What Transferrable Skillsets Do Military Veteran Offer To Cybersecurity

November 09, 2021 00:26:56
What Transferrable Skillsets Do Military Veteran Offer To Cybersecurity
Chief of Cybersecurity
What Transferrable Skillsets Do Military Veteran Offer To Cybersecurity

Nov 09 2021 | 00:26:56

/

Hosted By

Dewayne Hart

Show Notes

The military veteran workforce brings advanced skillsets and aligned training that models the cybersecurity culture. This podcast examines and brings to attention how their skillsets are designed with a "Cybersecurity Seed," and much of their experience is transferrable and relatable to cybersecurity. The concepts of information secrecy, intelligence gathering, and human firewall theories are discussed.

View Full Transcript

Episode Transcript

WEBVTT 1 00:00:02.919 --> 00:00:08.150 Welcome to the chief of Cyber Security Podcast, where we discuss relevant information concerning 2 00:00:08.189 --> 00:00:13.429 the cyber security workforce, Business Development and best practices, made possible by see 3 00:00:13.470 --> 00:00:18.070 miss learn more, as seems done, and for a list of authorized publications, 4 00:00:18.190 --> 00:00:25.379 visit Dwayne hardcom. And now here's your host, Dwayne heart. Hello 5 00:00:25.620 --> 00:00:31.100 everyone, I am back again the chief of cyber security. Today is going 6 00:00:31.100 --> 00:00:39.450 to be interesting topic and I always like to say that anyone that is trying 7 00:00:39.490 --> 00:00:45.450 to transferred as skill set sort to move into a different job, you always 8 00:00:45.570 --> 00:00:51.719 wonder do I have the right skill sets? I will contested at because as 9 00:00:51.799 --> 00:00:55.960 a military veteran, I gave that a lot of thought when I first retied 10 00:00:55.960 --> 00:01:00.039 out of the military because I knew that I wanted to do something. I 11 00:01:00.119 --> 00:01:07.709 knew that I was a technically minded person, and so when I retired out 12 00:01:07.750 --> 00:01:10.150 of the military, at first I said, Oh yeah, I want to 13 00:01:10.150 --> 00:01:14.709 be a corporate trainer because I did trending in the military. Then I transition 14 00:01:15.030 --> 00:01:19.459 and I finished my degree programs and certifications and I realized that I was it 15 00:01:19.859 --> 00:01:23.540 as where I was at. Then I said, okay, I'm going to 16 00:01:23.579 --> 00:01:29.939 roll into it. Then I found the coodest things about cybersecurity and and I 17 00:01:30.099 --> 00:01:38.329 transition into sobage security and it has been a very rewarding career, not so 18 00:01:38.489 --> 00:01:45.290 much as a business owner but also as a professional, having the opportunity to 19 00:01:45.370 --> 00:01:49.560 you, to work for the federal government and also to for some federal for 20 00:01:49.719 --> 00:01:57.560 some federal clients. But I will say that veterans offer a unique skill set 21 00:01:57.680 --> 00:02:05.109 for try for cybersecurity. So in two day's podcast session, what transferable skill 22 00:02:05.230 --> 00:02:08.870 sets to military vetters offer to cyber security is what I'm going to be talking 23 00:02:08.909 --> 00:02:14.629 about. Now I want to put a disclaimer down that although I am talking 24 00:02:14.629 --> 00:02:20.900 about veterans, this does not exclude none veterans, veterans, from working in 25 00:02:20.979 --> 00:02:24.780 sobersecurity. So so let's take a break for a minute here now and think 26 00:02:25.699 --> 00:02:37.250 if, if you are tuned and ready to work until soyber security, there's 27 00:02:37.250 --> 00:02:43.490 a unique skill sets that you must have. Right, excuse me, you 28 00:02:43.569 --> 00:02:47.560 know this is not common here to cough, but it's going to be a 29 00:02:49.080 --> 00:02:53.919 very interesting topic of discussion for today. So so let's talk about the goals 30 00:02:54.000 --> 00:02:59.189 and the outcomes of the show. The first thing that I want to roll 31 00:02:59.229 --> 00:03:04.189 in to it's to talk about why a veteran so well prepared for cybersecurity. 