76 min listen
#051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is Difficult
#051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is Difficult
ratings:
Length:
52 minutes
Released:
Apr 24, 2018
Format:
Podcast episode
Description
https://www.linkedin.com/in/robmichaellee/ (Robert M. Lee) is the CEO and Founder of the industrial (ICS/IIoT) cyber security companyhttp://dragos.com/ ( Dragos, Inc). He is also a non-resident National Cybersecurity Fellow at https://www.newamerica.org/cybersecurity-initiative/ (New America) focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of http://passcode.csmonitor.com/influencers (Passcode’s Influencers), awarded EnergySec’s Cyber Security Professional of the Year (2015), and inducted into http://www.forbes.com/pictures/mll45klmm/robert-lee-27/ (Forbes’ 30 under 30) for Enterprise Technology (2016).
A passionate educator, Robert is the course author of http://www.sans.org/course/industrial-control-system-active-defense-and-incident-response (SANS ICS515) – “ICS Active Defense and Incident Response” with its accompanying GIAC certification GRID and the lead-author of https://www.sans.org/course/cyber-threat-intelligence (SANS FOR578) – “Cyber Threat Intelligence” with its accompanying GIAC GCTI certification.
Robert obtained his start in cyber security in the U.S. Air Force where he served as a Cyber Warfare Operations Officer. He has performed defense, intelligence, and attack missions in various government organizations including the establishment of a first-of-its-kind ICS/SCADA cyber threat intelligence and intrusion analysis mission.
In this episode we discuss threat hunting, SCADA/ICS, IIoT, IoT security, his start in cyber security, the https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/ (2015 Ukrainian power grid attack), starting and teaching a SANS ICS class, advice he would give someone starting in the industry, and https://q22018.hacknyc.com/en/ (HACKNYC), and so much more.
Where you can find Robert:
https://www.linkedin.com/in/robmichaellee/ (LinkedIn)
https://twitter.com/RobertMLee (Twitter)
http://www.robertmlee.org/ (Blog)
A passionate educator, Robert is the course author of http://www.sans.org/course/industrial-control-system-active-defense-and-incident-response (SANS ICS515) – “ICS Active Defense and Incident Response” with its accompanying GIAC certification GRID and the lead-author of https://www.sans.org/course/cyber-threat-intelligence (SANS FOR578) – “Cyber Threat Intelligence” with its accompanying GIAC GCTI certification.
Robert obtained his start in cyber security in the U.S. Air Force where he served as a Cyber Warfare Operations Officer. He has performed defense, intelligence, and attack missions in various government organizations including the establishment of a first-of-its-kind ICS/SCADA cyber threat intelligence and intrusion analysis mission.
In this episode we discuss threat hunting, SCADA/ICS, IIoT, IoT security, his start in cyber security, the https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/ (2015 Ukrainian power grid attack), starting and teaching a SANS ICS class, advice he would give someone starting in the industry, and https://q22018.hacknyc.com/en/ (HACKNYC), and so much more.
Where you can find Robert:
https://www.linkedin.com/in/robmichaellee/ (LinkedIn)
https://twitter.com/RobertMLee (Twitter)
http://www.robertmlee.org/ (Blog)
Released:
Apr 24, 2018
Format:
Podcast episode
Titles in the series (100)
#005 – Morgan Wright: The Rule of Threes by Cyber Security Interviews