amazon.com

Lieutenant Colonel (RET) William Hagestad is an internationally recognized subject matter expert on the Chinese People’s Liberation Army & Government Information Warfare. He advises international intelligence organizations, military flag officers, and multi-national commercial enterprises with regard to their internal IT security governance and external security policies. The linguistic, historical, cultural, economic and military aspects of the Chinese Cyber Warfare are his forte. When national cyber security or protection of intellectual property is in question from Chinese Cyber Threats, Hagestad is consulted.

Enlisting in the United States Marine Corps in 1981, LtCol Hagestad’s military experience and service spans over 27 years. He served in numerous command posts, including acting as the Anti-Terrorism Office for Marine Central Command during the initial build-up and subsequent operations in Iraq during 2002-2003, and serving with both I and II Marine Expeditionary Force (MEF) and the US Army’s 1st Armored Division in Ramadi, Al-Anbar Province Iraq during 2006-2007. His personal decorations in the Navy Commendation Medal, Navy include the Achievement Medal with Gold Star, Operation Iraqi Freedom Medal with single campaign star, and the Global War on Terrorism Medal He continued to serve in an advisory position as an Anti-Terrorism/Force Protection Officer until retiring in 2011.

LtCol Hagestad provides current cyber threat assessments to international defense, intelligence and law enforcement entities. He speaks both domestically and internationally on the Chinese Cyber Threat. His first book, “21stCentury Chinese Cyber Warfare” was published March 2012.

LtCol Hagestad holds a Master of Science in Security Technologies from the College of Science & Engineering, University of Minnesota and a Master of Science in the Management Of Technology from the Technological Leadership Institute, University of Minnesota. He received a Bachelor of Arts in Mandarin Chinese, with minor emphasis in Classical Chinese and Modern Japanese, also from the University of Minnesota.

 

Paul de Souza, CSFI Founder Director

 

Filed under: Cybersecurity

IDGA’s Cyber Warfare & Security Summit

 

IDGA’s Cyber Warfare & Security Summit (http://bit.ly/JlwFUw) is coming up this June in Arlington, VA and as a CSFI group member you are eligible for a 20% discount off standard rates.

Access the agenda at:

http://bit.ly/JlwFUwWays to Register
Online: http://bit.ly/JlwFUw
Phone: 1-800-882-8684
Email: idga@idga.org
Promo Code: CSFI_CW12
Expiration Date: May 18

This year’s event will cover in-depth discussions about the current plan scenarios for cyber attacks and the importance of international alliances for cyber security. In addition, the summit will have insightful case studies such as ‘protecting networks’ and ‘which government and private company systems are most in danger’.

Hear from leading experts such as:

–  Brigadier General Michael Stone, Assistant Adjutant General, Michigan National Guard
– Lieutenant Colonel (ret.) William Hagestad II, Chief Cyber Security Strategist
– Mark J. Morrison, CRISC, Defense Intelligence Officer, Cyber Directorate for Analysis, DIA
– Scott Borg, CEO, Cyber Consequences Unit

CSFI is an IDGA’s media sponsor!

CSFI Mission

“To provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners.”

Filed under: Cybersecurity

Become a CSFI-DCOE (Defensive Cyberspace Operations Engineer)

Become a CSFI-DCOE (Defensive Cyberspace Operations Engineer). This is a unique CSFI certification track covering cyber operations (full spectrum). This track is designed to give the cyber warrior of today advanced capabilities.

Who Needs to Attend

Anyone interested in the field of cyber warfare/cyber operations and/or looking to expand a cyber security career, including cyber commanders, information operations officers, information security/assurance professionals, cyber security consultants, cyber strategists, military members (J2, J3, J6, J9 types), SOC/NOC security analysts, network security engineers, penetration testers, auditors, government officials, and security engineers

CSFI-DCOE (Defensive Cyberspace Operations Engineer)

Track 1: Introduction To Cyber Warfare
Training Dates:

  • May 14 – 16
  • June 25 – 27
  • July 30 – August 1
  • August 27 – 29
  • September 24 – 26
  • October 29 – 31

Tracks 2 & 3: Malware Analysis & Reversing Workshop, CSFI-DCOE Labs with Hands-On Training, and Final Test
Training Dates:

  • November 5 – 8

Contact us to reserve your seat now: contact@csfi.us

 

Filed under: Cybersecurity

CSFI Blog Calendar

May 2012
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  

Enter your email address to follow this blog and receive notifications of new posts by email.

Bio

Dr. Paul de Souza is the founder of the Cyber Security Forum Initiative (CSFI). Dr. de Souza has over 20 years of cybersecurity experience. He is faculty at George Washington University and has worked as the Chief Security Engineer for AT&T, where he designed and approved secure networks for MSS (Managed Security Services). Dr. de Souza also worked as a security engineer for Computer Sciences Corporation (CSC) and U.S. Robotics. He has consulted for several governments, military organizations, and private institutions across the globe. He served as a Federal Director of Training and Education for Norman Data Defense Systems.

Dr. de Souza serves as a CENTRIC (Centre of Excellence in Terrorism, Resilience, Intelligence & Organized Crime Research) Visiting Researcher at Sheffield Hallam University, U.K., and as a Guest Lecturer at the Swedish Defence University (SEDU) Försvarshögskolanand; former Institute of World Politics Board of Advisors for the Cyber Intelligence Initiative (Ci2) in Washington, D.C.; and served as an Advisor for the MCPA (Military Cyber Professionals Association). He is a Cyber SME NATO Instructor and an Order of Thor Medal recipient.

He is a Negev Hi-Tech Faculty Startup Accelerator Advisor for Ben-Gurion University of the Negev, Israel, and an Advisory Board member at IntellCorp (Lisbon, Portugal – Counter-Terrorism/Counter-Intelligence/Cyber). He has been a Visiting Research Fellow at the National Security Studies, Tel Aviv University, Israel (INSS) – Cyber Security and Military & Strategic Affairs Programs. He has completed the Executive Program in Counter-Terrorism Studies from the Interdisciplinary Center (IDC) Herzliya in Israel. He is also a Cybersecurity Exec Ed alum at Harvard Kennedy School. He serves as an American Public University Ambassador, a Cybersecurity Programs Advisory Board Member at Capitol Technology University, and a Professor of Cyber Threat Intelligence at The University of Georgia, Tbilisi.

Dr. de Souza has a master’s degree in National Security Studies (M.A.) with a concentration in Terrorism from American Military University, West Virginia, and a Ph.D. in Critical Infrastructure from Capitol Technology University, Maryland

Archives