Hacked. Or, How to Become a Four-Star General

images?q=tbn:ANd9GcRDF4aWqyqWWlRZrQCjYq2_rOjJFbl0IE-7hzBhtYJm8stsARTX

Retired Gen. Keith Alexander is best known as the man at the center of the National Security Agency (NSA) metadata collection program, revealed by whistleblower Edward Snowden. Speaking at the RSA Conference on April 24, Alexander talked about his life after retiring from the NSA in 2014.

Alexander was onstage with Ted Schlein, partner at Kleiner Perkins Caufield & Byers, who asked the former director of the NSA how he became a four-star general. It was all due to a hack, Alexander said.

"Someone hacked into the Department of Defense [DoD] network," he said.

What had happened is that the NSA saw some information from the Department of Defense in foreign space where it should not have been.
"At the time, NSA was not able to look into the DoD network," Alexander recounted. "After 10 days, we were allowed in and found 1,500 pieces of malware."

Alexander said that the malware was discovered on a Friday afternoon and within 24 hours, a plan was put in place to correct the issues and build a better system. At the time, he said, Russia was blamed for the incident. As a result of that incident, US Cyber Command was formed, in June 2009, and Alexander got his fourth star.

There was also some discussion about Snowden. Alexander was asked by Schlein if he were to send Snowden a Christmas card, what would it say?

"I would send him the oath, the one he claims he took. Maybe he should have read it all," Alexander said as the audience broke into spontaneous applause.

While Alexander didn't provide full details on what his company is doing, he did outline the problem space and where IronNet Cyber Security fits in. Alexander said that visibility is important for IT security. As such, situational awareness is critical, and the ability to provide a way of seeing traffic at network speed is critical. The IronNet platform aims to help provide better visibility to help organizations defend their own networks, he said.
Eweek: http://bit.ly/1zjNtfv

« Disapproved: UK College of Policing Blacklists Former Officers for Data Misdeeds
Will Cyber Insurance Providers Reward Good Security? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

European Organisation for Security (EOS)

European Organisation for Security (EOS)

EOS represents all domains of security solutions and services.providers including ICT information and communications technologies.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

Shield-IOT

Shield-IOT

Shield-IoT provides real-time analytics and cyber security solutions for deployment in mass scale B2B and IIoT networks.

Cloud Managed Networks

Cloud Managed Networks

Cloud Managed Networks provides enterprise grade IT network solutions for cloud-based and on premise network security, Wi-Fi, data switching, collaboration, device management and more.

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative is an information security and cyber security company with 40-plus years of experience across industry & government.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

PixelPlex

PixelPlex

PixelPlex is a blockchain and custom software development company with offices and developers in New York, Geneva, and Seoul.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

DEKRA

DEKRA

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment.

SIGLA Group

SIGLA Group

SIGLA Group specialize in the design and development of IT and OT solutions, from analysis to design, from implementation to commissioning, as well as consultancy, training and assistance.

Nightwing

Nightwing

Nightwing is the intelligence services company that continually redefines the edge of the possible to keep advancing our national security interests.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

Qubika

Qubika

Qubika are shaping the future of next-generation applications by seamlessly integrating high-quality UX, robust security, and AI-driven intelligence.