32 00:03:05.030 --> 00:03:09.150 And then after that I'm going to roll into discussing secrecy. Every veteran has 33 00:03:09.270 --> 00:03:15.139 dealt with secrecy and their career. Combat Warfare Tactics is going to be next, 34 00:03:15.620 --> 00:03:21.659 because combat warfare tactics talks about situation awareness. Every battle commander, ship 35 00:03:21.819 --> 00:03:27.099 up latuone has to use combat warfare tactics and some of those same skill sets 36 00:03:27.490 --> 00:03:34.050 applied to cybersecurity itself. We also going to roll into transferable rolls of Sim 37 00:03:34.129 --> 00:03:37.370 it's looking at the roll of Sims that you plan a military and how they 38 00:03:37.490 --> 00:03:42.520 transfer over to cybersecurity. And then after that we want to roll into looking 39 00:03:42.560 --> 00:03:49.680 at the different different things, such as making the transition from like boots to 40 00:03:49.840 --> 00:03:58.710 cyber okay, because there is a transition that can happen because they are certain 41 00:03:58.789 --> 00:04:03.150 training programs and other things that are vetteran can do to at sell themselves in 42 00:04:03.229 --> 00:04:09.669 the cyber security work for us. So so let's talk about something else, 43 00:04:10.139 --> 00:04:14.819 and it and it's called given the cyber security seat. I like to look 44 00:04:14.860 --> 00:04:20.459 at the cyberge cyber security seat as the foundation that you need to channel your 45 00:04:20.620 --> 00:04:28.730 career in cybersecurity itself. Every military veteran has been given that cyber security seat. 46 00:04:29.490 --> 00:04:32.089 I don't care if you was working in a squadron, a battalion, 47 00:04:32.250 --> 00:04:38.920 a ship, a Patoon or or a battle group. You've been given the 48 00:04:39.040 --> 00:04:44.240 cyber security seat. And now in that particular see, there are certain things 49 00:04:44.319 --> 00:04:49.279 that exist. Every military veteran likes to learn. See, that's part of 50 00:04:49.399 --> 00:04:54.230 obscurity, because you have to have that attitude what you want to learn. 51 00:04:54.709 --> 00:04:58.870 I remember when I was in the military, I never got away from learning. 52 00:04:59.189 --> 00:05:01.350 From the first day I went into boot camp up up until the day 53 00:05:01.350 --> 00:05:04.670 I retired. I was always in a learning mode. If you work in 54 00:05:04.829 --> 00:05:10.939 Cybersecurity, you have to be in a learning mode because technology constantly changes. 55 00:05:12.220 --> 00:05:16.899 One of the other factors to is collaboration and that team work environment. Military 56 00:05:16.980 --> 00:05:20.649 people always works as teams and their units, in their ships, in their 57 00:05:21.410 --> 00:05:27.930 divisions, because there's a goal that needs to be accomplished. Cyber security professional 58 00:05:28.089 --> 00:05:32.129 has to work as a team. Leadership is another great example too, because 59 00:05:32.730 --> 00:05:38.560 every military veteran has been in a leadership position, and leadership is about guiding 60 00:05:39.279 --> 00:05:45.040 people technologies toward a certain goal. And when you work in cyber security you're 61 00:05:45.079 --> 00:05:49.230 going to be given those tasks of what you have people and you have technologies 62 00:05:49.310 --> 00:05:56.629 that you have to guide towards certain goals. Mission Focus Mindset and strategic thinking. 63 00:05:57.269 --> 00:06:00.829 This is about thinking about the future. Mission focus is means that you 64 00:06:00.990 --> 00:06:09.699 have bought into cyber security. When a person strategically thinks, they always look 65 00:06:09.699 --> 00:06:14.860 at the long vision, and this what military commanders do for six months when 66 00:06:15.060 --> 00:06:17.689 they have to deploy with their units. If you look at Cybsecurity, you 67 00:06:17.769 --> 00:06:21.889 always thinking about the future. Okay, how can I make this better? 