Personal Information
Organization / Workplace
Other
Occupation
Senior Principal Cyber Security Engineer at CONFIDENTIAL
About
Internationally recognized cyber-intelligence & counter-intelligence professional. Technical, cultural, historical and linguistic analysis of foreign nation state cyber warfare capabilities, intents & methodologies...
Listed on Forbes Magazine as : "20 Cyber Policy Experts To Follow On Twitter"
http://www.forbes.com/sites/richardstiennon/2014/04/07/20-cyber-policy-experts-to-follow-on-twitter/
February 2014: "China’s Plans for Winning Information Confrontation"...ISBN-13: 978-1496080875
January 2014: "Chinese Information Warfare Doctrine Development" 1994 - 2014...ISBN-13: 978-1493771974
2013: "China's Use of Computers & Networks as a Weapon System" ...ISBN: 978-1482577105
Named one o...
Tags
china
cyber
cyber warfare
網絡戰 - wǎngluò zhàn cyber warfare
peoples republic of china
information security
cyber security
chinese
military
cyber conflict
people's republic of china
communist party of china
信息對抗 - xìnxī duìkàng information confr
pla
hacking
china cyber warfare
peoples liberation army
보안 인식교육
south korea
kisa
korea
中國人民共和國
赛博空间
how to guide 網絡安全
hacker
binary
conoplan 3502
cloud security
network warfare technology ddos
解放軍网络对抗技术
battlefield
future of chinese cyber
cyberspace
information technology
peo
espionage
iran
critical infrastructure
high tech war
中國網絡戰爭 - zhōngguó wǎngluò zhànzh
comparison
weaponized malware
taxonomy
threat
中國共產黨
force distribution
中国人民解放军陆军
中國人民解放军
china's people's liberation army
中華人民共和國 #紅龍崛起
2015
big data
people's liberation army
#hagestad #opml #紅龍1949網絡新聞subscriptions #reddrago
See more
Presentations
(13)Documents
(6)Likes
(6)Security Operation Center - Design & Build
Sameer Paradia
•
11 years ago
Cyber security industry trends
Richard Stiennon
•
9 years ago
Artificial Intelligence and the Law of Armed Conflict
lkcyber
•
9 years ago
Proactive Counterespionage & Business Continuity / Resiliency
lkcyber
•
9 years ago
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
lkcyber
•
9 years ago
Personal Information
Organization / Workplace
Other
Occupation
Senior Principal Cyber Security Engineer at CONFIDENTIAL
About
Internationally recognized cyber-intelligence & counter-intelligence professional. Technical, cultural, historical and linguistic analysis of foreign nation state cyber warfare capabilities, intents & methodologies...
Listed on Forbes Magazine as : "20 Cyber Policy Experts To Follow On Twitter"
http://www.forbes.com/sites/richardstiennon/2014/04/07/20-cyber-policy-experts-to-follow-on-twitter/
February 2014: "China’s Plans for Winning Information Confrontation"...ISBN-13: 978-1496080875
January 2014: "Chinese Information Warfare Doctrine Development" 1994 - 2014...ISBN-13: 978-1493771974
2013: "China's Use of Computers & Networks as a Weapon System" ...ISBN: 978-1482577105
Named one o...
Tags
china
cyber
cyber warfare
網絡戰 - wǎngluò zhàn cyber warfare
peoples republic of china
information security
cyber security
chinese
military
cyber conflict
people's republic of china
communist party of china
信息對抗 - xìnxī duìkàng information confr
pla
hacking
china cyber warfare
peoples liberation army
보안 인식교육
south korea
kisa
korea
中國人民共和國
赛博空间
how to guide 網絡安全
hacker
binary
conoplan 3502
cloud security
network warfare technology ddos
解放軍网络对抗技术
battlefield
future of chinese cyber
cyberspace
information technology
peo
espionage
iran
critical infrastructure
high tech war
中國網絡戰爭 - zhōngguó wǎngluò zhànzh
comparison
weaponized malware
taxonomy
threat
中國共產黨
force distribution
中国人民解放军陆军
中國人民解放军
china's people's liberation army
中華人民共和國 #紅龍崛起
2015
big data
people's liberation army
#hagestad #opml #紅龍1949網絡新聞subscriptions #reddrago
See more