Episode Transcript
WEBVTT
1
00:00:02.919 --> 00:00:08.150
Welcome to the chief of Cyber Security
Podcast, where we discuss relevant information concerning
2
00:00:08.189 --> 00:00:13.429
the cyber security workforce, Business Development
and best practices, made possible by see
3
00:00:13.470 --> 00:00:18.070
miss learn more, as seems done, and for a list of authorized publications,
4
00:00:18.190 --> 00:00:25.379
visit Dwayne hardcom. And now here's
your host, Dwayne heart. Hello
5
00:00:25.620 --> 00:00:31.100
everyone, I am back again the
chief of cyber security. Today is going
6
00:00:31.100 --> 00:00:39.450
to be interesting topic and I always
like to say that anyone that is trying
7
00:00:39.490 --> 00:00:45.450
to transferred as skill set sort to
move into a different job, you always
8
00:00:45.570 --> 00:00:51.719
wonder do I have the right skill
sets? I will contested at because as
9
00:00:51.799 --> 00:00:55.960
a military veteran, I gave that
a lot of thought when I first retied
10
00:00:55.960 --> 00:01:00.039
out of the military because I knew
that I wanted to do something. I
11
00:01:00.119 --> 00:01:07.709
knew that I was a technically minded
person, and so when I retired out
12
00:01:07.750 --> 00:01:10.150
of the military, at first I
said, Oh yeah, I want to
13
00:01:10.150 --> 00:01:14.709
be a corporate trainer because I did
trending in the military. Then I transition
14
00:01:15.030 --> 00:01:19.459
and I finished my degree programs and
certifications and I realized that I was it
15
00:01:19.859 --> 00:01:23.540
as where I was at. Then
I said, okay, I'm going to
16
00:01:23.579 --> 00:01:29.939
roll into it. Then I found
the coodest things about cybersecurity and and I
17
00:01:30.099 --> 00:01:38.329
transition into sobage security and it has
been a very rewarding career, not so
18
00:01:38.489 --> 00:01:45.290
much as a business owner but also
as a professional, having the opportunity to
19
00:01:45.370 --> 00:01:49.560
you, to work for the federal
government and also to for some federal for
20
00:01:49.719 --> 00:01:57.560
some federal clients. But I will
say that veterans offer a unique skill set
21
00:01:57.680 --> 00:02:05.109
for try for cybersecurity. So in
two day's podcast session, what transferable skill
22
00:02:05.230 --> 00:02:08.870
sets to military vetters offer to cyber
security is what I'm going to be talking
23
00:02:08.909 --> 00:02:14.629
about. Now I want to put
a disclaimer down that although I am talking
24
00:02:14.629 --> 00:02:20.900
about veterans, this does not exclude
none veterans, veterans, from working in
25
00:02:20.979 --> 00:02:24.780
sobersecurity. So so let's take a
break for a minute here now and think
26
00:02:25.699 --> 00:02:37.250
if, if you are tuned and
ready to work until soyber security, there's
27
00:02:37.250 --> 00:02:43.490
a unique skill sets that you must
have. Right, excuse me, you
28
00:02:43.569 --> 00:02:47.560
know this is not common here to
cough, but it's going to be a
29
00:02:49.080 --> 00:02:53.919
very interesting topic of discussion for today. So so let's talk about the goals
30
00:02:54.000 --> 00:02:59.189
and the outcomes of the show.
The first thing that I want to roll
31
00:02:59.229 --> 00:03:04.189
in to it's to talk about why
a veteran so well prepared for cybersecurity.
32
00:03:05.030 --> 00:03:09.150
And then after that I'm going to
roll into discussing secrecy. Every veteran has
33
00:03:09.270 --> 00:03:15.139
dealt with secrecy and their career.
Combat Warfare Tactics is going to be next,
34
00:03:15.620 --> 00:03:21.659
because combat warfare tactics talks about situation
awareness. Every battle commander, ship
35
00:03:21.819 --> 00:03:27.099
up latuone has to use combat warfare
tactics and some of those same skill sets
36
00:03:27.490 --> 00:03:34.050
applied to cybersecurity itself. We also
going to roll into transferable rolls of Sim
37
00:03:34.129 --> 00:03:37.370
it's looking at the roll of Sims
that you plan a military and how they
38
00:03:37.490 --> 00:03:42.520
transfer over to cybersecurity. And then
after that we want to roll into looking
39
00:03:42.560 --> 00:03:49.680
at the different different things, such
as making the transition from like boots to
40
00:03:49.840 --> 00:03:58.710
cyber okay, because there is a
transition that can happen because they are certain
41
00:03:58.789 --> 00:04:03.150
training programs and other things that are
vetteran can do to at sell themselves in
42
00:04:03.229 --> 00:04:09.669
the cyber security work for us.