68 00:06:24.050 --> 00:06:29.850 Flexibility means that you have to adapt to changes. Military people are very flexible. 69 00:06:29.889 --> 00:06:34.879 I remember when I was in a military and everyone on board my ship 70 00:06:35.199 --> 00:06:41.959 was very happy about a point visit to Jamaica, but then that was a 71 00:06:42.040 --> 00:06:46.920 change and the ship had to stay under way for like another week to do 72 00:06:46.079 --> 00:06:51.750 training. So that means that everybody has to get flexible and change their mindset 73 00:06:54.069 --> 00:07:00.660 from at least having liberty up to working and military people have to be very 74 00:07:00.740 --> 00:07:05.740 flexible because you can change on the moment notice. We all problem solvers. 75 00:07:08.180 --> 00:07:12.660 Secondly, two is that military people like to explore, and that's what Cyfe 76 00:07:12.699 --> 00:07:15.730 is curious about, trying to explore things and to make the situation better. 77 00:07:17.129 --> 00:07:21.449 One of the other factor too, is that a guardian. A Guardian is 78 00:07:21.569 --> 00:07:27.529 like a fire is. It's somewhat like a human fire wall. If you 79 00:07:27.649 --> 00:07:31.240 think about military veterans, they always serve as guardians of the ships, of 80 00:07:31.399 --> 00:07:36.079 their Portunes, of their units and the cyber security force. You Are Guardian 81 00:07:36.160 --> 00:07:41.560 too, because you're human firewall. You are trying to protect systems, and 82 00:07:41.759 --> 00:07:47.629 the human fire wall is a is, is a mental concept, and this 83 00:07:47.829 --> 00:07:51.990 is where the Cyberge kitty mindset comes to place, because in my book, 84 00:07:53.230 --> 00:07:57.990 the Syberge Kay Mindset, I wrote about human fire walls, and human firewalls 85 00:07:57.990 --> 00:08:01.779 of very important, because that's a buying structure. While person states that I 86 00:08:01.899 --> 00:08:07.540 want to be a part of syvere security and the Guardian themselves states that I 87 00:08:07.740 --> 00:08:15.730 want to make sure that that that my unit has the best groups of soldiers, 88 00:08:16.810 --> 00:08:20.170 sailors, marines, are airman's all right. So so you know, 89 00:08:20.329 --> 00:08:26.769 this is why military and venoms are so prepared. Now, one of the 90 00:08:26.850 --> 00:08:33.080 other factors that actually operates fround this concept is the secrecy of information. If 91 00:08:33.120 --> 00:08:39.840 you have served in the military, you've been taught about not talking about certain 92 00:08:39.879 --> 00:08:48.149 information, about when your unit is about ready to deploy, talks about military 93 00:08:48.309 --> 00:08:56.659 operations. This is secrecy of information, because information that you share may become 94 00:08:56.860 --> 00:09:03.340 a risk to your organization and make them vulnerable. If you think about data 95 00:09:03.539 --> 00:09:09.220 protection, military folks always try to protect data. If you think about secret, 96 00:09:09.539 --> 00:09:15.009 top secret and confidential information, and and how when you have to handle 97 00:09:15.129 --> 00:09:18.450 that information, by actually making sure that you put it in a safe or 98 00:09:18.610 --> 00:09:24.289 if you were told that this is information that that only you should know. 99 00:09:24.840 --> 00:09:30.480 The same concept applies to Serbersecurity, because in certain environments you cannot share information. 