I’m a Suit in a Cyber World! - PowerPoint PPT Presentation

slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
I’m a Suit in a Cyber World! PowerPoint Presentation
Download Presentation
I’m a Suit in a Cyber World!

play fullscreen
1 / 123
I’m a Suit in a Cyber World!
167 Views
Download Presentation
gaye
Download Presentation

I’m a Suit in a Cyber World!

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. October 2011 I’m a Suit in a Cyber World! Twitter: #cybergamut

  2. Employment History Financial Services

  3. Employment History Suit Financial Services

  4. Employment History Ski Bum

  5. Employment History Not-a-Suit Ski Bum

  6. Employment History USAF Officer

  7. Employment History Suit USAF Officer

  8. Employment History SAIC

  9. Employment History SAIC Program Manager

  10. Employment History Suit SAIC Program Manager

  11. Employment History SAIC Division Manager

  12. Employment History Suit SAIC Division Manager

  13. Employment History SAIC Capture Manager

  14. Employment History Suit SAIC Capture Manager

  15. Education History King CollegeBA Economics & Business Administration

  16. Education History Mega-Suit King CollegeBA Economics & Business Administration

  17. Education History Chartered Life Underwriter

  18. Education History Suit Chartered Life Underwriter

  19. Education History UMD EuropeBowie State UniversityMS Management Information Systems

  20. Education History Suit UMD EuropeBowie State UniversityMS Management Information Systems

  21. Education History PMP

  22. Education History Ultimate-Suit PMP

  23. Education History GCIH

  24. Education History Cyber Cred GCIH

  25. Large Cyber Procurements SAIC Capture Manager

  26. Large Cyber Procurements > $250,000,000

  27. Introduction to cybergamut

  28. History and Why Change In 2008 SAIC established cybernexus Coming together or “nexus” of cyber analysts Central Maryland In 2011 cybernexus renamed cybergamut Runs the “gamut” of cyber disciplines Global organization cybergamut nodes Socorro, New Mexico Sioux Falls, South Dakota San Antonio, Texas Northern Virginia (Tysons Corner and Herndon)

  29. Mission Statement cybergamut is a worldwide community of practice for cyber professionals across industry, academia, and government providing ongoing education, training, and certification opportunities throughout all phases of a cyber professional’s career, utilizing traditional methods as well as non-traditional techniques like puzzles, Easter Eggs, and problem solving.

  30. Easter Eggs

  31. Easter Eggs (eeggs.com)

  32. Challenge Cards

  33. Challenge Coin

  34. Technical Tuesday What it is a technical exchange What it is not A sales presentation A product endorsement For discussion of procurements For discussion of procurement related issues

  35. PDU and CPE • PMI PDU’s • PMI Baltimore approved most Technical Tuesday events as eligible for PMI PDU’s under Category B, Continuing Education • CPE’s for CISSP • Self certification • Other certifications • What do you need?

  36. Defending a Large Network Brian Rexroad of AT&T 2 Dec 2008 DNI Essentials Paul Schnegelberger of SAIC and John Sanders of Northrop Grumman TASC Nov/Dec 2008 Digital Forensics Jim Jaeger of General Dynamics 13 Jan 2009 Case Studies in Cyber Attacks Aaron Wilson of SAIC 13 Jan 2009 Trickler Greg Virgin of RedJack 27 Jan 2009 Security Tools Peiter “Mudge” Zatko of BBN 27 Jan 2009 IPv6 David Harris of SAIC 10 Feb 2009 Exploitation Prediction Darryl Ackley of New Mexico Tech 24 Feb 2009 Analytic and IO Tools Clift Briscoe and Nat Cooper of Edge 24 Mar 2009 Distributed Systems Technologies and Internet Intelligence George Economou of Akamai 24 Mar 2009 Exploring the Social World of the Russian Hacker Community Tom Holt of Michigan State University 10 Mar 2009 Modern Forensic Investigative Techniques Amber Schroader of Paraben 10 Mar 2009 Defending Against BGP Man-In-The-Middle Attacks Earl Zmijewski of Renesys 14 Apr 2009 Examining the Storm Worm Nico Lacchini of TDI 26 May 2009 No-Tech Hacking Johnny Long 11 Jun 2009 Dirty Secrets of the Security Industry Bruce Potter of Ponte Technologies 14 Jul 2009 Windows Forensic Analysis: Dissecting the Windows Registry Rob Lee of MANDIANT and the SANS Institute 18 Aug 2009 Silence of the RAM Sean Bodmer of Savid Corporation 22 Sep 2009 VoIP Security - Attacks, Threats and Countermeasures Stuart McLeod of Global Knowledge 3 Nov 2009 Previous Topics