So so let's talk about something else,
43
00:04:10.139 --> 00:04:14.819
and it and it's called given the
cyber security seat. I like to look
44
00:04:14.860 --> 00:04:20.459
at the cyberge cyber security seat as
the foundation that you need to channel your
45
00:04:20.620 --> 00:04:28.730
career in cybersecurity itself. Every military
veteran has been given that cyber security seat.
46
00:04:29.490 --> 00:04:32.089
I don't care if you was working
in a squadron, a battalion,
47
00:04:32.250 --> 00:04:38.920
a ship, a Patoon or or
a battle group. You've been given the
48
00:04:39.040 --> 00:04:44.240
cyber security seat. And now in
that particular see, there are certain things
49
00:04:44.319 --> 00:04:49.279
that exist. Every military veteran likes
to learn. See, that's part of
50
00:04:49.399 --> 00:04:54.230
obscurity, because you have to have
that attitude what you want to learn.
51
00:04:54.709 --> 00:04:58.870
I remember when I was in the
military, I never got away from learning.
52
00:04:59.189 --> 00:05:01.350
From the first day I went into
boot camp up up until the day
53
00:05:01.350 --> 00:05:04.670
I retired. I was always in
a learning mode. If you work in
54
00:05:04.829 --> 00:05:10.939
Cybersecurity, you have to be in
a learning mode because technology constantly changes.
55
00:05:12.220 --> 00:05:16.899
One of the other factors to is
collaboration and that team work environment. Military
56
00:05:16.980 --> 00:05:20.649
people always works as teams and their
units, in their ships, in their
57
00:05:21.410 --> 00:05:27.930
divisions, because there's a goal that
needs to be accomplished. Cyber security professional
58
00:05:28.089 --> 00:05:32.129
has to work as a team.
Leadership is another great example too, because
59
00:05:32.730 --> 00:05:38.560
every military veteran has been in a
leadership position, and leadership is about guiding
60
00:05:39.279 --> 00:05:45.040
people technologies toward a certain goal.
And when you work in cyber security you're
61
00:05:45.079 --> 00:05:49.230
going to be given those tasks of
what you have people and you have technologies
62
00:05:49.310 --> 00:05:56.629
that you have to guide towards certain
goals. Mission Focus Mindset and strategic thinking.
63
00:05:57.269 --> 00:06:00.829
This is about thinking about the future. Mission focus is means that you
64
00:06:00.990 --> 00:06:09.699
have bought into cyber security. When
a person strategically thinks, they always look
65
00:06:09.699 --> 00:06:14.860
at the long vision, and this
what military commanders do for six months when
66
00:06:15.060 --> 00:06:17.689
they have to deploy with their units. If you look at Cybsecurity, you
67
00:06:17.769 --> 00:06:21.889
always thinking about the future. Okay, how can I make this better?
68
00:06:24.050 --> 00:06:29.850
Flexibility means that you have to adapt
to changes. Military people are very flexible.
69
00:06:29.889 --> 00:06:34.879
I remember when I was in a
military and everyone on board my ship
70
00:06:35.199 --> 00:06:41.959
was very happy about a point visit
to Jamaica, but then that was a
71
00:06:42.040 --> 00:06:46.920
change and the ship had to stay
under way for like another week to do
72
00:06:46.079 --> 00:06:51.750
training. So that means that everybody
has to get flexible and change their mindset
73
00:06:54.069 --> 00:07:00.660
from at least having liberty up to
working and military people have to be very
74
00:07:00.740 --> 00:07:05.740
flexible because you can change on the
moment notice. We all problem solvers.
75
00:07:08.180 --> 00:07:12.660
Secondly, two is that military people
like to explore, and that's what Cyfe
76
00:07:12.699 --> 00:07:15.730
is curious about, trying to explore
things and to make the situation better.
