Cloud provider FireHost's security chief brings lessons from the front lines

Chief Security Officer Jeff Schilling ran security at the US Army and Department of Defense

By , IDG News Service |  Security

Jeff Schilling, who joined cloud hosting startup FireHost this week as chief security officer, knows a thing or two about cybersecurity.

As director of the U.S. Army's Global Network Operations and Security Center, he oversaw security operations and incident response for more than 1 million computers on 350 wide-area networks in 2,500-plus locations around the world. He went on to direct the global security operations center for the entire U.S. Department of Defense. During his 24-year military career, he was deployed to Saudi Arabia, Kuwait, Haiti and Afghanistan to work on communications and information security.

Schilling retired from the Army in 2012 to run the Global Incident Response practice for Dell SecureWorks. His new company, Dallas-based FireHost, operates a managed cloud IaaS (infrastructure as a service) to securely host enterprise data, including regulated data such as payment and health-care information.

The IDG News Service talked to Schilling about his experiences securing military operations and what they taught him about enterprise security. This is an edited transcript of that conversation.

IDG News Service: What kinds of cybersecurity threats did you face?

Schilling: There are three categories of threat: criminal actors, nation-state actors and insider threats. Categories of threat will tell you what capability they have.

When you start to look at motives, there are three main motives. One is hacktivism, or destructive activity. That could be a nation-state actor, that could be a criminal actor, or that could be an insider who's trying to disrupt, deny, or destroy inside your network. The other category is strictly criminal, trying to take intellectual property; putting malware on your system that locks up your system and then making you pay ransom; and credit-card and other breaches.

The other type of motive I see out there is national-level espionage. I think there are over 190 countries that have active cybercollection programs ... to try to gain advantage in national policy. That's how you would best characterize the type of operations that the U.S. government does: basically, foreign intelligence gathering to help inform national policy decision-making.

The other type of nation-state activity that we're seeing, although it's hard to give attribution to, is what would probably be termed as cyberwarfare: Deny, disrupt, destroy, and keeping people from getting access to their infrastructure.

IDGNS: Who's winning?

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Ask a Question