  37. A Tale of Two Departments – How Commerce and State Dealt With Chinese Intrusions: Lessons Learned Plus: Security Heroes and the 20 Critical Controls Alan Paller of the SANS Institute 9 Mar 2010 Aurora Aaron Barr of HBGary Federal 27 Apr 2010 Malware reverse engineering at ITT Paul Frank of ITT 25 May 2010 Advanced Cyber Collection Techniques; Extracting and Analyzing Information from the Domain Name System Tim Cague of The CYAN Group 10 Aug 2010 The Rise of the Social Web Aaron Barr of HBGary Federal 5 Oct 2010 Why Security People S#ck Gene Bransfield of Tenacity Solutions 9 Nov 2010 Insider Threat and Real-World Incident Study Presented by Michael Collins & Greg Virgin of RedJack along with Jim Downey of DISA PEO-MA 30 Nov 2010 Network Monitoring Josh Goldfarb of 21st Century Technologies 4 Jan 2011 Network Device Exploitation with Universal Plug & Play Terry Dunlap of Tactical Network Solutions 8 Feb 2011 Deep Packet Inspection for Cybersecurity ASW&R Jeff Kuhn of Pangia Technologies 29 Mar 2011 Stuxnet Redux: Malware Attribution & Lessons Learned Tom Parker of Securicon 19 Apr 2011 Special Technical Tuesday and renaming 10 May 2011 APT Intrusion Remediation: The Top Do's and Don'ts Rob Lee of MANDIANT and The SANS Institute 24 May 2011 Deep Packet Inspection Peder Jungck of Cloudshield and SAIC 28 Jun 2011 Our Security Status is Grim Brian Snow 19 Jul 2011 Cellular Security Jason MacLulich of Endace 9 Aug 2011 Government Cyber Technical Directors’ Panel 30 Aug 2011 Previous Topics cont.

  38. Upcoming Technical Tuesdays Hacking Windows 7 and defending against physical attacks 18 Oct 2011 Jesse Varsalone Looking for more speakers and topics such as: Tor routing Malware reverse engineering Cyber situational awareness Splunk Cloud computing and cloud forensics Geolocation of IP addresses and mobile devices Digital forensics E-discovery Attack attribution Deep packet inspection Fuzzing Writing secure code To suggest topics, volunteer to speak, or to receive an invitation, please contact: scott.w.sheldon@saic.com

  39. Interesting Topics from the Chief 5uit’s Perspective

  40. Remember!

  41. Dash

  42. Foreign Language • 1337 = LEET = short for elite (maybe) • 5uit = Suit • Pwn = Own • Your computer has been pwned • Teh = the • Accidents become purposeful • This was before spell checkers – hard to do now • Texting • LOL • ROFL •  - OMG Powerpoint translated : and ) to this

  43. Different Culture • 95% male • Black T-shirts • Interesting facial hair • Body art • Add alcohol and mix vigorously • Stickers everywhere • Lock picking for fun (lock sport) • Hackers aren’t all Bad • I Hack Charities • As a 5uit, I’m counter-counter-culture

  44. Pure evil • Wireless diabetes pump exploit

  45. Pure evil – or is it? • Wireless diabetes pump exploit • Exploit released by a pump user • Wants manufacturer to fix the problem • This is typical of many of the things released