77
00:07:17.129 --> 00:07:21.449
One of the other factor too,
is that a guardian. A Guardian is
78
00:07:21.569 --> 00:07:27.529
like a fire is. It's somewhat
like a human fire wall. If you
79
00:07:27.649 --> 00:07:31.240
think about military veterans, they always
serve as guardians of the ships, of
80
00:07:31.399 --> 00:07:36.079
their Portunes, of their units and
the cyber security force. You Are Guardian
81
00:07:36.160 --> 00:07:41.560
too, because you're human firewall.
You are trying to protect systems, and
82
00:07:41.759 --> 00:07:47.629
the human fire wall is a is, is a mental concept, and this
83
00:07:47.829 --> 00:07:51.990
is where the Cyberge kitty mindset comes
to place, because in my book,
84
00:07:53.230 --> 00:07:57.990
the Syberge Kay Mindset, I wrote
about human fire walls, and human firewalls
85
00:07:57.990 --> 00:08:01.779
of very important, because that's a
buying structure. While person states that I
86
00:08:01.899 --> 00:08:07.540
want to be a part of syvere
security and the Guardian themselves states that I
87
00:08:07.740 --> 00:08:15.730
want to make sure that that that
my unit has the best groups of soldiers,
88
00:08:16.810 --> 00:08:20.170
sailors, marines, are airman's all
right. So so you know,
89
00:08:20.329 --> 00:08:26.769
this is why military and venoms are
so prepared. Now, one of the
90
00:08:26.850 --> 00:08:33.080
other factors that actually operates fround this
concept is the secrecy of information. If
91
00:08:33.120 --> 00:08:39.840
you have served in the military,
you've been taught about not talking about certain
92
00:08:39.879 --> 00:08:48.149
information, about when your unit is
about ready to deploy, talks about military
93
00:08:48.309 --> 00:08:56.659
operations. This is secrecy of information, because information that you share may become
94
00:08:56.860 --> 00:09:03.340
a risk to your organization and make
them vulnerable. If you think about data
95
00:09:03.539 --> 00:09:09.220
protection, military folks always try to
protect data. If you think about secret,
96
00:09:09.539 --> 00:09:15.009
top secret and confidential information, and
and how when you have to handle
97
00:09:15.129 --> 00:09:18.450
that information, by actually making sure
that you put it in a safe or
98
00:09:18.610 --> 00:09:24.289
if you were told that this is
information that that only you should know.
99
00:09:24.840 --> 00:09:30.480
The same concept applies to Serbersecurity,
because in certain environments you cannot share information.
100
00:09:30.559 --> 00:09:35.759
Let's talk about those security clearances,
all right. This is meaning that
101
00:09:35.919 --> 00:09:41.990
you are trusted to hold information for
the government and if you're a military veteran
102
00:09:43.309 --> 00:09:48.269
and if you have a security clearance, you you are fifty percent employable by
103
00:09:48.350 --> 00:09:52.419
the government. I call it fifty
percent employable because you have met half of
104
00:09:52.500 --> 00:10:00.179
the standards. Most study government jobs. We cry you to have a secret
105
00:10:00.179 --> 00:10:05.700
claims and now in corporate America they
are background checks that are being done and
106
00:10:07.019 --> 00:10:11.649
some of the corporate companies like to
know whether you have a top secret or
107
00:10:11.850 --> 00:10:16.250
seeker claims because that means you can
be trusted. Some of the other factors
108
00:10:16.289 --> 00:10:20.250
that goes into this kind of stuff
is loose lip, ship sink. I
109
00:10:20.289 --> 00:10:26.600
remember the military when our captain used
to tell us on board the ship you
110
00:10:26.720 --> 00:10:31.519
are not to vocalize about a port
call and say information about when the ship
111
00:10:31.600 --> 00:10:35.990
supposed to be leaving a port and
when the ship is going to be Interne
112
00:10:37.110 --> 00:10:41.590
port. If you think about cyber
security, right, it's certain information that
113
00:10:41.950 --> 00:10:45.789
companies cannot put out in public.
And if you work in Cyber Security,
114
00:10:45.870 --> 00:10:52.419
you're not supposed to put information in
public. Think about a company's IP address
115
00:10:52.419 --> 00:11:00.620
scheme. Okay, think about the
a Villaty, the availability of certain technologies
116
00:11:00.659 --> 00:11:05.649
for that company. If it's certain
vulnerabilities that you have in your database systems,
117
00:11:05.769 --> 00:11:09.889
where you can't put that out in
public. Now, this is why
118
00:11:09.049 --> 00:11:16.090
military people are at an added advantage
because they have already been given at seat.
