About
Highly accomplished and decorated cyber security and information technology executive…
Articles by Pablo
Contributions
-
How can you avoid information overload in Information Security?
The short answer is to collect whatever you think you may need, but only look at the things that will directly affect your mission critical tasks. The longer version is here: “Reducing Information Overload via an Analog Model to Cyber Risk” https://apps.dtic.mil/sti/citations/AD1114649
Activity
-
Navy Information Warfare Officers are reclassified from Restricted Line officers to Line officers performing information warfare duties. ALNAV…
Navy Information Warfare Officers are reclassified from Restricted Line officers to Line officers performing information warfare duties. ALNAV…
Liked by Pablo Breuer, Ph.D.
-
I thought Maria might appreciate a little help in bringing Tobi Nishimura Bowden to the attention of FortisBC
I thought Maria might appreciate a little help in bringing Tobi Nishimura Bowden to the attention of FortisBC
Liked by Pablo Breuer, Ph.D.
-
Back to Ukraine for the third and final time this year….With snow on the ground in Kyiv, air raid sirens day and night, and the Christmas season upon…
Back to Ukraine for the third and final time this year….With snow on the ground in Kyiv, air raid sirens day and night, and the Christmas season upon…
Liked by Pablo Breuer, Ph.D.
Experience
Education
Licenses & Certifications
-
CNSSI 4011: Information Systems Security Professional
CNSS • Committee on National Security Systems
Issued -
CNSSI 4014: Information System Security Officer
CNSS • Committee on National Security Systems
Issued
Volunteer Experience
-
Member Of The Board Of Advisors
The Society Library
- Present 3 years 6 months
Education
The Society Library extracts arguments, claims, and evidence from various forms of media to compile databases which represent the ideas and arguments from all points of view starting with the most high-impact, persistent, and polarizing issues; to be visualized and made freely available to the public in a library. The long-term vision of the Society Library is to create a library of ideas not only on social and political subjects, but also philosophy, spirituality, and social values.
-
Member
Cybersecurity Canon
- 4 years
Education
The Cybersecurity Canon does for information security books what the Rock & Roll Hall-of-Fame does for music. Created by former Palo Alto Networks CISO Rick Howard and curated by top information security leaders, the Canon lets people know the best and the brightest of security books that should be on their reading lists.
Now under the stewardship of The Ohio State University, for those looking what to read in the areas of information security, privacy, risk management, and more, the…The Cybersecurity Canon does for information security books what the Rock & Roll Hall-of-Fame does for music. Created by former Palo Alto Networks CISO Rick Howard and curated by top information security leaders, the Canon lets people know the best and the brightest of security books that should be on their reading lists.
Now under the stewardship of The Ohio State University, for those looking what to read in the areas of information security, privacy, risk management, and more, the Canon is your one-stop-shop of must-read books. -
Committee on Artificial Intelligence and Autonomous Systems Policy
IEEE
- Present 6 years 4 months
Science and Technology
The IEEE-USA Government Relations Council created the Artificial Intelligence and Automated Systems Policy Committee (AI&ASPC) in late 2016 to enable IEEE members with experience and expertise in the various disciplines related to the field of artificial intelligence to formulate public policy position statements. The committee will produce positions that reflect a consensus viewpoint of IEEE's U.S. membership, and which IEEE-USA staff will use to guide advocacy efforts within the United…
The IEEE-USA Government Relations Council created the Artificial Intelligence and Automated Systems Policy Committee (AI&ASPC) in late 2016 to enable IEEE members with experience and expertise in the various disciplines related to the field of artificial intelligence to formulate public policy position statements. The committee will produce positions that reflect a consensus viewpoint of IEEE's U.S. membership, and which IEEE-USA staff will use to guide advocacy efforts within the United States. Specific uses include, but are not limited to, legislative advocacy, rulemaking notice-and-comment letters, and advocacy efforts with White House and federal agency officials.
-
Member of Consulting Staff
People-Centered Internet
- Present 5 years 10 months
Economic Empowerment
People-Centered Internet (PCI) is an international coalition of positive #ChangeAgents created to ensure that the Internet continues to improve people’s lives and livelihoods and that the Internet is a positive force for good with helping people achieve their goals and aspirations.
