loader from loading.io

Episode 69: Junaid Islam on Zero Trust Architecture

OODAcast

Release Date: 06/04/2021

Episode 129:  The Attacker Mindset: Maxie Reynolds on Red Teaming, Underwater Data Centers, and Human Nature show art Episode 129: The Attacker Mindset: Maxie Reynolds on Red Teaming, Underwater Data Centers, and Human Nature

OODAcast

In this OODAcast episode, host Matt Devost sits down with Maxie Reynolds, author of The Art of the Attack, to explore the evolution of her unique career from offshore oil rigs to elite red teaming and cybersecurity innovation. Maxie shares how her unconventional path, working a decade in oil and gas, earning degrees while on remote rigs, and eventually breaking into cybersecurity at PwC, shaped her approach to physical and digital security. Her journey led to the creation of a company that builds underwater data centers, a novel fusion of her industrial and red teaming experiences. She...

info_outline
Episode 128:  The Money Trap: Alok Sama on SoftBank, Mega Bets, and Life Beyond Wall Street show art Episode 128: The Money Trap: Alok Sama on SoftBank, Mega Bets, and Life Beyond Wall Street

OODAcast

In this episode of the OODAcast, host Matt Devost is joined by Alok Sama, author of , for a compelling conversation about Sama’s journey from modest beginnings in India to leading some of the most ambitious investment efforts in tech history. Sama recounts his early days in Delhi, the unlikely path to Wharton, and his time at Morgan Stanley before stepping into the eye of the storm as President and CFO of SoftBank. Alongside Masayoshi Son, he helped deploy the groundbreaking Vision Fund, a $100B initiative that forever changed the scale of tech investing. Sama offers behind-the-scenes...

info_outline
Episode 127:  Chris Wysopal on Reducing Attack Surface in the Age of AI show art Episode 127: Chris Wysopal on Reducing Attack Surface in the Age of AI

OODAcast

In this OODAcast, Chris Wysopal shares his insights from decades in cybersecurity, detailing his journey from the early hacking collective "The L0pht" to co-founding Veracode. Wysopal reflects on the evolution of cybersecurity, highlighting his early contributions to vulnerability research and advocating the importance of adversarial thinking in security practices. He emphasizes the transition from traditional vulnerability testing to comprehensive application risk management, recognizing the increased reliance on third-party software and the escalating complexity of securing modern...

info_outline
Episode 126:  John Boyd, Maneuver Warfare, and the Future of the Marine Corps – A Conversation with Ian Brown show art Episode 126: John Boyd, Maneuver Warfare, and the Future of the Marine Corps – A Conversation with Ian Brown

OODAcast

In this episode of the OODAcast, Bob Gourley speaks with Ian Brown, retired Marine Corps officer and author of A New Conception of War, which explores the influence of John Boyd on the Marine Corps and the evolution of maneuver warfare. Ian shares insights from his 20-year career in the Marines, including his experiences as a CH-53 helicopter pilot, forward air controller, and operations officer at the Brute Krulak Center for Innovation and Future Warfare. The conversation dives into the history and adaptability of the Marine Corps, Boyd’s impact on military strategy, and how maneuver...

info_outline
Episode 125:  Unmasking Cyber Threats: Trevor Hilligoss’s Mission to Disrupt Criminal Networks show art Episode 125: Unmasking Cyber Threats: Trevor Hilligoss’s Mission to Disrupt Criminal Networks

OODAcast

In this OODAcast, Bob Gourley interviews Trevor Hilligoss from SpyCloud, diving into his career trajectory from the U.S. Army to cybercrime intelligence. Hilligoss shares his unconventional path, starting as a forward observer in the Army before transitioning to law enforcement and later working with the FBI’s Joint Ransomware Task Force. He explains how his investigative experience led him to SpyCloud, a company dedicated to collecting intelligence on cybercriminals and using it to prevent attacks. The discussion highlights how cyber threats evolve and why proactive intelligence is crucial...

info_outline
Episode 124:  The History and Future of Cyberwar with Matt Devost show art Episode 124: The History and Future of Cyberwar with Matt Devost

OODAcast

In this episode of the OODAcast we turn the microphone over to Dr. Bilyana Lily, the world renowned cyber and geopolitical expert, who interviews OODA’s CEO and co-founder Matt Devost. The session provides insights which can benefit any entrepreneur, board member, investor or cybersecurity practitioner. Bilyana reviews Matt’s journey from a small-town in Vermont to becoming a global leader in cybersecurity, counterterrorism, and risk management and then dives into Matt’s work founding groundbreaking companies like FusionX and the Terrorism Research Center, his insights into AI and cyber...

info_outline
Episode 123: Forging Leadership: Admiral Studeman on Intelligence, National Security, and Proactivity show art Episode 123: Forging Leadership: Admiral Studeman on Intelligence, National Security, and Proactivity

OODAcast

In this OODAcast, Bob Gourley interviews retired Admiral Mike Studeman, a leader with over 35 years of experience in operational intelligence and national security. Admiral Studeman shares his journey, from joining the Navy at the close of the Cold War to serving as the Director of Intelligence for Southern Command and Indo-Pacific Command, and ultimately as the Commander of the Office of Naval Intelligence. He offers deep insights into the evolving nature of intelligence, emphasizing the importance of operational intelligence in driving informed decision-making at all levels. Admiral Studeman...

info_outline
Episode 122: Embracing the Future: Insights from Brandon Jones show art Episode 122: Embracing the Future: Insights from Brandon Jones