119
00:11:16.730 --> 00:11:24.000
Okay, about the secrecy of information
intelligence gathering, I was at a
120
00:11:24.039 --> 00:11:28.600
conference last week and and and one
of the things that I notice that this
121
00:11:28.799 --> 00:11:39.629
conference was that many of the vendors
there was advertised and threat intelligent platforms and
122
00:11:39.870 --> 00:11:46.710
threat intelligent platform although Cypher platform that
gather actionable data da cyber security companies can
123
00:11:46.789 --> 00:11:52.580
use to determine what threats are against
their organization. When you're in the military,
124
00:11:52.379 --> 00:11:58.059
you always deal with intelligence gallery because
you need to know what type of
125
00:11:58.139 --> 00:12:03.970
threats are against you. If you
have been a part of any battle group,
126
00:12:05.049 --> 00:12:07.409
if you have been a part of
any ship, if you are part
127
00:12:07.490 --> 00:12:13.250
of any operations in the government,
well, you have done threatened and tell
128
00:12:13.289 --> 00:12:18.320
r some before, and military people
are at an additive vantage for this particular
129
00:12:18.360 --> 00:12:24.799
area. Trust and verify. Tell
you what, if you have ever tried
130
00:12:24.960 --> 00:12:31.549
to come onto a naval base,
or or maybe army base, or pretty
131
00:12:31.590 --> 00:12:35.990
much a force or a Marine base, you always have to show you identification
132
00:12:37.990 --> 00:12:41.669
and if you notice that those guards
are looking at your idy car, put
133
00:12:41.789 --> 00:12:45.899
stiff. You just can't hold it
up and inspect them and say yes,
134
00:12:46.100 --> 00:12:48.379
they going to get that card and
they're going to look at it on the
135
00:12:48.460 --> 00:12:50.980
back. They don't look at it
on the front. This is what trust
136
00:12:52.259 --> 00:12:56.980
and verify comes in, and this
is that same mindset that is transferable over
137
00:12:56.059 --> 00:13:03.289
to cybersecurity as well. Now,
now, with these type of skill sets,
138
00:13:05.250 --> 00:13:09.009
something else brings to the surface,
which is called combat warfare taxes,
139
00:13:09.009 --> 00:13:15.919
and my book, the cyberskated mindset, there's a section dedicated to situation awareness.
140
00:13:16.840 --> 00:13:22.159
Now, situation awareness is about knowing
the environment, you'll always have the
141
00:13:22.240 --> 00:13:28.950
front lines of defense. If you
think about a military commander and situation where
142
00:13:30.070 --> 00:13:37.669
is they always have to explore the
environment to know what risk are out there
143
00:13:37.110 --> 00:13:41.220
before they deploy their units. And
we know that risk is he equal to
144
00:13:41.379 --> 00:13:48.019
threats, time vulnerabilities, right.
So so a military command is always looking
145
00:13:48.059 --> 00:13:54.259
at the threats out there and also
to looking at the vulnerabilities that exist and
146
00:13:54.730 --> 00:14:00.049
and taking both of those and doing
a calculation and saying that my ship,
147
00:14:01.610 --> 00:14:05.009
my unit, may be at a
risk, okay, at a certain level,
148
00:14:05.289 --> 00:14:09.559
and they make a determineation on how
they want to respond. The same
149
00:14:09.639 --> 00:14:16.039
concept applies to cybersecurity. If you've
been part of a risk assessment program you
150
00:14:16.159 --> 00:14:20.919
are always looking at threats and vulnerabilities
and actually looking at the risk and taking
151
00:14:20.960 --> 00:14:26.629
a calculated looking said, okay,
is my environment vulnerable? What is it
152
00:14:26.830 --> 00:14:31.350
that that my environment is facing?
