Retired Army Colonel John Mills
👤 PersonAppearances Over Time
Podcast Appearances
But then also, I wrote a piece on that because contact lists are complex databases and even without malicious behavior, they can become confused. The databases can become confused, especially when you're using them across multiple platforms. Guess what?
But then also, I wrote a piece on that because contact lists are complex databases and even without malicious behavior, they can become confused. The databases can become confused, especially when you're using them across multiple platforms. Guess what?
Even without malicious behavior, they can start transferring data and messing up contact lists and the- I mean, honestly, I think a lot of people out there in the general population have had that experience, right?
Even without malicious behavior, they can start transferring data and messing up contact lists and the- I mean, honestly, I think a lot of people out there in the general population have had that experience, right?
Even without malicious behavior, they can start transferring data and messing up contact lists and the- I mean, honestly, I think a lot of people out there in the general population have had that experience, right?
I was brought into the cyber world in 2006 by my NSA boss. I didn't work for NSA, but he needed a planner. He didn't need a career IT person who had knuckledragged or had spent all their life connecting and disconnecting cables. I mean, he needed a planner to be the senior department defense representative to the interagency program called the Comprehensive National Cybersecurity Initiative.
I was brought into the cyber world in 2006 by my NSA boss. I didn't work for NSA, but he needed a planner. He didn't need a career IT person who had knuckledragged or had spent all their life connecting and disconnecting cables. I mean, he needed a planner to be the senior department defense representative to the interagency program called the Comprehensive National Cybersecurity Initiative.
I was brought into the cyber world in 2006 by my NSA boss. I didn't work for NSA, but he needed a planner. He didn't need a career IT person who had knuckledragged or had spent all their life connecting and disconnecting cables. I mean, he needed a planner to be the senior department defense representative to the interagency program called the Comprehensive National Cybersecurity Initiative.
And so, we learned a lot of things in that, but we learned about offense, we learned about defense, but again, velocity is important. You've got that, what you brought up several times is so important.
And so, we learned a lot of things in that, but we learned about offense, we learned about defense, but again, velocity is important. You've got that, what you brought up several times is so important.
And so, we learned a lot of things in that, but we learned about offense, we learned about defense, but again, velocity is important. You've got that, what you brought up several times is so important.
If you are doing so good in security that everything is just so clamped down that, you know, oh boy, well, you know, and let's not even talk about people using end arounds just to try to accomplish the mission, but you got it so clamped down that it's so complex to do anything. Well, guess what? The enemy is accomplishing their objectives anyway because they've shut you down.
If you are doing so good in security that everything is just so clamped down that, you know, oh boy, well, you know, and let's not even talk about people using end arounds just to try to accomplish the mission, but you got it so clamped down that it's so complex to do anything. Well, guess what? The enemy is accomplishing their objectives anyway because they've shut you down.
If you are doing so good in security that everything is just so clamped down that, you know, oh boy, well, you know, and let's not even talk about people using end arounds just to try to accomplish the mission, but you got it so clamped down that it's so complex to do anything. Well, guess what? The enemy is accomplishing their objectives anyway because they've shut you down.
And this is a hard thing for the career CIO or chief information officer or chief information security officer to get their heads around because they're going to, we're coming up with the perfect scenario. Remember CIOs and CISOs, you are not the main thing. You are an enabler to the main thing.
And this is a hard thing for the career CIO or chief information officer or chief information security officer to get their heads around because they're going to, we're coming up with the perfect scenario. Remember CIOs and CISOs, you are not the main thing. You are an enabler to the main thing.
And this is a hard thing for the career CIO or chief information officer or chief information security officer to get their heads around because they're going to, we're coming up with the perfect scenario. Remember CIOs and CISOs, you are not the main thing. You are an enabler to the main thing.
So you do have to consider ease of use because what you do is if you make it so difficult, either people are not getting anything done or- People are going around and creating opportunities.
So you do have to consider ease of use because what you do is if you make it so difficult, either people are not getting anything done or- People are going around and creating opportunities.
So you do have to consider ease of use because what you do is if you make it so difficult, either people are not getting anything done or- People are going around and creating opportunities.