Gary Berman, Founder & Host of The "Cyber Hero Adventures Show" at cyberheroescomics.com. Creator of The CyberHero Adventures: Defenders of the Digital Universe
I write often on this page about the shortage of cybersecurity experts compared to businesses' need for them. About 500,000cybersecurity jobs are going unfilled in this crucial industry. As we consider the nation's evolving cybersecurity and national security needs, one group always comes to mind: U.S. service veterans. Why? Because their military training and experience uniquely equip them to transition into the cybersecurity industry. That's one reason the Cyber Hero vCISO Network will work with veterans as we serve the cybersecurity needs of SMEs nationwide. Watch this recent interview I did with Antonio "T" Scurlock, himself a retired Naval (Information Warfare qualified) Officer. Learn about his work to help veterans through the National Initiative for Cybersecurity, Careers and Studies.
Antonio "T" ScurlockNeil KhatodAlan VarbelBob Turner#cybersecurity#cybersecurityexperts#veterans#CISO#vCISO#sme#smebusiness#leadership#leadershipdevelopment#cyberresilience
Hi everyone. This is Gary Berman and host of the Cyber Hero Adventure Show doing our first ever Man on the Street interview. So if you hear the cars and you feel this like sort of chilly, it's because we're two men actually on the street. And what a privilege to introduce Anthony Skirlaugh, otherwise known as tea to to our Amish. You want to say hi and maybe you can tell us a little bit about your origin story because it's incredibly interesting. Yeah. Hey, look, I appreciate it, Gary. Thank you for this opportunity, and honestly this is probably the coolest thing I've ever done. That being said, absolutely on the street, you know I work in the cyber security. I am a employed by one of the federal agencies that handles that aspect. I'm currently in an academic role also I'm looking at aspects of that. So from an origin story from North Carolina to DC, it's been a pretty pretty good 2420 years of that was in the military department of Navy, retired. Loved it. Retired out of United States Cyber Command. Went on to engage and work with Department of Homeland Security and now again doing a partnership with Homeland Security and Department of Defense in my academic role. So I mean that's that's it in a nutshell. Well, I mean like many of the folks that we're privileged to have on our show, you're very humble, you know, and and so you know I'm behalf of a grateful digital universe. Thanks for who you are and for what you do and and and why you do it. Well, I couldn't help but noticing. DAV, do you wanna explain to our audience? Yeah, yeah, absolutely. I'm a life member of the Disabled American Veterans. You know, I I chose that, that organization that engaged and helps veterans because honestly, to work there, you have to actually be a Disabled American veteran. And who knows our situation, our engagements and what we go through to receive the various benefits that we've earned over time. Indeed. Then folks who have gone through the process, so. You know, shout out always to Disabled American Veterans as an organization and they've been wonderful for me and my journey as a disabled vet to acquire the benefits that I believe that we've earned over time. You know, just to build on that point, you know, one of the kind of untapped talent pools in cybersecurity, you know our veterans, there are many wonderful programs, you know, to upskill and and things like that. But one of the things we're working to do in the Cyber Hero VC cell network is to help them but. Also for small to medium businesses, right, so that it's easier for them to to to get started. So you know, what's your assessment of let's say veteran's ability or challenge is with getting their foot in the door and transferring their skills, you know, into the commercial sector, right. Well, you know, one thing that if I could say or put a bug in anyones ear who's contemplating leaving the service for whatever the reasons to be the transition assistance program for all the services to me. Has. Markedly changed. They understand the environment that we're going into. They understand you know the changes that folks are going to have to go through from coming out of uniform and going into a suit or or whatever your desire is when you leave the service. So I would absolutely say look. Attend one just to attend 1A transition assistance program engagement. Then couple years out, if you're thinking about it even a little bit, attend again. And then when you're out, attend again. Six months out, attend again. Go in and constantly keep your updates on what's going on in the community and what's going on in the private sector because things change. And these assistance programs are there to help veterans make that transition. Indeed. And I'll repeat what I said earlier on behalf of a grateful digital universe. TA things for who you are and for what you do and why you do it. Actually, Gary, look, I appreciate it. And actually that is probably one of the most things that I'm most passionate about is veterans and their ability to transition into the next life.