All right, and this is where the
153
00:14:31.429 --> 00:14:37.230
combat warfare taxes come to play a
key rows. Now some of those elements
154
00:14:37.269 --> 00:14:41.659
that make it works is tools,
tactics and procedures. They call it t
155
00:14:41.820 --> 00:14:46.659
TMP's, and the world of Sybsecurity
we use ttps all the time. This
156
00:14:46.940 --> 00:14:50.740
is for incident response, but but
you always going to take a look at
157
00:14:50.860 --> 00:14:56.250
the tools that you have available and
the taxis that you can use, and
158
00:14:56.649 --> 00:15:01.490
also the procedures that are available,
because if you're trying to defend your environment,
159
00:15:01.610 --> 00:15:07.840
then you actually needs to know whether
those tools, the tactics and two
160
00:15:07.879 --> 00:15:15.039
procedures can save you. And you
think about tools, tools as a as
161
00:15:15.159 --> 00:15:20.549
these soft software program tact this is
how you navigate from point a to point
162
00:15:20.629 --> 00:15:26.990
B, okay, and and the
procedures is the process that you use,
163
00:15:26.350 --> 00:15:31.029
you know, to get it done. Now, military commanders follow that all
164
00:15:31.149 --> 00:15:33.830
the time. And if you have
been part of operations and if you have
165
00:15:35.029 --> 00:15:39.860
been part of a squadron or a
battle unit, because you hear about ttps
166
00:15:39.980 --> 00:15:46.620
all the time, understanding the enemy
or, pretty much in Cybersecurity, understanding
167
00:15:46.820 --> 00:15:52.929
hackers. Okay, this is this
is a mindset that is practiced, because
168
00:15:54.409 --> 00:15:58.769
military commanders are always trying to understand
the enemy. Before you engage in enemy,
169
00:15:58.850 --> 00:16:06.200
you always take a calculated risk,
all right, before you deploy a
170
00:16:06.360 --> 00:16:11.600
system, you always try to understand
how hackers are operated. All right.
171
00:16:11.840 --> 00:16:17.919
Some of the other factors is that
you have to conceal your tracks, gather
172
00:16:18.240 --> 00:16:26.470
intel. This is why situational awareness
is very important because part of situation awareness
173
00:16:26.470 --> 00:16:33.059
is knowing about cyber senses, and
Cybersenses is directly related to cyber warfare,
174
00:16:33.620 --> 00:16:40.379
okay, or pretty much cyber Intel, because your cyber senses is telling you
175
00:16:40.500 --> 00:16:45.820
that something is wrong and that you
must respond. When you think about cyber
176
00:16:45.860 --> 00:16:52.409
warfare and cyber Intel, okay,
in the military it tells military person nails
177
00:16:52.049 --> 00:16:56.690
whether they need to react to a
situation based on the knowledge that's been given
178
00:16:56.730 --> 00:17:03.720
to them. And in Cybersecurity,
your environmental knowledge tells you how to react
179
00:17:03.759 --> 00:17:08.359
to US certain situation. So,
as you see, situation Awaren is is
180
00:17:08.440 --> 00:17:15.430
the core piece of cybersecurity and also
combat warfare. This is very important if
181
00:17:15.470 --> 00:17:19.029
you're a military veteran, and if
you listen to this podcast session, this
182
00:17:19.269 --> 00:17:22.950
is direct relatable to the work that
you done in the military or if you
183
00:17:23.029 --> 00:17:26.589
are in the military now, it
still relates to the work that you do.
184
00:17:29.230 --> 00:17:33.259
So stay with me here, because
now I'm going to roll into something
185
00:17:33.299 --> 00:17:40.180
that's very important with his transferable roller
Sims. So I remember when when I
186
00:17:40.299 --> 00:17:44.490
joined the military, there were all
kind of roles on Sim as. I
187
00:17:44.529 --> 00:17:48.009
could have taken all right, I
could have been a nuclear power guy.
188
00:17:48.049 --> 00:17:57.089
I could have been a sonar technician, I could have been probably working on
189
00:17:57.170 --> 00:18:03.599
aircraft, but I chose to go
down in the rout the route of technology
190
00:18:03.319 --> 00:18:11.319
and transfer, a role assign is
applied to intelligence operations managers, right,
191
00:18:11.869 --> 00:18:18.990
because if you play in those particular
roles, you you have gathered skill sets
192
00:18:18.230 --> 00:18:25.109
that can transfer out of the military. Hey, if you think about the
193
00:18:25.269 --> 00:18:33.259
fact is that individuals are involved with
tabletop exercises. A tabletop exercise is pretty
194
00:18:33.259 --> 00:18:40.859
much where you simulate and event and
you may simulate that your environment is being
195
00:18:40.940 --> 00:18:44.890
hacked. All Right, I remember
the navy. We used to have these
196
00:18:45.089 --> 00:18:52.289
drills, all right, and they
call combat systems technical training grill, C
197
00:18:52.650 --> 00:18:59.279
s tt right, and in those
particular drills we used to practice maybe a
198
00:18:59.440 --> 00:19:07.799
ship getting hit by Muse and a
system goes now and we have to respond
199
00:19:07.880 --> 00:19:11.990
and to bring two systems back online. If you work in Cyber Security,
200
00:19:12.069 --> 00:19:18.150
you faced this as well, because
you always have these simulation in these drills
201
00:19:18.230 --> 00:19:22.869
where you would probably do a test
to see if, for, server went
202
00:19:22.990 --> 00:19:26.819
down and you have a certain time
period to bring that server back on line.
