"In the growing field of cyber warfare and defense, very few professionals have the insight to be both technically sound and managerially astute. Greg Smith is one of those professionals! Over his 23+ years in the Navy, Greg continually searched out the "difficult jobs" and carried them out with unwavering finesse. His continuous, superior performance during a 13-year enlisted career as a Data Systems Technician was rewarded by his selection for commissioning through the Limited Duty Officer program, an extremely competitive, enlisted-to-commissioned program. He continued to out-shine and out-perform his colleagues for 10 years as a Naval Officer.
During Greg's time as the Director of·the U.S. Navy Red Team, his leadership and subject matter expertise were paramount in identifying the DoD's and Navy's most critical, network vulnerabilities. His ability to plan and execute cyber operations was essential in exercising warfighters in this new warfare domain and showing leadership the importance of defending against computer exploitation.
I would gladly have Greg on my team again, and his addition to your team will help to ensure your success. I highly recommend Greg for employment at your organization.Type your paragraph here."
-VADM(Ret.) B.J. "Barry" McCullough
Commander, US Tenth Fleet/Fleet Cyber Command
"Greg continues to be an outstanding IT Engineer as well as a superb leader. We served together at the US Navy's INSURV Board where Greg was a lead C5I inspector. As a Senior Inspector and DCOS for Combat Systems, I was extremely pleased when Greg was assigned to my inspections. His unmatched IT knowledge, easy going nature, maturity, integrity, and professionalism were instrumental in completing many difficult and challenging shipboard inspections.
He was "the best of the best" while at INSURV and I consider him a dear friend and an expert in IT and Marine Communications."
Captain (Ret.), USN
"Greg Smith worked for me at the Board of Inspection and Survey as a C5I Inspector. He is an outstanding Naval Officer, superb leader, and invaluable technical expert. During his time on the Board, I consistently ranked him the number one officer in his pay grade, a significant accomplishment based upon the size of that group (10 to 15 officers).
Greg qualified in ALL C5I department inspection areas, including Weapons, Operations and Navigation. He was the INSURV subject matter expert in all areas of Communications and Information Systems across all surface platforms. Using a masterful approach in working with ship’s force, he expertly trained young sailors in the nuances of system operations and maintenance. He ensured that all systems under his purview were inspected and maintained at only the highest readiness standards. Major Command Afloat COs routinely asked for his recommendations on tough issues and wanted to know when he would be available to serve in their wardrooms.
In addition to his significant inspection duties, Greg led the design, implementation, and training for a ship corrosion and preservation inspection project, saving the Board $50K dollars in administrative, engineering and support costs. He was hand selected by the Chief of Staff to be a Senior Writer, a position requiring numerous extra hours of effort during and after the inspections. On his own time, he has completed a Bachelor of Science degree in Management and a Master of Science degree in Information systems.
During his tenure on the Board, I recommended Greg for early promotion on every fitness report. I strongly recommend Greg for any position that requires superior technical acumen and leadership abilities."
Rear Admiral, USN (Ret)
As cybersecurity industry grows, Howard County firms flex muscle
March 16, 2014|By Mike Denison, Capital News Service
High-profile cyber attacks on organizations such as Target and Neiman Marcus have drawn increased attention to the cybersecurity industry — an industry that continues to thrive in Maryland, and specifically in Howard County.
Local cybersecurity experts who aim to thwart hackers say they are always being challenged, and at times seem to work from a disadvantage.
"We have to be right 100 percent of the time," said Jim Close, federal account manager for Sourcefire, a Columbia-based network security company acquired by Cisco in October. "[Hackers] only have to be right once."
While malevolent outside forces are a key concern, Chad Carroll, vice president of information operations at ChironTechnology Services, also in Columbia, said most data breaches are the result of user error.
Remote exploits, in which a hacker breaks through a gap in network security from outside the network, are "few and far between," he said. Mere curiosity, he said, can lead an employee to open a suspicious email attachment or click a link to a malicious site.
"Not everybody is technically savvy, and not everybody is able to maneuver around a computer," Carroll said. "They rely on others to be security-savvy for them.
"Too many times, the folks that defend the network … think like a defender," he said. "And you can't. You have to think like an attacker."
Cyber attacks can deal significant damage. Greg Smith, cyber technical adviser for the Alabama-based Camber Corporation, said that in 2013, there were an average of 122 successful cyber attacks on businesses each week. In all, cyber attacks cost businesses nationwide an average of $11.56 million per year.
Smith, who spoke recently at the Cybersecurity Innovation Forum in Baltimore, said $4 million of that could have been mitigated by proper cybersecurity practices.
As technology becomes more advanced, relying on software to prevent and manage breaches may seem like a sound strategy. But Carroll said having humans involved is a critical component of cybersecurity.
"Any time I hear the word 'automated,' I instantly assume you're … removing the human aspect of it. And that's not necessarily the right thing to do," he said. "Somewhere, there's a hacker who's going to get around that. And you have to have that human element when you're doing network defense."
If there is a silver lining to recent breaches like those at Target and Neiman Marcus, Carroll said, it's an increase in security awareness. High-profile hacks tend to encourage companies to revamp security programs and policies to make sure they won't be easy targets.
As that happens, Howard County officials say, local firms are working to be at the forefront of the field. This month, County Executive Ken Ulman and officials from the Howard County Economic Development Authority attended the RSA Conference — an annual cryptography gathering in San Francisco. The conference brings the nation's top information security experts together to address cybersecurity issues.
Ulman participated in meetings to discuss specific expansion plans of two cybersecurity firms in Howard.pe your paragraph here.