Pablo Breuer, Ph.D.

Pablo Breuer, Ph.D.

Washington DC-Baltimore Area
7K followers 500+ connections

About

Highly accomplished and decorated cyber security and information technology executive…

Articles by Pablo

  • Cybersecurity Trend Predictions for 2020

    Cybersecurity Trend Predictions for 2020

    It's the time of year when everyone makes their predictions for the upcoming year. Here are my picks for trends of 2020.

    9 Comments

Contributions

Activity

Join now to see all activity

Experience

  • Unit6 Technologies Graphic
  • -

    Washington DC-Baltimore Area

  • -

  • -

  • -

    Baltimore, Maryland, United States

  • -

  • -

  • -

    Baltimore, Maryland, United States

  • -

    Washington DC-Baltimore Area

  • -

    Baltimore, Maryland, United States

  • -

    Baltimore, Maryland, United States

  • -

    Tampa/St. Petersburg, Florida Area

  • -

    Marina, CA

  • -

    Monterey, California

  • -

    Monterey, California, United States

  • -

  • -

  • -

    Manama, Bahrain

  • -

  • -

    Fort Meade, Maryland, United States

  • -

  • -

    Jacksonville, Florida, United States

  • -

    Monterey, California, United States

  • -

    Fort Meade, Maryland, United States

  • -

    Kabul, Afghanistan

  • -

    Ingleside, Texas, United States

  • -

    Yokosuka, Kanagawa, Japan

  • -

    Newport, Rhode Island, United States

Education

Licenses & Certifications

Volunteer Experience

  • The Society Library Graphic

    Member Of The Board Of Advisors

    The Society Library

    - Present 3 years 6 months

    Education

    The Society Library extracts arguments, claims, and evidence from various forms of media to compile databases which represent the ideas and arguments from all points of view starting with the most high-impact, persistent, and polarizing issues; to be visualized and made freely available to the public in a library. The long-term vision of the Society Library is to create a library of ideas not only on social and political subjects, but also philosophy, spirituality, and social values.

  • Cybersecurity Canon Graphic

    Member

    Cybersecurity Canon

    - 4 years

    Education

    The Cybersecurity Canon does for information security books what the Rock & Roll Hall-of-Fame does for music. Created by former Palo Alto Networks CISO Rick Howard and curated by top information security leaders, the Canon lets people know the best and the brightest of security books that should be on their reading lists.

    Now under the stewardship of The Ohio State University, for those looking what to read in the areas of information security, privacy, risk management, and more, the…

    The Cybersecurity Canon does for information security books what the Rock & Roll Hall-of-Fame does for music. Created by former Palo Alto Networks CISO Rick Howard and curated by top information security leaders, the Canon lets people know the best and the brightest of security books that should be on their reading lists.

    Now under the stewardship of The Ohio State University, for those looking what to read in the areas of information security, privacy, risk management, and more, the Canon is your one-stop-shop of must-read books.

  • IEEE Graphic

    Committee on Artificial Intelligence and Autonomous Systems Policy

    IEEE

    - Present 6 years 4 months

    Science and Technology

    The IEEE-USA Government Relations Council created the Artificial Intelligence and Automated Systems Policy Committee (AI&ASPC) in late 2016 to enable IEEE members with experience and expertise in the various disciplines related to the field of artificial intelligence to formulate public policy position statements. The committee will produce positions that reflect a consensus viewpoint of IEEE's U.S. membership, and which IEEE-USA staff will use to guide advocacy efforts within the United…

    The IEEE-USA Government Relations Council created the Artificial Intelligence and Automated Systems Policy Committee (AI&ASPC) in late 2016 to enable IEEE members with experience and expertise in the various disciplines related to the field of artificial intelligence to formulate public policy position statements. The committee will produce positions that reflect a consensus viewpoint of IEEE's U.S. membership, and which IEEE-USA staff will use to guide advocacy efforts within the United States. Specific uses include, but are not limited to, legislative advocacy, rulemaking notice-and-comment letters, and advocacy efforts with White House and federal agency officials.

  • People-Centered Internet Graphic

    Member of Consulting Staff

    People-Centered Internet

    - Present 5 years 10 months

    Economic Empowerment

    People-Centered Internet (PCI) is an international coalition of positive #ChangeAgents created to ensure that the Internet continues to improve people’s lives and livelihoods and that the Internet is a positive force for good with helping people achieve their goals and aspirations.