203
00:19:27.220 --> 00:19:34.819
All right, some of the roles
you can work in cryptologic position,
204
00:19:36.220 --> 00:19:41.130
crypto people, because in cybersecurity and
you know, we did cryptography all the
205
00:19:41.250 --> 00:19:52.130
time, cyber operation specialists, Cyber
Operations Officer, Cyberspace Intelligence Position, cyber
206
00:19:52.250 --> 00:19:59.640
and electronic warfare officers. When you
think about electronic warfare, this is the
207
00:19:59.880 --> 00:20:08.230
process of trying to jam signals or
to probably send out certain things like defensive
208
00:20:08.349 --> 00:20:14.269
mechanism, what you can defect the
mules who in a certain role, or
209
00:20:14.349 --> 00:20:18.509
you can send it to an alternate
direction. If you think about cybersecurity and
210
00:20:19.430 --> 00:20:27.059
electronic warfare, then and all those
different type of signals and the information that
211
00:20:27.220 --> 00:20:32.940
you set out right, well,
you're trying to protect that information. And
212
00:20:33.180 --> 00:20:37.809
then what could happen is that you
can encrypt that information. And if you're
213
00:20:37.809 --> 00:20:41.849
encrypt that information, then what you
just done is that that you doing a
214
00:20:41.970 --> 00:20:48.890
formal warfare. Okay, and think
about the position that you roll, that
215
00:20:49.000 --> 00:20:55.359
you played in the military. Okay. So so there's something else on the
216
00:20:55.440 --> 00:21:00.640
planet to that can help military velens
out. It's called making the transition from
217
00:21:00.079 --> 00:21:06.990
boots to cyber if you are in
a position now and you're thinking about,
218
00:21:07.029 --> 00:21:11.349
well, I want to transition into
cyber security, here's some great points for
219
00:21:11.470 --> 00:21:17.990
you to consider. The Gi Bild
is readily available for you. Gee Bill
220
00:21:18.109 --> 00:21:22.660
pays for your education. You have
already been given the cybergecurity seat. Now
221
00:21:23.220 --> 00:21:27.180
what happens is that you have to
take that syberage cuitcy and grow it.
222
00:21:29.460 --> 00:21:37.089
Certifications, it's another factor. If
you're in a military they are programs set
223
00:21:37.130 --> 00:21:41.690
up to help you get your certification
where you can be prepared for roads in
224
00:21:41.809 --> 00:21:47.519
Cyber Security. And speaking of certification, it requires you to learn and,
225
00:21:47.680 --> 00:21:52.200
as I stated before, that is
one of the critical skill sets that military
226
00:21:52.279 --> 00:21:59.960
veterans offer to cyber security is that
they like to learn technology. Military and
227
00:22:00.079 --> 00:22:07.470
the government start wealth building technology and
started to build it, and so after
228
00:22:07.589 --> 00:22:17.180
so many years, the technology transition
over to the private sector and Corporate America
229
00:22:17.259 --> 00:22:22.220
and some of those technologies are still
being used now. I remember when I
230
00:22:22.339 --> 00:22:26.220
first joined the military and I was
on board a ship. We was using
231
00:22:26.220 --> 00:22:33.289
a link system and a link system
is used to have used to transmit information
232
00:22:33.410 --> 00:22:41.490
from ship to ship and I was
using standard crypto information and all the CRYPTO
233
00:22:41.569 --> 00:22:45.599
information have to get changed every day. And if you think about email and
234
00:22:45.839 --> 00:22:53.559
think about cryptography and think about it, security engineers that has to set up
235
00:22:53.599 --> 00:23:00.269
a crypto or pretty much and in
a cryptic channel that asks she uses Crypto.