OODAcast

In this episode of the OODAcast, Bob Gourley sits down with Brandon Jones, CEO of , to explore his career journey, the importance of liberal arts in technology, and the innovative work of Throughline. The conversation highlights the value of a diverse educational background and the pivotal role of communication and storytelling in driving organizational success. Brandon Jones shares his foundational story, emphasizing the impact of his time at St. Mary’s College in Maryland, where he graduated with a computer science degree while also engaging deeply with liberal arts. His experience...

info_outline
Episode 121: Dr. Bilyana Lilly on Russian Information Warfare and Navigating Future Risks show art Episode 121: Dr. Bilyana Lilly on Russian Information Warfare and Navigating Future Risks

OODAcast

In this OODAcast, Matt interviews Dr. Bilyana Lilly who is an expert on Russian information warfare and geo-political risk. Bilyana is also the author of the book Russian Information Warfare and the novel Digital Mindhunters. Dr. Lilly shares her fascinating origin story and how she emerged as one of the premiere experts on Russian information warfare and geopolitical dynamics. Bilyana has worked tracking international arms and weapons supply chains, conflict zones, and other geo-political dynamics in academia, the private sector, and at internationally renowned think tanks. She shares...

info_outline
Episode 120:  Leadership and Innovation with Former NASA CIO and Current Executive Leader Renee Wynn show art Episode 120: Leadership and Innovation with Former NASA CIO and Current Executive Leader Renee Wynn

OODAcast

In this episode of the OODAcast, Bob Gourley interviews Renee Wynn, former Chief Information Officer (CIO) of NASA. Renee Wynn’s career trajectory is a testament to the unpredictable yet rewarding nature of professional journeys. Starting with a Bachelor of Arts in Economics from a liberal arts college, Renee navigated through various roles, ultimately becoming the CIO of NASA. She emphasizes the importance of focusing on capabilities rather than specific job titles, a mindset that allowed her to seize unexpected opportunities. The Value of Liberal Arts in Technology Renee underscores the...

info_outline
 
More Episodes

In this OODAcast we provide insights into Zero Trust architectures from an experienced practitioner, Junaid Islam.

Junaid is a senior partner at OODA. He has over 30 years of experience in secure communications and the design and operations of highly functional enterprise architectures. He founded Bivio Networks, maker of the first gigabyte speed general purpose networking device in history, and Vidder, a pioneer in the concept of Software Defined Networking. Vidder was acquired by Verizon to provide Zero Trust capability for their 5G network. Junaid has supported many US national security missions from Operation Desert Shield to investigating state-sponsored cyberattacks. He has also led the development of many network protocols including Multi-Level Precedence and Preemption (MLPP), MPLS priority queuing, Mobile IPv6 for Network Centric Warfare and Software Defined Perimeter for Zero Trust. Recently Junaid developed the first interference-aware routing algorithm for NASA’s upcoming Lunar mission. He writes frequently on national security topics for OODAloop.com.

We discuss Junaid's approaches to zero trust networking. His approach is to always start with the needs of the business. From there he works with organizations to ensure a comprehensive assessment of the existing architecture is done, since every organization already has some elements of a zero trust approach in play. Junaid highlights that one of the biggest mistakes he sees organizations make is skipping this gap analysis and moving right to purchase of products or services. This frequently ends up being a negative to the project.

Today's global businesses operate with many partners, providers and suppliers and zero trust designs must be established with this unique mix in mind to optimize the use of technology in support of core business needs.

Junaid provides insights into many of the products he encounters in zero trust architecture work.

 

Related Reading:

Cybersecurity Sensemaking: Strategic intelligence to inform your decisionmaking

The OODA leadership and analysts have decades of experience in understanding and mitigating cybersecurity threats and apply this real world practitioner knowledge in our research and reporting. This page on the site is a repository of the best of our actionable research as well as a news stream of our daily reporting on cybersecurity threats and mitigation measures. See: OODA Cybersecurity Sensemaking

From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice

While the Ware Report of 1970 codified the foundations of the computer security discipline, it was the President’s Commission on Critical Infrastructure Protection report of 1997 that expanded those requirements into recommendations for both discrete entities as well as the nascent communities that were growing in and around the Internet. Subsequent events that were the result of ignoring that advice in turn led to the creation of more reports, assessments, and studies that reiterate what was said before. If everyone agrees on what we should do, why do we seem incapable of doing it? Alternately, if we are doing what we have been told to do, and have not reduced the risks we face, are we asking people to do the wrong things?  See: From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice

If SolarWinds Is a Wake-Up Call, Who’s Really Listening?

As the U.S. government parses through the Solar Winds software supply chain breach, many questions still remain as to the motive, the entities targeted, and length of time suspected nation state attackers remained intrenched unseen by the victims.  The attack stands at the apex of similar breaches in not only the breadth of organizations compromised (~18,000), but how the attack was executed. See: If SolarWinds Is a Wake-Up Call, Who’s Really Listening?

Executive Level Action In Response to Ongoing Massive Attacks Leveraging Microsoft Vulnerabilities

This post provides executive level context and some recommendations regarding a large attack exploiting Microsoft Exchange, a system many enterprises use for mail, contact management, calendar/scheduling and some basic identity management functions. This attack is so large and damaging it is almost pushing the recent Solar Winds attacks off the headlines. Keep in mind that till this point, the Solar Winds attack was being called the biggest hack in history. So this is a signal that the damage from this one will also be huge. See: Executive Level Action In Response to Ongoing Massive Attacks Leveraging Microsoft Vulnerabilities