Michael Weir, CSIAC Director, has been with Quanterion Solutions, Inc. for about four years with a primary focus in cyber security. Prior to joining QSI, Michael spent 32 years in and out of the Air Force and Air National Guard, maintaining ties with the Air Force Research Laboratory while supporting operational units in the US and overseas. He has degrees in Music Performance, Electrical and Computer Engineering, and Information Management along with several certifications in network and computer security.
Using a representative example from something as simple as calendar synchronization, the unintended consequences of moving too quickly into the Bring Your Own Device realm are highlighted, with some commentary on strategies that can help. In a January 2013 blog… Read More
Introduction to Design and Development Process for Assured Software – DoD Software Assurance Community of Practice: Volume 1
Software is ubiquitous. It is at the core of every deployed critical system in the DoD (and our society for that matter). As our systems become more complex and the software that supports these systems explodes in size, our adversaries are presented with an ever increasing attack surface which they have repeatedly demonstrated the capability to exploit.
Introduction: Insider Threat and the Malicious Insider Threat – Analyze. Deter. Discover. Prevent. Respond
Any collaboration between people in a group requires a certain degree of trust to be successful. Whether in financial, political, military, or social situations, the ability to trust those around you is a primary enabling factor to success. Misuse of that trust to gain advantage for purposes counter to the group’s success can also be a primary factor in the group’s failure. For the last few decades in the cybersecurity realm, the term “Insider Threat” has been used to identify individuals or entities that misuse some level of trust gained within an organization to adversely use information or information systems to the detriment of the organization.
This quarter’s CSIAC Journal contains five articles that offer some perspectives to address the often-heard phrase “Cyber Is Hard”, usually associated with gnashing of teeth and exasperated sighs. In particular, how can the Department of Defense deliver new concepts across… Read More
Podcasts / Webinars
Introduction to the Insider Threat workshop by Michael Weir.
Complex systems are, in a word, complex. The underlying complexity of a given problem is constant. Complexity can be hidden, but it cannot be eliminated. Consequently, one major objective should be aimed at effectively managing complexity through an appropriately layered… Read More
Trends in Insider Threat practice – what are the insider threat actors trying to do now? Trends in Insider Threat defense – what are the defenders trying to do now? Moderator: Michael Weir, Quanterion Solutions Incorporated Panelists: Thomas “TJ” Vestal,… Read More
Cyber M&S discussion moderated by Michael Weir, Director of Cybersecurity and Information Systems Information Analysis Center (CSIAC).