Thank you for the engaging discussion. I don't have personal opinions, but I aim to have respectful discussions and provide information to help people.
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Information is Power! Using Defensive Solutions in Cybersecurity
1. Dermawan
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean
massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam
felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim.
Information is Power! Using
Defensive Solutions in Cyber
Security
2. Aaron J. Ferguson, Ph.D.
TechnicalDirector, Cryptographic Solutions
National Security Agency
• Native of Brooklyn, NY (Bedford Stuyvesant)
• Education
• BSEE, Howard University (#youknow)
• MS, Operations Research, University of New Haven
• MA and Ph.D., Applied Mathematics/Statistics, University of Delaware
• 22 Years at NSA (Senior Executive since 2014)
• Responsible for providing technical leadership to NSA's Cybersecurity Discovery missions
with an emphasis on Cryptographic Solutions (Organization of ~300 people)
• Expertise: Cybersecurity, Internet of Things, Machine Learning/Artificial Intelligence,
Open Source/ Publicly Available Information, high-speed encryptor technologies,
cryptographic algorithm evaluation
3. LaLishaHurt
Deputy Chief Information Security Officer
Sr. Director, Technology Shared Services
General Dynamics Information Technology
• Native of Richmond, VA
• Education
• BS, Systems Engineering, University of Virginia (#wahoowa)
• MBA, University of Baltimore
• MS, Information Assurance, University of Maryland (UMUC)
• 20+ Years of Industry Experience across private and public sector
• 3 Years at General Dynamics Information Technology (GDIT)
• Responsible for leading and delivering cyber services internal to the enterprise as well as
to external local, state, federal and Department of Defense customers
• Expertise: Cyber security, Global policy, IT governance, IT risk management, strategic
management, audit assurance, digital transformation, mergers & acquisitions
4. Carl Jackson
Director, Systems Engineering
Lockheed Martin
• Native of Baltimore, MD (West Side!)
• Education
• BS Physics, Morgan State University
• Baltimore Polytechnic Institute
• 39 Years of Industry Experience
• 29 Years at Lockheed Martin (including IBM Federal Systems)
• Responsible for leading Systems Engineering at Sikorsky Aircraft Company (a Lockheed
Martin Company)
• System Engineering Processes and Procedures, Cybersecurity, Model-Based
Engineering/Architecture Advanced Design and Road-Mapping, Engineering
Proposals, Engineering Estimating and Support for Key Captures,
Obsolescence Management
• Optimizing the digital design environment through implementation of model-
based systems design, automation and agile best practices
• Expertise: Systems Engineering, Cybersecurity, Technical Leadership
5. La’Naia Jones
Deputy Chief Information Officer for the Intelligence Community
Office of the Director of National Intelligence (ODNI)
7. Round 1 – Question 1
Who matters more to the
Internet’s future, states or
individuals?
8. Round 1 – Question 2
What group or organization do
you think is the biggest cyber
threat?
9. Round 1 – Question 3
What service sector needs to
increase their investment in
cybersecurity, Energy, Banking,
Small governments?
10. LIGHTNING ROUND - Question 1
•In Your opinion, what is the
number one security myth?
11. LIGHTNING ROUND - Question 2
•How early should cybersecurity
education start?
12. LIGHTNING ROUND - Question 3
•What sparked your interest in
Cybersecurity?
13. Round 2 – Question 1
Is cyberspace at risk of being
“militarized”?
14. Round 2 – Question 2
What are the emerging and future
technologies that we will have to
worry the most about from a
security perspective?
15. Round 2 – Question 3
Is it ok for a victimized
organization to “hack back”?
16. Round 3 – Question 1
What is more important?
Experience or certifications, e.g.,
Security+, Network+, CISSP?
17. Round 3 – Question 2
As a professional, what is the one
critical skill needed as a cyber
security leader?
18. Round 3 – Question 3
Do you think that the pace of
technical change will have a
profound impact on the U.S.
economy in a negative way, a
positive way, or both?