100 00:09:30.559 --> 00:09:35.759 Let's talk about those security clearances, all right. This is meaning that 101 00:09:35.919 --> 00:09:41.990 you are trusted to hold information for the government and if you're a military veteran 102 00:09:43.309 --> 00:09:48.269 and if you have a security clearance, you you are fifty percent employable by 103 00:09:48.350 --> 00:09:52.419 the government. I call it fifty percent employable because you have met half of 104 00:09:52.500 --> 00:10:00.179 the standards. Most study government jobs. We cry you to have a secret 105 00:10:00.179 --> 00:10:05.700 claims and now in corporate America they are background checks that are being done and 106 00:10:07.019 --> 00:10:11.649 some of the corporate companies like to know whether you have a top secret or 107 00:10:11.850 --> 00:10:16.250 seeker claims because that means you can be trusted. Some of the other factors 108 00:10:16.289 --> 00:10:20.250 that goes into this kind of stuff is loose lip, ship sink. I 109 00:10:20.289 --> 00:10:26.600 remember the military when our captain used to tell us on board the ship you 110 00:10:26.720 --> 00:10:31.519 are not to vocalize about a port call and say information about when the ship 111 00:10:31.600 --> 00:10:35.990 supposed to be leaving a port and when the ship is going to be Interne 112 00:10:37.110 --> 00:10:41.590 port. If you think about cyber security, right, it's certain information that 113 00:10:41.950 --> 00:10:45.789 companies cannot put out in public. And if you work in Cyber Security, 114 00:10:45.870 --> 00:10:52.419 you're not supposed to put information in public. Think about a company's IP address 115 00:10:52.419 --> 00:11:00.620 scheme. Okay, think about the a Villaty, the availability of certain technologies 116 00:11:00.659 --> 00:11:05.649 for that company. If it's certain vulnerabilities that you have in your database systems, 117 00:11:05.769 --> 00:11:09.889 where you can't put that out in public. Now, this is why 118 00:11:09.049 --> 00:11:16.090 military people are at an added advantage because they have already been given at seat. 119 00:11:16.730 --> 00:11:24.000 Okay, about the secrecy of information intelligence gathering, I was at a 120 00:11:24.039 --> 00:11:28.600 conference last week and and and one of the things that I notice that this 121 00:11:28.799 --> 00:11:39.629 conference was that many of the vendors there was advertised and threat intelligent platforms and 122 00:11:39.870 --> 00:11:46.710 threat intelligent platform although Cypher platform that gather actionable data da cyber security companies can 123 00:11:46.789 --> 00:11:52.580 use to determine what threats are against their organization. When you're in the military, 124 00:11:52.379 --> 00:11:58.059 you always deal with intelligence gallery because you need to know what type of 125 00:11:58.139 --> 00:12:03.970 threats are against you. If you have been a part of any battle group, 126 00:12:05.049 --> 00:12:07.409 if you have been a part of any ship, if you are part 127 00:12:07.490 --> 00:12:13.250 of any operations in the government, well, you have done threatened and tell 128 00:12:13.289 --> 00:12:18.320 r some before, and military people are at an additive vantage for this particular 129 00:12:18.360 --> 00:12:24.799 area. Trust and verify. Tell you what, if you have ever tried 130 00:12:24.960 --> 00:12:31.549 to come onto a naval base, or or maybe army base, or pretty 131 00:12:31.590 --> 00:12:35.990 much a force or a Marine base, you always have to show you identification 132 00:12:37.990 --> 00:12:41.669 and if you notice that those guards are looking at your idy car, put 133 00:12:41.789 --> 00:12:45.899 stiff. You just can't hold it up and inspect them and say yes, 134 00:12:46.100 --> 00:12:48.379 they going to get that card and they're going to look at it on the 135 00:12:48.460 --> 00:12:50.980 back. They don't look at it on the front. This is what trust 136 00:12:52.259 --> 00:12:56.980 and verify comes in, and this is that same mindset that is transferable over 137 00:12:56.059 --> 00:13:03.289 to cybersecurity as well. Now, now, with these type of skill sets, 138 00:13:05.250 --> 00:13:09.009 something else brings to the surface, which is called combat warfare taxes, 139 00:13:09.009 --> 00:13:15.919 and my book, the cyberskated mindset, there's a section dedicated to situation awareness. 