    The PCI coalition embodies the belief that the Internet can bring different groups of people together to form living learning communities focused on education, economic opportunity, and growth of communities…

    People-Centered Internet (PCI) is an international coalition of positive #ChangeAgents created to ensure that the Internet continues to improve people’s lives and livelihoods and that the Internet is a positive force for good with helping people achieve their goals and aspirations.

    The PCI coalition embodies the belief that the Internet can bring different groups of people together to form living learning communities focused on education, economic opportunity, and growth of communities through communication.

    We seek out positive #ChangeAgents to demonstrate a better way forward for the Internet. This new way can then be shown to the private sector, to public sector leaders, and contribute towards a making sense of this rapidly changing landscape.

  • CTI League Graphic

    Misinformation Response Deputy Director

    CTI League

    - Present 5 years

    Civil Rights and Social Action

    We are a community of CTI experts, Incident responders and Industry experts working to neutralize all cyber threats looking to exploit the current pandemic. We identify, analyze and neutralize all threats but at this most sensitive time are prioritizing front-line medical resources and critical infrastructure.

  • Cognitive Security Collaborative Graphic

    Co-Founder

    Cognitive Security Collaborative

    - Present 5 years

    Civil Rights and Social Action

    The Cognitive Security Collaborative’s mission is to bring together information security researchers, data scientists, and other subject-matter experts in order to create and improve resources for the protection and defense of the cognitive domain. https://www.cogsec-collab.org/

  • BSides Las Vegas Graphic

    Chief Information Security Officer

    BSides Las Vegas

    - Present 6 years 1 month

    Education

    Advises the board of directors and chief executives on information security matters. Devises and executes the information security plan. Responsible for maintaining the security posture of the conference equipment, public networks, and social media accounts.

  • The Diana Initiative Graphic

    Co-Founder and Board of Directors

    The Diana Initiative

    - 4 years 1 month

    Science and Technology

    Our mission is to:

    Encourage diversity and support women who want to pursue careers in information security
    Promote diverse and supportive workplaces.
    Help change workplace cultures.

    We want to give attendees the opportunity to network and collaborate, because there is a sense of empowerment and validation in shared experiences. This will be a casual, relaxed space where everyone is welcome. Come “Meet a Mentor”.

    We believe in the value of nurturing talent within our…

    Our mission is to:

    Encourage diversity and support women who want to pursue careers in information security
    Promote diverse and supportive workplaces.
    Help change workplace cultures.

    We want to give attendees the opportunity to network and collaborate, because there is a sense of empowerment and validation in shared experiences. This will be a casual, relaxed space where everyone is welcome. Come “Meet a Mentor”.

    We believe in the value of nurturing talent within our community, and mentoring is one of the best ways to give back. Be inspired by our speakers who will share their experiences in the field and their insights. We’ll have some fun events, great conversations, and hopefully launch a career or two.

  • BSides Las Vegas Graphic

    Operations Staff

    BSides Las Vegas

    - Present 8 years 2 months

    BSides Las Vegas is an Information / Security conference that’s different. We’re a volunteer organized event, put on by and for the community, and we truly strive to keep information free.

    There is no charge to the public to attend BSidesLV. Our costs are covered by our generous donors and sponsors, who share our vision of free dissemination of information. The conversations are getting more potent and the “TALK AT YOU” conferences are starting to realize they have to change. BSidesLV is…

    BSides Las Vegas is an Information / Security conference that’s different. We’re a volunteer organized event, put on by and for the community, and we truly strive to keep information free.

    There is no charge to the public to attend BSidesLV. Our costs are covered by our generous donors and sponsors, who share our vision of free dissemination of information. The conversations are getting more potent and the “TALK AT YOU” conferences are starting to realize they have to change. BSidesLV is making this happen by shaking-up the format.

    Presenters at our conference are engaging our participants and getting the discussions started on the “Next Big Thing”, not preaching at you from the podium about last month’s news. There are no “attendees” at a BSides event. EVERYONE is a participant, adding something of value to the conversations.

    With tracks as diverse as “Common Ground”, focusing on non-tech issues of importance to the community, “Underground”, our Off-The-Record series that lets you delve deeper into the subjects that are better-off discussed Away-From-Keys, behind closed doors, “Hire Ground”, our Career Track, focused on matching our Sponsors with participants looking for their next job, or career change and “Proving Ground”, our mentorship program for first-time presenters, YOU are the reason for this new era of Information Sharing and Teamwork.

