Recently the San Diego chapter of Infragard invited me to speak at our “Social Media and Public Safety” event on May 23rd. The event was held at the beautiful Irwin Jacobs auditorium at Qualcomm’s headquarters. It’s a fantastic facility for such events.
I gave a talk on “Social Media 101” to explain some of the basics of common social media and why emergency and incident responders should be using it. It’s not often that information security professionals talk up the importance of using social media, mostly because we’re so busy preaching why they are so bad for security and privacy. But they are valuable tools that emergency responders can ignore only at their peril. My premise is that if we don’t understand how to use such tools ourselves, how can we help others protect themselves online?
SDG&E arrived to demonstrate their new Incident Command Trailer. Very cool.
My conclusion? Get involved! Use the tools. Learn the culture. Pick a topic you care about and aren’t worried about from a privacy perspective (like fishing for example!) and post only about that. Anything is better than nothing and nothing is what the bad guys are hoping we will do.
While the event was going on, we used twitter hashtag #sdcssm which was trending locally in San Diego until at least 9pm that night. Take that, #songstogetlaidby!
For those interested in a copy of my presentation, I’ve made it available here.
By now you may have heard that the Department of Homeland Security has changed its terror alert system from the old color-coding scheme to a much simpler one: Elevated and Imminent.
While most security professionals can agree the old system was vague and confusing, at that the new one should do much to clear that up, I wonder if anyone else has noticed the change in perspective.
As of now, America has only two states of security-being: “High alert,” and “Oh my god, we’re under attack!”
Is that it? Are we stuck forever in the mindset that we are under siege? There’s no chance things could ever return to “normal”, that is, a state of low alert?
I realize there are politics involved in a ‘low threat’ state. No one wants to be the one to change the terror threat state to ‘low’ and then suffer an attack that leaves people thinking the change was premature. And budgets are cut when things are low threat states.
But can’t we at least maintain the hope that there at least exists the possibility that our security status could someday be low threat? Or have we bought into the fact that we have lost this war and that credible threats somewhere in the world will always be plotting against us with a reasonable chance to cause us harm?
Why am I uncomfortable that in the best of times, our state of alert will be “elevated?” Is it just choice of words? Words, as they say, do have meaning. Is it out of the realm of our conventional wisdom anymore to simply be “vigilant?”
A few years ago I put together a blended threat incident response workshop for the San Diego chapter of Infragard with the help of the local chapter and some excellent volunteers.
Mystic Rain is an incident response workshop designed to highlight the relationship between physical and cyber security threats. I hosted the workshop for the San Diego chapter of Infragard in 2009.
You can run the same workshop! Here’s all the resources (550K, zipped) including instructions on how to run it.
This timed workshop is a great tool for a large group of people (10+) divided into teams and helped by table proctors to consider threats outside their daily roles as physical or cyber security professionals.
A (very brief) PDF presentation I gave as part of a panel on improving communication on cyber security threats between public and private organizations to the Technology Leadership Conference in 2008.
A PDF presentation I gave at the San Diego SecureSD 2005 focusing on the enterprise handling of rapid moving threats, such as viruses and worms.
Years ago I had to write this extensive paper for to earn a GIAC Certified Forensics Analyst title.
Christopher Vera – SANS GCFA Practical v.1.3
Analysis of Unknown Binary, Forensic Tool Validation, and Legal Issues of Incident Handling for GIAC Certified Forensic Analyst Certification, Version 1.3
Abstract: The investigator: analyzes an unknown binary using several Linux and Windows forensic tools revealing an ICMP Backdoor; Tests Dependency Walker as a forensic tool for analyzing unknown Windows binaries; Explores the legal issues of a system administrator of an imaginary ISP sharing possible forensic evidence with a government agent acting under color of law.