140 00:13:16.840 --> 00:13:22.159 Now, situation awareness is about knowing the environment, you'll always have the 141 00:13:22.240 --> 00:13:28.950 front lines of defense. If you think about a military commander and situation where 142 00:13:30.070 --> 00:13:37.669 is they always have to explore the environment to know what risk are out there 143 00:13:37.110 --> 00:13:41.220 before they deploy their units. And we know that risk is he equal to 144 00:13:41.379 --> 00:13:48.019 threats, time vulnerabilities, right. So so a military command is always looking 145 00:13:48.059 --> 00:13:54.259 at the threats out there and also to looking at the vulnerabilities that exist and 146 00:13:54.730 --> 00:14:00.049 and taking both of those and doing a calculation and saying that my ship, 147 00:14:01.610 --> 00:14:05.009 my unit, may be at a risk, okay, at a certain level, 148 00:14:05.289 --> 00:14:09.559 and they make a determineation on how they want to respond. The same 149 00:14:09.639 --> 00:14:16.039 concept applies to cybersecurity. If you've been part of a risk assessment program you 150 00:14:16.159 --> 00:14:20.919 are always looking at threats and vulnerabilities and actually looking at the risk and taking 151 00:14:20.960 --> 00:14:26.629 a calculated looking said, okay, is my environment vulnerable? What is it 152 00:14:26.830 --> 00:14:31.350 that that my environment is facing? All right, and this is where the 153 00:14:31.429 --> 00:14:37.230 combat warfare taxes come to play a key rows. Now some of those elements 154 00:14:37.269 --> 00:14:41.659 that make it works is tools, tactics and procedures. They call it t 155 00:14:41.820 --> 00:14:46.659 TMP's, and the world of Sybsecurity we use ttps all the time. This 156 00:14:46.940 --> 00:14:50.740 is for incident response, but but you always going to take a look at 157 00:14:50.860 --> 00:14:56.250 the tools that you have available and the taxis that you can use, and 158 00:14:56.649 --> 00:15:01.490 also the procedures that are available, because if you're trying to defend your environment, 159 00:15:01.610 --> 00:15:07.840 then you actually needs to know whether those tools, the tactics and two 160 00:15:07.879 --> 00:15:15.039 procedures can save you. And you think about tools, tools as a as 161 00:15:15.159 --> 00:15:20.549 these soft software program tact this is how you navigate from point a to point 162 00:15:20.629 --> 00:15:26.990 B, okay, and and the procedures is the process that you use, 163 00:15:26.350 --> 00:15:31.029 you know, to get it done. Now, military commanders follow that all 164 00:15:31.149 --> 00:15:33.830 the time. And if you have been part of operations and if you have 165 00:15:35.029 --> 00:15:39.860 been part of a squadron or a battle unit, because you hear about ttps 166 00:15:39.980 --> 00:15:46.620 all the time, understanding the enemy or, pretty much in Cybersecurity, understanding 167 00:15:46.820 --> 00:15:52.929 hackers. Okay, this is this is a mindset that is practiced, because 168 00:15:54.409 --> 00:15:58.769 military commanders are always trying to understand the enemy. Before you engage in enemy, 169 00:15:58.850 --> 00:16:06.200 you always take a calculated risk, all right, before you deploy a 170 00:16:06.360 --> 00:16:11.600 system, you always try to understand how hackers are operated. All right. 