  • CircleCityCon Graphic

    CFP Chair

    CircleCityCon

    - 3 years

    CircleCityCon is a security conference held in downtown Indianapolis. Our cons last years were big successes and we are only looking to grow and make it better.

    CircleCityCon is about the community. Our signature offering is the community led training classes offered to all participants. Events and contests are organized by members of the security community, including both CircleCityCon staffers and community partners. Three tracks, incredible entertainment, and technical villages help…

    CircleCityCon is a security conference held in downtown Indianapolis. Our cons last years were big successes and we are only looking to grow and make it better.

    CircleCityCon is about the community. Our signature offering is the community led training classes offered to all participants. Events and contests are organized by members of the security community, including both CircleCityCon staffers and community partners. Three tracks, incredible entertainment, and technical villages help round out the CircleCityCom experience. Of course, don’t forget the chance to meet and talk with your peers about all topics including security, hacking, and the latest superhero movies.

  • SANS Institute Graphic

    GIAC Advisory Board Member

    SANS Institute

    - Present 8 years

    Science and Technology

  • Naval Postgraduate School Graphic

    Deputy Director - RoboDojo Maker space

    Naval Postgraduate School

    - 3 years 2 months

    Education

    The RoboDojo is an exciting, newly established innovation space (located on NPS campus in Root Hall, Room 125) where students, staff, faculty, and friends can come 'tinker' and learn about robot components and systems.

  • Military Cyber Professionals Association Graphic

    President -Monterey Bay Chapter

    Military Cyber Professionals Association

    - 1 year 1 month

  • Military Cyber Professionals Association Graphic

    Vice President - Monterey Chapter

    Military Cyber Professionals Association

    - 2 years 1 month

    Science and Technology

  • BSides Las Vegas Graphic

    Volunteer

    BSides Las Vegas

    - 1 year

  • Member Board Of Directors

    Analyst Army

    - Present 2 years 9 months

    Civil Rights and Social Action

    Mission: Facilitate safe passage in areas of crisis and civil unrest by providing actionable information to inform asset movement. https://analystarmy.com/

Publications

  • Why the United States Must Win the Artificial Intelligence (AI) Race

    Cyber Defense Review

    An increasingly urgent debate rages in many circles about the “Artificial Intelligence (AI) Arms Race” rapidly progressing on a global scale. Among many
    unanswered questions, one is of particular interest to the United States (US)
    government: Where does the US stand in this race relative to China? This
    question is critical because the AI Arms Race “winner” will dominate how AI impacts
    myriad aspects of human society worldwide. For the US to lead the AI race, it will require
    a…

    An increasingly urgent debate rages in many circles about the “Artificial Intelligence (AI) Arms Race” rapidly progressing on a global scale. Among many
    unanswered questions, one is of particular interest to the United States (US)
    government: Where does the US stand in this race relative to China? This
    question is critical because the AI Arms Race “winner” will dominate how AI impacts
    myriad aspects of human society worldwide. For the US to lead the AI race, it will require
    a conscious partnership among public, private, and academic sectors, and a strategic
    alignment with our allies. Our relative position as a world leader, our relative position as
    an economic leader, and our standing as a moral force for all people’s good and ethical
    treatment are at risk.

    Other authors
    See publication
  • DISARM: a Framework for Analysis of Disinformation Campaigns

    IEEE

    State actors, private influence operators and grassroots groups are exploiting the openness and reach of the Internet to manipulate populations at a distance. They are extending a decades-long struggle for “hearts and minds” via propaganda, influence operations and information warfare, often in the form of coordinated incidents that are part of longer-timescale narrative-based campaigns. Our work on cognitive security extends information security principles, practices, and tools, to the…

    State actors, private influence operators and grassroots groups are exploiting the openness and reach of the Internet to manipulate populations at a distance. They are extending a decades-long struggle for “hearts and minds” via propaganda, influence operations and information warfare, often in the form of coordinated incidents that are part of longer-timescale narrative-based campaigns. Our work on cognitive security extends information security principles, practices, and tools, to the detection and management of information harms including disinformation and disinformation. Specifically, we have adapted and extended frameworks used to describe information security incidents, to create the DISARM series of frameworks for understanding and responding to organized disinformation incidents; these have been in continuous use since 2019 for analysis, simulations, training, and country-level disinformation risk assessments. In this paper, we describe how and why the DISARM frameworks were created, and discuss their components and uses, including analysis of ways, means, and ends to achieve influence goals.