The PCI coalition embodies the belief that the Internet can bring different groups of people together to form living learning communities focused on education, economic opportunity, and growth of communities…People-Centered Internet (PCI) is an international coalition of positive #ChangeAgents created to ensure that the Internet continues to improve people’s lives and livelihoods and that the Internet is a positive force for good with helping people achieve their goals and aspirations.
The PCI coalition embodies the belief that the Internet can bring different groups of people together to form living learning communities focused on education, economic opportunity, and growth of communities through communication.
We seek out positive #ChangeAgents to demonstrate a better way forward for the Internet. This new way can then be shown to the private sector, to public sector leaders, and contribute towards a making sense of this rapidly changing landscape. -
Misinformation Response Deputy Director
CTI League
- Present 5 years
Civil Rights and Social Action
We are a community of CTI experts, Incident responders and Industry experts working to neutralize all cyber threats looking to exploit the current pandemic. We identify, analyze and neutralize all threats but at this most sensitive time are prioritizing front-line medical resources and critical infrastructure.
-
Co-Founder
Cognitive Security Collaborative
- Present 5 years
Civil Rights and Social Action
The Cognitive Security Collaborative’s mission is to bring together information security researchers, data scientists, and other subject-matter experts in order to create and improve resources for the protection and defense of the cognitive domain. https://www.cogsec-collab.org/
-
Chief Information Security Officer
BSides Las Vegas
- Present 6 years 1 month
Education
Advises the board of directors and chief executives on information security matters. Devises and executes the information security plan. Responsible for maintaining the security posture of the conference equipment, public networks, and social media accounts.
-
Co-Founder and Board of Directors
The Diana Initiative
- 4 years 1 month
Science and Technology
Our mission is to:
Encourage diversity and support women who want to pursue careers in information security
Promote diverse and supportive workplaces.
Help change workplace cultures.
We want to give attendees the opportunity to network and collaborate, because there is a sense of empowerment and validation in shared experiences. This will be a casual, relaxed space where everyone is welcome. Come “Meet a Mentor”.
We believe in the value of nurturing talent within our…Our mission is to:
Encourage diversity and support women who want to pursue careers in information security
Promote diverse and supportive workplaces.
Help change workplace cultures.
We want to give attendees the opportunity to network and collaborate, because there is a sense of empowerment and validation in shared experiences. This will be a casual, relaxed space where everyone is welcome. Come “Meet a Mentor”.
We believe in the value of nurturing talent within our community, and mentoring is one of the best ways to give back. Be inspired by our speakers who will share their experiences in the field and their insights. We’ll have some fun events, great conversations, and hopefully launch a career or two. -
Operations Staff
BSides Las Vegas
- Present 8 years 2 months
BSides Las Vegas is an Information / Security conference that’s different. We’re a volunteer organized event, put on by and for the community, and we truly strive to keep information free.
There is no charge to the public to attend BSidesLV. Our costs are covered by our generous donors and sponsors, who share our vision of free dissemination of information. The conversations are getting more potent and the “TALK AT YOU” conferences are starting to realize they have to change. BSidesLV is…BSides Las Vegas is an Information / Security conference that’s different. We’re a volunteer organized event, put on by and for the community, and we truly strive to keep information free.
There is no charge to the public to attend BSidesLV. Our costs are covered by our generous donors and sponsors, who share our vision of free dissemination of information. The conversations are getting more potent and the “TALK AT YOU” conferences are starting to realize they have to change. BSidesLV is making this happen by shaking-up the format.
Presenters at our conference are engaging our participants and getting the discussions started on the “Next Big Thing”, not preaching at you from the podium about last month’s news. There are no “attendees” at a BSides event. EVERYONE is a participant, adding something of value to the conversations.
With tracks as diverse as “Common Ground”, focusing on non-tech issues of importance to the community, “Underground”, our Off-The-Record series that lets you delve deeper into the subjects that are better-off discussed Away-From-Keys, behind closed doors, “Hire Ground”, our Career Track, focused on matching our Sponsors with participants looking for their next job, or career change and “Proving Ground”, our mentorship program for first-time presenters, YOU are the reason for this new era of Information Sharing and Teamwork. -
CFP Chair
CircleCityCon
- 3 years
CircleCityCon is a security conference held in downtown Indianapolis. Our cons last years were big successes and we are only looking to grow and make it better.