171 00:16:11.840 --> 00:16:17.919 Some of the other factors is that you have to conceal your tracks, gather 172 00:16:18.240 --> 00:16:26.470 intel. This is why situational awareness is very important because part of situation awareness 173 00:16:26.470 --> 00:16:33.059 is knowing about cyber senses, and Cybersenses is directly related to cyber warfare, 174 00:16:33.620 --> 00:16:40.379 okay, or pretty much cyber Intel, because your cyber senses is telling you 175 00:16:40.500 --> 00:16:45.820 that something is wrong and that you must respond. When you think about cyber 176 00:16:45.860 --> 00:16:52.409 warfare and cyber Intel, okay, in the military it tells military person nails 177 00:16:52.049 --> 00:16:56.690 whether they need to react to a situation based on the knowledge that's been given 178 00:16:56.730 --> 00:17:03.720 to them. And in Cybersecurity, your environmental knowledge tells you how to react 179 00:17:03.759 --> 00:17:08.359 to US certain situation. So, as you see, situation Awaren is is 180 00:17:08.440 --> 00:17:15.430 the core piece of cybersecurity and also combat warfare. This is very important if 181 00:17:15.470 --> 00:17:19.029 you're a military veteran, and if you listen to this podcast session, this 182 00:17:19.269 --> 00:17:22.950 is direct relatable to the work that you done in the military or if you 183 00:17:23.029 --> 00:17:26.589 are in the military now, it still relates to the work that you do. 184 00:17:29.230 --> 00:17:33.259 So stay with me here, because now I'm going to roll into something 185 00:17:33.299 --> 00:17:40.180 that's very important with his transferable roller Sims. So I remember when when I 186 00:17:40.299 --> 00:17:44.490 joined the military, there were all kind of roles on Sim as. I 187 00:17:44.529 --> 00:17:48.009 could have taken all right, I could have been a nuclear power guy. 188 00:17:48.049 --> 00:17:57.089 I could have been a sonar technician, I could have been probably working on 189 00:17:57.170 --> 00:18:03.599 aircraft, but I chose to go down in the rout the route of technology 190 00:18:03.319 --> 00:18:11.319 and transfer, a role assign is applied to intelligence operations managers, right, 191 00:18:11.869 --> 00:18:18.990 because if you play in those particular roles, you you have gathered skill sets 192 00:18:18.230 --> 00:18:25.109 that can transfer out of the military. Hey, if you think about the 193 00:18:25.269 --> 00:18:33.259 fact is that individuals are involved with tabletop exercises. A tabletop exercise is pretty 194 00:18:33.259 --> 00:18:40.859 much where you simulate and event and you may simulate that your environment is being 195 00:18:40.940 --> 00:18:44.890 hacked. All Right, I remember the navy. We used to have these 196 00:18:45.089 --> 00:18:52.289 drills, all right, and they call combat systems technical training grill, C 197 00:18:52.650 --> 00:18:59.279 s tt right, and in those particular drills we used to practice maybe a 198 00:18:59.440 --> 00:19:07.799 ship getting hit by Muse and a system goes now and we have to respond 199 00:19:07.880 --> 00:19:11.990 and to bring two systems back online. If you work in Cyber Security, 200 00:19:12.069 --> 00:19:18.150 you faced this as well, because you always have these simulation in these drills 201 00:19:18.230 --> 00:19:22.869 where you would probably do a test to see if, for, server went 202 00:19:22.990 --> 00:19:26.819 down and you have a certain time period to bring that server back on line. 203 00:19:27.220 --> 00:19:34.819 All right, some of the roles you can work in cryptologic position, 204 00:19:36.220 --> 00:19:41.130 crypto people, because in cybersecurity and you know, we did cryptography all the 205 00:19:41.250 --> 00:19:52.130 time, cyber operation specialists, Cyber Operations Officer, Cyberspace Intelligence Position, cyber 206 00:19:52.250 --> 00:19:59.640 and electronic warfare officers. When you think about electronic warfare, this is the 207 00:19:59.880 --> 00:20:08.230 process of trying to jam signals or to probably send out certain things like defensive 208 00:20:08.349 --> 00:20:14.269 mechanism, what you can defect the mules who in a certain role, or 209 00:20:14.349 --> 00:20:18.509 you can send it to an alternate direction. If you think about cybersecurity and 210 00:20:19.430 --> 00:20:27.059 electronic warfare, then and all those different type of signals and the information that 211 00:20:27.220 --> 00:20:32.940 you set out right, well, you're trying to protect that information. And 212 00:20:33.180 --> 