Named "Top Tech Person To Follow" by LinkedIn, Voted "Cybersecurity Person of the Year" Cited Top 10 Global Tech & Cyber Expert & Influencer, Georgetown U Prof, 2X Presidential Appointee, FORBES Writer, 119k LI Followers
You know about the shortage of cybersecurity experts compared to businesses' needs. About 500,000 cybersecurity jobs are going unfilled in this crucial industry. As we consider the nation's evolving cybersecurity and national security needs, one group always comes to mind: U.S. service veterans. Why? Because their military training and experience uniquely equip them to transition into the cybersecurity industry. That's one reason the Cyber Hero vCISO Network will work with veterans as we serve the cybersecurity needs of SMEs nationwide. Watch this recent interview Gary Berman did with Antonio "T" Scurlock, a retired Naval (Information Warfare qualified) Officer. Learn about his work to help veterans through the National Initiative for Cybersecurity, Careers and Studies.
Antonio "T" ScurlockNeil KhatodAlan VarbelBob Turner
#cybersecurity#cybersecurityexperts#veterans#CISO#vCISO#sme#smebusiness#leadership#leadershipdevelopment#cyberresilience
🌟 Deep Dive into Inventory and Control of Enterprise Assets - CIS Control 1 🌟
In cybersecurity, the foundation of a robust defense strategy starts with a thorough understanding and management of enterprise assets. CIS Control 1 emphasizes the critical role of maintaining a comprehensive inventory of these assets, which includes everything from hardware devices to virtual environments. This control is not just about cataloging assets but also about understanding their function, interconnectivity, and the potential risks they pose. A well-maintained inventory is crucial in identifying vulnerabilities and ensuring that every network component is under the security umbrella.
📘 My course on Cybrary.it delves into the intricacies of this control, offering a step-by-step guide to effectively managing enterprise assets. It covers strategies for maintaining an up-to-date asset inventory and leveraging this information to bolster your cybersecurity defenses. Join this course to gain insights into one of the most fundamental aspects of cybersecurity management.
🔗 Explore the Course on Cybrary for free: https://lnkd.in/gqkkaYCM#usarmy#usmarines#usmc#usairforce#airforce#usnavy#navy#uscg#coastguard#military#veterans#informationsecurity#cybersecurity#technology#future#careers#socialmedia#strategy#leadership#inspiration#success#CyberSecurity#CISControl1#EnterpriseAssets#CybraryCourses
The Foundation for Defense of Democracies (FDD) published a study highlighting a mismatch in the U.S. military’s failure to recruit, train, promote, and retain talented #cyber warriors. This comes as the Army, Navy, Air Force, and Marines each run their own recruitment, training, and promotion systems instead of having a single pipeline for talent. The FDD study highlighted that the result is a shortage of qualified personnel in the U.S. Cyber Command (CYBERCOM), responsible for both the offensive and defensive aspects of military cyber operations.
Evidently, America’s #cyberforce generation system is clearly broken. Fixing it demands nothing less than the establishment of an independent cyber service.
“The inefficient division of labor between the Army, Navy, Air Force, and Marine Corps prevents the generation of a cyber force ready to carry out its mission. Recruitment suffers because cyber operations are not a top priority for any of the services, and incentives for new recruits vary wildly,” Erica Lonergan and RADM (Ret.) Mark Montgomery, wrote in a Monday post for the FDD. “The services do not coordinate to ensure that trainees acquire a consistent set of skills or that their skills correspond to the roles they will ultimately fulfill at #CYBERCOM.”
They also identified that promotion systems often hold back skilled cyber personnel because the systems were designed to evaluate service members who operate on land, at sea, or in the air, not in cyberspace.
#Threatlandscape#CyberSkill#Threatintelligencehttps://lnkd.in/g-UxmtMR
The Foundation for Defense of Democracies (FDD) published a study highlighting a mismatch in the U.S. military’s failure to recruit, train, promote, and retain talented #cyber warriors. This comes as the Army, Navy, Air Force, and Marines each run their own recruitment, training, and promotion systems instead of having a single pipeline for talent. The FDD study highlighted that the result is a shortage of qualified personnel in the U.S. Cyber Command (CYBERCOM), responsible for both the offensive and defensive aspects of military cyber operations.
Evidently, America’s #cyberforce generation system is clearly broken. Fixing it demands nothing less than the establishment of an independent cyber service.
“The inefficient division of labor between the Army, Navy, Air Force, and Marine Corps prevents the generation of a cyber force ready to carry out its mission. Recruitment suffers because cyber operations are not a top priority for any of the services, and incentives for new recruits vary wildly,” Erica Lonergan and RADM (Ret.) Mark Montgomery, wrote in a Monday post for the FDD. “The services do not coordinate to ensure that trainees acquire a consistent set of skills or that their skills correspond to the roles they will ultimately fulfill at #CYBERCOM.”
They also identified that promotion systems often hold back skilled cyber personnel because the systems were designed to evaluate service members who operate on land, at sea, or in the air, not in cyberspace.