CircleCityCon is about the community. Our signature offering is the community led training classes offered to all participants. Events and contests are organized by members of the security community, including both CircleCityCon staffers and community partners. Three tracks, incredible entertainment, and technical villages help…CircleCityCon is a security conference held in downtown Indianapolis. Our cons last years were big successes and we are only looking to grow and make it better.
CircleCityCon is about the community. Our signature offering is the community led training classes offered to all participants. Events and contests are organized by members of the security community, including both CircleCityCon staffers and community partners. Three tracks, incredible entertainment, and technical villages help round out the CircleCityCom experience. Of course, don’t forget the chance to meet and talk with your peers about all topics including security, hacking, and the latest superhero movies. -
Deputy Director - RoboDojo Maker space
Naval Postgraduate School
- 3 years 2 months
Education
The RoboDojo is an exciting, newly established innovation space (located on NPS campus in Root Hall, Room 125) where students, staff, faculty, and friends can come 'tinker' and learn about robot components and systems.
-
Vice President - Monterey Chapter
Military Cyber Professionals Association
- 2 years 1 month
Science and Technology
-
Member Board Of Directors
Analyst Army
- Present 2 years 9 months
Civil Rights and Social Action
Mission: Facilitate safe passage in areas of crisis and civil unrest by providing actionable information to inform asset movement. https://analystarmy.com/
Publications
-
Why the United States Must Win the Artificial Intelligence (AI) Race
Cyber Defense Review
An increasingly urgent debate rages in many circles about the “Artificial Intelligence (AI) Arms Race” rapidly progressing on a global scale. Among many
unanswered questions, one is of particular interest to the United States (US)
government: Where does the US stand in this race relative to China? This
question is critical because the AI Arms Race “winner” will dominate how AI impacts
myriad aspects of human society worldwide. For the US to lead the AI race, it will require
a…An increasingly urgent debate rages in many circles about the “Artificial Intelligence (AI) Arms Race” rapidly progressing on a global scale. Among many
unanswered questions, one is of particular interest to the United States (US)
government: Where does the US stand in this race relative to China? This
question is critical because the AI Arms Race “winner” will dominate how AI impacts
myriad aspects of human society worldwide. For the US to lead the AI race, it will require
a conscious partnership among public, private, and academic sectors, and a strategic
alignment with our allies. Our relative position as a world leader, our relative position as
an economic leader, and our standing as a moral force for all people’s good and ethical
treatment are at risk.Other authorsSee publication -
DISARM: a Framework for Analysis of Disinformation Campaigns
IEEE
State actors, private influence operators and grassroots groups are exploiting the openness and reach of the Internet to manipulate populations at a distance. They are extending a decades-long struggle for “hearts and minds” via propaganda, influence operations and information warfare, often in the form of coordinated incidents that are part of longer-timescale narrative-based campaigns. Our work on cognitive security extends information security principles, practices, and tools, to the…
State actors, private influence operators and grassroots groups are exploiting the openness and reach of the Internet to manipulate populations at a distance. They are extending a decades-long struggle for “hearts and minds” via propaganda, influence operations and information warfare, often in the form of coordinated incidents that are part of longer-timescale narrative-based campaigns. Our work on cognitive security extends information security principles, practices, and tools, to the detection and management of information harms including disinformation and disinformation. Specifically, we have adapted and extended frameworks used to describe information security incidents, to create the DISARM series of frameworks for understanding and responding to organized disinformation incidents; these have been in continuous use since 2019 for analysis, simulations, training, and country-level disinformation risk assessments. In this paper, we describe how and why the DISARM frameworks were created, and discuss their components and uses, including analysis of ways, means, and ends to achieve influence goals.
Other authorsSee publication -
Powering the DIME: Unlearned Lessons of Asymmetric National Power in Cyberspace
Cyber Defense Review
The US has failed to learn the lesson that conflict in the cyber age is
inherently asymmetric and that cyber attack responses need not be quid-pro-quo. There
is a range of diplomatic, economic, and information options for effective responses that
follows the international legal principle of proportionality and do not necessarily result
in escalation to the kinetic actions of warfare.Other authorsSee publication -
Strategic Latency Report: (Chapter) Weaponized Information, Influence and Deception in the Age of Social Media
Lawrence Livermore National Labs, Center for Global Security Research
-
Disinformation, Cognitive Security, and Influence
CXO Talk
Fighting disinformation (and misinformation) attacks has become a crucial part of information security (Infosec). On this episode of CxOTalk, three experts explain these dangerous attacks, which are based on influence and manipulation, and how to disrupt them.