00:20:37.809 then what could happen is that you can encrypt that information. And if you're 213 00:20:37.809 --> 00:20:41.849 encrypt that information, then what you just done is that that you doing a 214 00:20:41.970 --> 00:20:48.890 formal warfare. Okay, and think about the position that you roll, that 215 00:20:49.000 --> 00:20:55.359 you played in the military. Okay. So so there's something else on the 216 00:20:55.440 --> 00:21:00.640 planet to that can help military velens out. It's called making the transition from 217 00:21:00.079 --> 00:21:06.990 boots to cyber if you are in a position now and you're thinking about, 218 00:21:07.029 --> 00:21:11.349 well, I want to transition into cyber security, here's some great points for 219 00:21:11.470 --> 00:21:17.990 you to consider. The Gi Bild is readily available for you. Gee Bill 220 00:21:18.109 --> 00:21:22.660 pays for your education. You have already been given the cybergecurity seat. Now 221 00:21:23.220 --> 00:21:27.180 what happens is that you have to take that syberage cuitcy and grow it. 222 00:21:29.460 --> 00:21:37.089 Certifications, it's another factor. If you're in a military they are programs set 223 00:21:37.130 --> 00:21:41.690 up to help you get your certification where you can be prepared for roads in 224 00:21:41.809 --> 00:21:47.519 Cyber Security. And speaking of certification, it requires you to learn and, 225 00:21:47.680 --> 00:21:52.200 as I stated before, that is one of the critical skill sets that military 226 00:21:52.279 --> 00:21:59.960 veterans offer to cyber security is that they like to learn technology. Military and 227 00:22:00.079 --> 00:22:07.470 the government start wealth building technology and started to build it, and so after 228 00:22:07.589 --> 00:22:17.180 so many years, the technology transition over to the private sector and Corporate America 229 00:22:17.259 --> 00:22:22.220 and some of those technologies are still being used now. I remember when I 230 00:22:22.339 --> 00:22:26.220 first joined the military and I was on board a ship. We was using 231 00:22:26.220 --> 00:22:33.289 a link system and a link system is used to have used to transmit information 232 00:22:33.410 --> 00:22:41.490 from ship to ship and I was using standard crypto information and all the CRYPTO 233 00:22:41.569 --> 00:22:45.599 information have to get changed every day. And if you think about email and 234 00:22:45.839 --> 00:22:53.559 think about cryptography and think about it, security engineers that has to set up 235 00:22:53.599 --> 00:23:00.269 a crypto or pretty much and in a cryptic channel that asks she uses Crypto. 236 00:23:00.589 --> 00:23:06.269 It's the same concept, all right. Some of the things that can 237 00:23:06.349 --> 00:23:10.309 help out is to is that that, as a military veteran, if you 238 00:23:10.430 --> 00:23:15.500 go to these a seal conferences being held. Some of the other things to 239 00:23:15.660 --> 00:23:21.819 remember is that you can fit right in. What I'm now. What I 240 00:23:21.900 --> 00:23:26.289 mean by you you can fit right in because of the inclusive courtial principle, 241 00:23:26.769 --> 00:23:30.210 is that there's a buy in from you to say that I want to be 242 00:23:30.289 --> 00:23:33.569 a part of its culture. And this is what it takes to work in 243 00:23:33.690 --> 00:23:37.809 Cyber Security, is that you have to want to be a part of cyber 244 00:23:37.890 --> 00:23:44.119 security and military vesdence are pretty pretty, pretty much at the edge, because 245 00:23:44.319 --> 00:23:48.119 when you are in the government, you've been give it at cyber security seed 246 00:23:49.160 --> 00:23:56.109 and still you still motivated and y'all which thinking about the worst case in area 247 00:23:56.829 --> 00:24:03.029 and how to make things successful. So so one of the errors that is 248 00:24:03.269 --> 00:24:11.380 going as well too, is that workforce development training is improving. Workforce