CyPod Cafe
In this episode, we discuss some specific Tactics, Techniques and Procedures (TTP) for meeting the intent of the higher Cyberspace Protection Condition (CPCON) levels. Looking for feedback from the hive of how they are going about it.
info_outlineCyPod Cafe
In this episode, we discuss the gap between Tier 2 (NOSC) and Tier 3 (MDT) CSSP defenses... and that's where a Comm Squadron fits in (until EITaaS takes over CSSP). This is the solution that has been pushed out to AFCENT. A simple, repeatable solution to get after mission assurance. This also has us postured for Cyberspace Protection Condition (CPCON) level changes.
info_outlineCyPod Cafe
In this episode we discuss what SAASS is and how to attend.
info_outlineCyPod Cafe
In this episode, after a long break, we introduce Shrink as a co-host, and we interview some Joint Forces Staff College students and discuss AI/machine learning how that could be applied to the Joint Planning Process.
info_outlineCyPod Cafe
In this episode, Lytic interviews Gaberock (a CS/CC that has been leading the charge on CSI & MDTs).
info_outlineCyPod Cafe
In this episode, we discuss an article written by an Army Officer who was contemplating whether a Cyberspace Officer should be technical or operational. The article can be found here: https://www.ausa.org/articles/cyber-officers-must-be-technical-experts-too and is written by Lt Dan Lim (16 May 2018). This is also the first episode we record remotely, so the quality might be a little low until we get better microphones.
info_outlineCyPod Cafe
In this episode, Buffalo walks us through the attack life cycle. This is the link we were talking to: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html. We also (randomly) have a discussion of DuckDuckGo. Don't forget to rate us (and leave us a comment) on iTunes.
info_outlineCyPod Cafe
In this episode, we discuss Comm Squadron Initiative and in particular, the C2 of CS-I, EITaaS & Cyber Sq Enabling Concept.
info_outlineCyPod Cafe
In this episode, Lytic and Timex explore the depths of US Code Law and how that applies to the authorities that allow for Cyberspace Operations... and does it really even matter?
info_outlineCyPod Cafe
In this episode, we realize that we didn't answer all the questions in the first recording, so we went back and finished up the discussion on defining cyberspace operations and if the domain of cyberspace is truly different.
info_outlineInterview with experts on Cyber 200 and Cyber 300