    Other authors
    See publication
  • Powering the DIME: Unlearned Lessons of Asymmetric National Power in Cyberspace

    Cyber Defense Review

    The US has failed to learn the lesson that conflict in the cyber age is
    inherently asymmetric and that cyber attack responses need not be quid-pro-quo. There
    is a range of diplomatic, economic, and information options for effective responses that
    follows the international legal principle of proportionality and do not necessarily result
    in escalation to the kinetic actions of warfare.

    Other authors
    See publication
  • Strategic Latency Report: (Chapter) Weaponized Information, Influence and Deception in the Age of Social Media

    Lawrence Livermore National Labs, Center for Global Security Research

  • Disinformation, Cognitive Security, and Influence

    CXO Talk

    Fighting disinformation (and misinformation) attacks has become a crucial part of information security (Infosec). On this episode of CxOTalk, three experts explain these dangerous attacks, which are based on influence and manipulation, and how to disrupt them.

    Other authors
    See publication
  • Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project

    Black Hat USA 2019

    Here we will present an integrated view of Socio-Technical Systems (STS) amenable to application of security principles. Applying this novel approach requires unification of three skill sets: data science, psychology, and security thinking, which are not commonly found together.

    By David Perlman and Pablo Breuer

    Other authors
    See publication
  • MISINFOSEC: Applying Information Security Paradigms to Misinformation Campaigns

    Association for Computing Machinery

    State actors, private influence operators and grassroots groups are all exploiting the openness and reach of the Internet to manipulate populations at a distance, extending their decades
    long struggle for “hearts and minds” via propaganda, influence operations and information warfare. Computational propaganda fueled by AI makes matters worse.

    The structure and propagation patterns of these attacks have many similarities to those seen in information security and computer hacking. The…

    State actors, private influence operators and grassroots groups are all exploiting the openness and reach of the Internet to manipulate populations at a distance, extending their decades
    long struggle for “hearts and minds” via propaganda, influence operations and information warfare. Computational propaganda fueled by AI makes matters worse.

    The structure and propagation patterns of these attacks have many similarities to those seen in information security and computer hacking. The Credibility Coalition’s MisinfosecWG working group is analyzing those similarities, including information security frameworks that could give the truth based community better ways to describe, identify and counter misinformation based attacks. Specifically, we place misinformation components into a framework commonly used to describe information security incidents. We anticipate that our work will give responders the ability to transfer other information security principles to the misinformation sphere, and to plan defenses and countermoves .

    Other authors
    See publication
  • The Truths of Cyberspace Operations

    Chips

    Throughout history, classical military and political thinkers have attempted to codify the universal truths of warfare. Sun Tzu’s The Art of War, Clausewitz’s On War, and Machiavelli’s The Prince each attempt to synthesize warfare to salient essentials to be followed. At the same time, continued evolution in weapons technology necessitate that these truths be reexamined and revalidated. This article distills the fundamental truths of Military Applications of Cyber Effects and Military…

    Throughout history, classical military and political thinkers have attempted to codify the universal truths of warfare. Sun Tzu’s The Art of War, Clausewitz’s On War, and Machiavelli’s The Prince each attempt to synthesize warfare to salient essentials to be followed. At the same time, continued evolution in weapons technology necessitate that these truths be reexamined and revalidated. This article distills the fundamental truths of Military Applications of Cyber Effects and Military Cyberspace Operations.

    See publication
  • A Survey of Communication and Collaboration in Support of Operation Unified Response

    Chips Magazine

    Winners and losers in effectively sharing information between many disparate organizations in a bandwidth constrained environment. This article highlights some observations in communications during the Haiti earthquake response in 2010.

    See publication
  • Wikis, Portals and Bandwidth Considerations in the Fleet

    Chips Magazine

    An overview of best practices for collaboration sites in a bandwidth constrained environment.

    See publication

Languages

  • English

    Native or bilingual proficiency

  • Spanish

    Native or bilingual proficiency

Recommendations received

10 people have recommended Pablo

Join now to view

More activity by Pablo

View Pablo’s full profile

  • See who you know in common
  • Get introduced
  • Contact Pablo directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses