Michael Weir is currently working with Quanterion Solutions, Inc as a Senior Technical Advisor/Subject Matter Expert for the Cybersecurity and Information Systems Information Analysis Center (CSIAC), and with the Griffiss Institute as the developer/facilitator for the AFRL-sponsored Machine Learning Bootcamp, a multi-month immersion program for AFRL engineers.
Mr. Weir was previously the Director of the CSIAC, and before that the Chief of Communications and Information Systems at the Eastern Air Defense Sector (EADS), Rome, New York. EADS is one of two NORAD/NORTHCOM air defense sectors in the Continental United States. He was responsible for setting up and maintaining the Sector’s cyber posture during and after 9/11 and evolving the data/communication/sensor integration through the following decade.
Mr. Weir has Bachelor’s degrees in Music Performance and in Electrical and Computer Engineering, and a Master’s Degree in Information Systems, along with certifications in the cybersecurity domain.
Journal Articles
BYOD Topic: How Complicated Can Calendars Be?
Using a representative example from something as simple as calendar synchronization, the unintended consequences of moving too quickly into the Bring Your Own Device realm are highlighted, with some commentary on strategies that can help. In a January 2013 blog…
View ArticleIntroduction to Design and Development Process for Assured Software – DoD Software Assurance Community of Practice: Volume 1
Software is ubiquitous. It is at the core of every deployed critical system in the DoD (and our society for that matter). As our systems become more complex and the software that supports these systems explodes in size, our adversaries are presented with an ever increasing attack surface which they have repeatedly demonstrated the capability to exploit.
View ArticleIntroduction: Insider Threat and the Malicious Insider Threat – Analyze. Deter. Discover. Prevent. Respond
Any collaboration between people in a group requires a certain degree of trust to be successful. Whether in financial, political, military, or social situations, the ability to trust those around you is a primary enabling factor to success. Misuse of that trust to gain advantage for purposes counter to the group’s success can also be a primary factor in the group’s failure. For the last few decades in the cybersecurity realm, the term “Insider Threat” has been used to identify individuals or entities that misuse some level of trust gained within an organization to adversely use information or information systems to the detriment of the organization.
View ArticleCyber-As-Zoo: Multidisciplinary Cyber Struggle
This quarter’s CSIAC Journal contains five articles that offer some perspectives to address the often-heard phrase “Cyber Is Hard”, usually associated with gnashing of teeth and exasperated sighs. In particular, how can the Department of Defense deliver new concepts across…
View Article
Podcasts / Webinars
Insider Threat Workshop » Introduction by Michael Weir
Introduction to the Insider Threat workshop by Michael Weir.
CSIAC Webinars » Partitioning Complexity: Breaking down without breaking down
Complex systems are, in a word, complex. The underlying complexity of a given problem is constant. Complexity can be hidden, but it cannot be eliminated. Consequently, one major objective should be aimed at effectively managing complexity through an appropriately layered…
Insider Threat Workshop » Panel Discussion
Trends in Insider Threat practice – what are the insider threat actors trying to do now? Trends in Insider Threat defense – what are the defenders trying to do now? Moderator: Michael Weir, Quanterion Solutions Incorporated Panelists: Thomas “TJ” Vestal,…
Cyber M&S Workshop » Discussion on Cyber M&S moderated by Michael Weir
Cyber M&S discussion moderated by Michael Weir, Director of Cybersecurity and Information Systems Information Analysis Center (CSIAC).
The CSIAC Podcast » The State of Cyber Security Education
Cybersecurity education ranging from grade schools to colleges and universities is evolving to meet the overwhelming demand for cybersecurity professionals and for the increasing necessity for acting safely in a modern digital world. However, this evolution, driven by a number…
CSIAC Webinars » What is Machine Learning, Anyway?
Machine Learning (ML) appears to be the ubiquitous go-to solution for a great many modern problems across many domains. But what is really under the hood of a typical ML solution? And, why are so many problems suddenly becoming good…
CSIAC Webinars » A Fistful of Data, or the Good, Bad and Ugly of Adversarial Machine Learning
This webinar provides an overview of Adversarial Machine Learning (AML), its relationship to Generative (Deep) Learning, and ways to view AML as a potential enabler for deploying more comprehensive system-level Machine Learning capabilities. The basic ideas driving AML and the system-level architecture needs of an effective integrated ML capability are compared to find areas of commonality and future utility beyond single-shot, algorithm-by-algorithm approaches to AML and remediation techniques.
Leave a Comment
You must be logged in to post a comment.