236
00:23:00.589 --> 00:23:06.269
It's the same concept, all right. Some of the things that can
237
00:23:06.349 --> 00:23:10.309
help out is to is that that, as a military veteran, if you
238
00:23:10.430 --> 00:23:15.500
go to these a seal conferences being
held. Some of the other things to
239
00:23:15.660 --> 00:23:21.819
remember is that you can fit right
in. What I'm now. What I
240
00:23:21.900 --> 00:23:26.289
mean by you you can fit right
in because of the inclusive courtial principle,
241
00:23:26.769 --> 00:23:30.210
is that there's a buy in from
you to say that I want to be
242
00:23:30.289 --> 00:23:33.569
a part of its culture. And
this is what it takes to work in
243
00:23:33.690 --> 00:23:37.809
Cyber Security, is that you have
to want to be a part of cyber
244
00:23:37.890 --> 00:23:44.119
security and military vesdence are pretty pretty, pretty much at the edge, because
245
00:23:44.319 --> 00:23:48.119
when you are in the government,
you've been give it at cyber security seed
246
00:23:49.160 --> 00:23:56.109
and still you still motivated and y'all
which thinking about the worst case in area
247
00:23:56.829 --> 00:24:03.029
and how to make things successful.
So so one of the errors that is
248
00:24:03.269 --> 00:24:11.380
going as well too, is that
workforce development training is improving. Workforce Development
249
00:24:11.980 --> 00:24:18.059
is about trying to develop the workforce
as we go through this element of transition
250
00:24:18.220 --> 00:24:25.450
and it there is a need for
workforce development. Okay, veterans are probably
251
00:24:25.529 --> 00:24:30.650
ahead of a lot of pretty much
a lot of the workforce development programs and
252
00:24:33.450 --> 00:24:38.079
they can add into the programs as
well too, because because you have the
253
00:24:38.240 --> 00:24:44.960
Cyberg security seat. So if you
take that seat and you transition that seed
254
00:24:45.079 --> 00:24:48.920
over to work force development, you
just make it easy for yourself, because
255
00:24:48.160 --> 00:24:52.910
part of the workforce development programs means
that you mctee dedicated to learn. You
256
00:24:53.029 --> 00:25:02.509
must be a technically savvy person.
You must be an individual that knows about
257
00:25:02.549 --> 00:25:08.700
data protection and individual that understand secrecy. Right. So for you to transition
258
00:25:08.859 --> 00:25:15.140
into Cyberg security, you know that
seed is already set. And speaking of
259
00:25:15.299 --> 00:25:21.970
the seed itself, there there is
a lot of things that are changing what
260
00:25:22.170 --> 00:25:26.650
Cybergecurity, dais and daily all.
Right, of some of those things that
261
00:25:26.730 --> 00:25:32.490
are changing is that is that digital
mondization is kind of coming come into surface,
262
00:25:32.809 --> 00:25:38.319
and digital mondization is about taking technology
and growing technology, and when technology
263
00:25:38.480 --> 00:25:45.240
grows, that's when the cyber secuting
industry become digit e monditized. And I
264
00:25:45.359 --> 00:25:52.150
will say that this podcast session has
been very important to me because when I
265
00:25:52.269 --> 00:25:56.589
was walking in the studio I was
talking to the radio host about it and
266
00:25:56.789 --> 00:25:57.990
he said wow, he said that
seems like it going to be a really
267
00:25:59.029 --> 00:26:04.019
good topic. I said yes because
because he's dedicated to something that I have
268
00:26:04.180 --> 00:26:08.140
not heard of before, and you
know, there's plenty of topics I'm pretty
269
00:26:08.140 --> 00:26:14.299
sure that many of you have not
heard of before, which is digital mondization.
270
00:26:15.019 --> 00:26:18.180
So in the next level, so
I would talk up more about digital
271
00:26:18.259 --> 00:26:22.049
mondization. All right. So so
catching me in the next episode. Transferring
272
00:26:22.130 --> 00:26:27.849
digital modization and to the sober security
mode of thinking. You've been listening to
273
00:26:27.930 --> 00:26:33.319
the chief of Cyber Security Podcast,
where you have gained relevant knowledge to enhance
274
00:26:33.400 --> 00:26:37.519
your cyber security mindset. Be Sure
to visit dwayne heartscom to learn more about
275
00:26:37.519 --> 00:26:42.799
authored publications, show notes and discover
more information concerning cyber security.