#Threatlandscape#CyberSkill#Threatintelligencehttps://lnkd.in/g-UxmtMR
Sr. Business Development Manager at EC-Council | B2B/B2C Sales Expert | Award Winning Sales Professional | Zero-to-One Creator | Lead Generation Specialist | Mastered International Sales | #CybersecurityProfessional
Connections are key. Got to talk cybersecurity and trade sea stories with a fellow Navy Veteran. Both Prowler guys turned cyber and information security geeks - he fixed’em, and I flew [in] them.
There’s a sayong at USNA (and probably similar at the other Academies) - “Wherever two or three shall meet…”
I find that goes beyond the Service Academies and extends to the Veteran Community as a whole. Doesn’t matter what service or job, officer or enlisted, or when you served. Fobbit, POG, or Grunt - it doesn’t matter. Instant bond and sea (or field) stories abound.
We talked cybersecurity, primarily “securing the human”, and when the work was done, traded sea stories and compared our Navy experience.
And I’ll put this out there - former EW folks - especially those of us that were on the EA side - make good cyber security pros.
🔥𝗙𝗥𝗘𝗘 𝗢𝗣𝗣𝗢𝗥𝗧𝗨𝗡𝗜𝗧𝗬!🔥
Transition smoothly into the cybersecurity industry with Fortinet's Education Outreach program.
They recognize the incredible skills and commitment our military veterans bring, and we want YOU to succeed in the world of cybersecurity.
What's in Store for You?
Free Cybersecurity Training: Access self-paced, online training to equip yourself with the skills employers are looking for.
Why Cybersecurity?
Problem-Solving: Leverage your innate problem-solving skills.
Defense Posture: Understand the importance of maintaining a strong defense.
Tech Training: No technical experience? No problem! They've got you covered with tailored training.
This is YOUR chance to launch a fulfilling career in cybersecurity.
Don't miss out on the chance to join over 3000 veterans and military spouses who've successfully transitioned with Fortinet.
Learn more or start training here 👉 https://lnkd.in/ezR6mqq7#All#ActiveDuty#TransitioningMilitary#MilitarySpouses#Reservists#Veterans#ACTNowEducation
How do I balance Army grit vs. Air Force cyber security ops?
ArmyVsAirforce #MilitaryCareerChoices#CyberSecurity
Balancing the opportunities offered by different branches of the military is no small feat, especially when considering the contrasting futures provided by the Army and the Air Force. If you're in the same boat as many high school graduates—fit, with a stellar ASVAB score, and torn between a high-adrenaline military life and a tech-savvy career—read on! This article will guide you through balancing the rugged experienc...
Read more: https://lnkd.in/gzy27yv6
Today's Two Minute Cyber Topic: Post-Incident Activities and Learning, August 25th, 2023
Today, let's discuss the concluding phase of Incident Response in #Cybersecurity🔒 - Post-Incident Activities and Learning. This phase is essential for improving future response efforts and preventing similar incidents.
You might ask, "What happens after an incident is resolved❓" Organizations need to conduct a post-incident review or "lessons learned" meeting. This meeting should analyze what happened, what was done to intervene, and what can be done better next time.
Documenting these findings is essential. This documentation should be accessible and used to update the Incident Response Plan. This cycle of learning and improving is central to evolving an organization's cybersecurity posture.
Beyond internal review, there may be legal or regulatory requirements for disclosure depending on the nature of the incident. Communicating with stakeholders and possibly reporting to regulatory bodies can be crucial steps in the post-incident phase.
Stay tuned for more in-depth knowledge on Cybersecurity this week. Remember, knowledge is power! 💪
Also, we will post a combined rollup article to the Cyber SPEAR newsletter that adds more depth to the daily topics on Friday. Subscribe to SPEAR on LinkedIn at https://lnkd.in/g5cKvYgF
Please follow Jason & Griffin to learn more about Cybersecurity!
Follow Jason: https://lnkd.in/gWxkRDVV
Follow Griffin Weaver: https://lnkd.in/gaanC4UV#InfoSec#DataProtection#DigitalSecurity#TechTalk#informationsecurity#cybersecurity#technology#careers#strategy#leadership#success#cyber#usarmy#usmarines#usmc#usairforce#airforce#usnavy#navy#uscg#coastguard#military#pilot#veterans#airlineindustry#cyber#security
CISO | Chief of CISO Services | Veterans Outreach lead at Hays Americas Extensive experience leading technical teams: Former COO, CEO, CIO, and CISO
5moGreat advice! Take advantage of the opportunities as transition is tough!