WEBVTT

00:05.640 --> 00:09.270
uh real world attacks happen in the

00:09.270 --> 00:11.381
power grid every single day . They're

00:11.381 --> 00:14.060
just not successful , but at some point

00:14.070 --> 00:16.126
they're more than likely going to be

00:16.126 --> 00:18.348
successful and we we showed you already

00:18.348 --> 00:20.790
how it can be accomplished . Uh we'd

00:20.790 --> 00:22.901
like you all to begin by thinking for

00:22.901 --> 00:25.770
yourselves , why do you think it's all

00:25.770 --> 00:29.300
about information warfare now ? Uh this

00:29.300 --> 00:31.330
is a question that arose in a

00:31.330 --> 00:34.870
conversation that we had with the 16th

00:34.870 --> 00:37.037
Air Force when they were pretty nearly

00:37.037 --> 00:40.650
stood up effect that we could um

00:41.440 --> 00:44.430
we could put out that would disrupt ,

00:44.440 --> 00:47.610
deny or degrade that operation . Just

00:47.610 --> 00:50.020
similar . I liken it to how we counter

00:50.030 --> 00:53.000
violent extremist organizations . Same

00:53.000 --> 00:54.944
thing with transnational organized

00:54.944 --> 00:57.200
crime or drug traffickers or human

00:57.200 --> 00:59.770
traffickers or illegal fishing . We're

00:59.770 --> 01:02.050
trying to just instead of just pushing

01:02.050 --> 01:04.290
cyber , we're trying to listen for

01:04.290 --> 01:06.012
what's important to the senior

01:06.012 --> 01:08.123
leadership and then say , hey , maybe

01:08.123 --> 01:11.530
cyber could be of help . So our

01:11.530 --> 01:13.641
physical bodies are made up of only a

01:13.641 --> 01:16.380
very small percentage of actual human

01:16.380 --> 01:18.547
cells . Which can be shocking to think

01:18.547 --> 01:20.602
about when you look at your own body

01:20.602 --> 01:22.602
and you realize , well , most of me

01:22.602 --> 01:24.769
isn't really human . Well , cyberspace

01:24.769 --> 01:27.390
is the same way most people only ever

01:27.390 --> 01:29.612
experienced what's on the surface . But

01:29.612 --> 01:31.779
actually the cyber domain is comprised

01:31.779 --> 01:33.890
of vastly more information and spaces

01:33.890 --> 01:37.120
than we could ever fathom . We both

01:37.120 --> 01:39.287
work in a similar space , We're trying

01:39.287 --> 01:41.342
to learn as much as we can to move ,

01:41.342 --> 01:43.564
help each other , educate others and we

01:43.564 --> 01:45.700
will move the country forward . The

01:45.710 --> 01:47.710
reason why I love the cybersecurity

01:47.710 --> 01:50.043
domain is that it truly is a team sport ,

01:50.240 --> 01:52.560
uh So multidisciplinary , so

01:52.560 --> 01:55.060
multifaceted , constantly evolving ,

01:55.060 --> 01:58.330
very sophisticated knowledge and to to

01:58.330 --> 02:01.760
stay current um and to maintain our

02:02.140 --> 02:04.720
Dominance which we want to contain .

02:04.730 --> 02:06.720
It's only going to happen through

02:06.730 --> 02:10.230
collaboration . So we're

02:10.230 --> 02:13.660
looking across that spectrum nine ,

02:14.240 --> 02:16.310
we have to be engaged in the

02:16.310 --> 02:19.240
competition phase , but how we

02:19.240 --> 02:23.160
organized , we have to

02:23.160 --> 02:26.490
look at the competition and

02:26.490 --> 02:28.350
the conflict things .

02:30.240 --> 02:33.130
My my theory , my hypothesis is that if

02:33.130 --> 02:36.260
we can organize effectively to be

02:36.270 --> 02:38.790
credible part of the right processes ,

02:39.340 --> 02:42.360
Pepe right structure to build the right

02:42.360 --> 02:44.416
relationships so that we can use the

02:44.416 --> 02:46.638
capabilities and authorities we already

02:46.638 --> 02:48.760
have and the new ones as they develop

02:49.240 --> 02:51.530
and we can apply that across the

02:51.540 --> 02:52.540
competition .

02:57.440 --> 02:57.760
Mhm .

