Mr. Roderick A. Nettles is currently serving as the Deputy Director under our current Cyber Security and Information Systems IAC (CSIAC) Basic Center Operations (BCO) contract, developing/implementing means of improving/assuring performance with existing resources to meet and exceed the customer’s requirements. Mr. Nettles is responsible for leading Quanterion efforts to develop and maintain a viable training program under the CSIAC BCO contract using a mix of company, subcontractor and subject matter expert instructed courses. In addition, serving as the Chief Editor of a cybersecurity journal. Responsible for managing all the day-to-day operations of a quarterly publication. As the editor-in-chief, oversee the editorial board and peer-review team of the quarterly publication and ensures each issue is released on time. Mr. Nettles has a bachelor’s degree in Computer Science and Master in Information Technology Management. He has over 20 years of oversight of Cyber Command and Control Mission System weapon system to include Automated Information Systems which enables mission by synchronizing other cyber weapon systems to produce operational level effects in support of Combatant Commanders worldwide. Mr. Nettles was assigned to CONUS NORAD Region (CONR) 1AF/A6 at Tyndall Air Force Base as the Office In Charge , Command and Control Systems Branch. He was responsible for developing cyber defense Table Top Exercise; validated C2 Tactics, Techniques and Procedures with Twenty-Fourth Air Force (24AF), 33d Network Warfare Squadron (33NWS), Canadian Forces Network Operations Centre (CFNOC), Canadian NORAD Region (CANR) & 5 Air Defense Sectors to hardened NOARD’s front line Command and Control Systems. Mr. Nettles was charged with eliminating security vulnerabilities systems—secured C2 mission systems. As the Chief of C2 Systems Branch, Mr. Nettles bridged CANR, CONR & 6 sectors to Defensive Cyber Operations combat methodologies. As a Cyber Operational Planner, he led efforts to identify mission key terrain, “Mapped the Mission” for NORAD Network Enterprise.
Watch the companion video podcast to this report to learn more about the significance and the attack vectors of data manipulation. https://www.csiac.org/podcast/data-manipulation Confidentiality, Integrity and Availability In terms of cybersecurity, the Confidentiality, Integrity and Availability, also known as the CIA…
Introduction: Insider Threat and the Malicious Insider Threat – Analyze. Deter. Discover. Prevent. Respond
Any collaboration between people in a group requires a certain degree of trust to be successful. Whether in financial, political, military, or social situations, the ability to trust those around you is a primary enabling factor to success. Misuse of that trust to gain advantage for purposes counter to the group’s success can also be a primary factor in the group’s failure. For the last few decades in the cybersecurity realm, the term “Insider Threat” has been used to identify individuals or entities that misuse some level of trust gained within an organization to adversely use information or information systems to the detriment of the organization.
Podcasts / Webinars
What is data manipulation? A misconception is that hackers always steal data, but this assumption is incorrect. Data manipulation attacks occur when an adversary does not take data, but instead makes subtle, stealthy tweaks to data for some type of…