Other authorsSee publication -
Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project
Black Hat USA 2019
Here we will present an integrated view of Socio-Technical Systems (STS) amenable to application of security principles. Applying this novel approach requires unification of three skill sets: data science, psychology, and security thinking, which are not commonly found together.
By David Perlman and Pablo BreuerOther authorsSee publication -
MISINFOSEC: Applying Information Security Paradigms to Misinformation Campaigns
Association for Computing Machinery
State actors, private influence operators and grassroots groups are all exploiting the openness and reach of the Internet to manipulate populations at a distance, extending their decades
long struggle for “hearts and minds” via propaganda, influence operations and information warfare. Computational propaganda fueled by AI makes matters worse.
The structure and propagation patterns of these attacks have many similarities to those seen in information security and computer hacking. The…State actors, private influence operators and grassroots groups are all exploiting the openness and reach of the Internet to manipulate populations at a distance, extending their decades
long struggle for “hearts and minds” via propaganda, influence operations and information warfare. Computational propaganda fueled by AI makes matters worse.
The structure and propagation patterns of these attacks have many similarities to those seen in information security and computer hacking. The Credibility Coalition’s MisinfosecWG working group is analyzing those similarities, including information security frameworks that could give the truth based community better ways to describe, identify and counter misinformation based attacks. Specifically, we place misinformation components into a framework commonly used to describe information security incidents. We anticipate that our work will give responders the ability to transfer other information security principles to the misinformation sphere, and to plan defenses and countermoves .Other authorsSee publication -
The Truths of Cyberspace Operations
Chips
Throughout history, classical military and political thinkers have attempted to codify the universal truths of warfare. Sun Tzu’s The Art of War, Clausewitz’s On War, and Machiavelli’s The Prince each attempt to synthesize warfare to salient essentials to be followed. At the same time, continued evolution in weapons technology necessitate that these truths be reexamined and revalidated. This article distills the fundamental truths of Military Applications of Cyber Effects and Military…
Throughout history, classical military and political thinkers have attempted to codify the universal truths of warfare. Sun Tzu’s The Art of War, Clausewitz’s On War, and Machiavelli’s The Prince each attempt to synthesize warfare to salient essentials to be followed. At the same time, continued evolution in weapons technology necessitate that these truths be reexamined and revalidated. This article distills the fundamental truths of Military Applications of Cyber Effects and Military Cyberspace Operations.
-
A Survey of Communication and Collaboration in Support of Operation Unified Response
Chips Magazine
Winners and losers in effectively sharing information between many disparate organizations in a bandwidth constrained environment. This article highlights some observations in communications during the Haiti earthquake response in 2010.
-
Wikis, Portals and Bandwidth Considerations in the Fleet
Chips Magazine
An overview of best practices for collaboration sites in a bandwidth constrained environment.
Languages
-
English
Native or bilingual proficiency
-
Spanish
Native or bilingual proficiency
Recommendations received
10 people have recommended Pablo
Join now to viewMore activity by Pablo
-
The US government is scrutinizing TP-Link, a Chinese company that's become the leading provider of Wi-Fi and routers in American homes and offices…
The US government is scrutinizing TP-Link, a Chinese company that's become the leading provider of Wi-Fi and routers in American homes and offices…
Liked by Pablo Breuer, Ph.D.
-
Early Saturday morning, I went to give our puppy Fitzroy a bath. As we were getting into the elevator in our building, my phone slipped out of my…
Early Saturday morning, I went to give our puppy Fitzroy a bath. As we were getting into the elevator in our building, my phone slipped out of my…
Liked by Pablo Breuer, Ph.D.
-
Please note: if someone asks you to record a podcast with Michelle Finneran Dennedy and Edna Conway, YOU SAY YES! Thank you, Tom Field, for getting…
Please note: if someone asks you to record a podcast with Michelle Finneran Dennedy and Edna Conway, YOU SAY YES! Thank you, Tom Field, for getting…
Liked by Pablo Breuer, Ph.D.
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More