Development 249 00:24:11.980 --> 00:24:18.059 is about trying to develop the workforce as we go through this element of transition 250 00:24:18.220 --> 00:24:25.450 and it there is a need for workforce development. Okay, veterans are probably 251 00:24:25.529 --> 00:24:30.650 ahead of a lot of pretty much a lot of the workforce development programs and 252 00:24:33.450 --> 00:24:38.079 they can add into the programs as well too, because because you have the 253 00:24:38.240 --> 00:24:44.960 Cyberg security seat. So if you take that seat and you transition that seed 254 00:24:45.079 --> 00:24:48.920 over to work force development, you just make it easy for yourself, because 255 00:24:48.160 --> 00:24:52.910 part of the workforce development programs means that you mctee dedicated to learn. You 256 00:24:53.029 --> 00:25:02.509 must be a technically savvy person. You must be an individual that knows about 257 00:25:02.549 --> 00:25:08.700 data protection and individual that understand secrecy. Right. So for you to transition 258 00:25:08.859 --> 00:25:15.140 into Cyberg security, you know that seed is already set. And speaking of 259 00:25:15.299 --> 00:25:21.970 the seed itself, there there is a lot of things that are changing what 260 00:25:22.170 --> 00:25:26.650 Cybergecurity, dais and daily all. Right, of some of those things that 261 00:25:26.730 --> 00:25:32.490 are changing is that is that digital mondization is kind of coming come into surface, 262 00:25:32.809 --> 00:25:38.319 and digital mondization is about taking technology and growing technology, and when technology 263 00:25:38.480 --> 00:25:45.240 grows, that's when the cyber secuting industry become digit e monditized. And I 264 00:25:45.359 --> 00:25:52.150 will say that this podcast session has been very important to me because when I 265 00:25:52.269 --> 00:25:56.589 was walking in the studio I was talking to the radio host about it and 266 00:25:56.789 --> 00:25:57.990 he said wow, he said that seems like it going to be a really 267 00:25:59.029 --> 00:26:04.019 good topic. I said yes because because he's dedicated to something that I have 268 00:26:04.180 --> 00:26:08.140 not heard of before, and you know, there's plenty of topics I'm pretty 269 00:26:08.140 --> 00:26:14.299 sure that many of you have not heard of before, which is digital mondization. 270 00:26:15.019 --> 00:26:18.180 So in the next level, so I would talk up more about digital 271 00:26:18.259 --> 00:26:22.049 mondization. All right. So so catching me in the next episode. Transferring 272 00:26:22.130 --> 00:26:27.849 digital modization and to the sober security mode of thinking. You've been listening to 273 00:26:27.930 --> 00:26:33.319 the chief of Cyber Security Podcast, where you have gained relevant knowledge to enhance 274 00:26:33.400 --> 00:26:37.519 your cyber security mindset. Be Sure to visit dwayne heartscom to learn more about 275 00:26:37.519 --> 00:26:42.799 authored publications, show notes and discover more information concerning cyber security.

Other Episodes

Episode

November 29, 2021 00:29:58
Episode Cover

Utilizing A Holistic Defense Approach To Secure Your Environment

Holistic defense is a traditional but rarely spoken concept when cybersecurity practices are introduced. This podcast session extracts the elements and knowledge required to...

Listen

Episode 1

April 10, 2023 00:31:38
Episode Cover

How Cyber Insurance Costs Impacts The Healthcare Industry!

As cyberattacks become more prevalent, insurance companies are forced to raise the rates. This has serious consequences for the healthcare industry, struggling to stay...

Listen

Episode

September 27, 2021 00:26:07
Episode Cover

Information Privacy, information sharing and individual responsibility

The Information Privacy podcast session focus on how privacy, safeguards, and information sharing operate as a collective methodology to protect personal, business, and critical...

Listen