BSidesAugusta 2024

BSidesAugusta 2024

The Four Books that every cyber security expert should read
2024-10-05 , Track 3

Can you be a cyber security expert without knowing the fundamentals and history of cybersecurity?
What will be the next life changing event in Cybersecurity? Will you be able to help prevent it or will you be the one to help clean up afterwards?

The cyber wars started 50 years ago and who knows how it will end?
Have all the easy problems in Cyber been solved and the next generation will be faced with an onslaught of Unknown Unknowns?
Others faced the unknowns and they succeeded. Will you be ready?

These four non-technical books (plus a Bonus Pamphlet) might make you reconsider your heavy reliance on technology and recognize the basic principles employed by those that came before you and ponder the hypothesized future.

.. NBS/ACM 1974 Executive Guide to Computer Security. (Bonus Pamphlet)
1. The Cuckoo's Egg. The true adventure of Cliff Stoll creating forensics and cybersecurity infrastructure on the fly and from scratch in the 1980s
2. The Hut Six Story: Breaking the Enigma Codes. What happened at Bletchley Park by one of the co-inventors of traffic analysis.
3. The Fifth Domain by Richard A. Clarke. An outline for how to defend our national infrastructure and online economy from an attack, written from the perspective of using military defense strategies.
4. One Second After. What the world might look like the first year after an attack on our national infrastructure and online economy.

Interested in educating tomorrow’s leaders in Cybersecurity.
In 2021 I left the traditional workforce after 40+ years in IT and cybersecurity implementation and management.

My newly discovered energy is to encourage college and high school students to enter the Cybersecurity family. I am an Adjunct Professor of Cybersecurity at the University of South Carolina Aiken, and independent contractor and lecturer. I believe that like cybersecurity systems, students should have “security built-in” through an early introduction in the curriculum, and participation in professional organizations like National Cybersecurity Student Association, ISC2, ISSA, and SANS. I also feel strongly that students should obtain certificates prior to entering the workforce.

My career was primarily with large contractors in the US Government sector. The last 15 years took me on an exciting bottom to top journey planning, implementing, maintaining, and managing (as ISSO/ISSM) complex cybersecurity systems for two large facilities. These efforts included creation of policy and procedures, selecting, building and configuring technology infrastructure, production operations, and compliance monitoring prior to turnover to the Government customer.