Transcript
A (0:00)
It's just a matter of time that just about any company, they're going to get caught up into some kind of geopolitical affairs, even if they have no intention to. You may have no political ties or intentions or anything, but if your company can very easily get tied in, and if you're not prepared and understand the implications of getting pulled into these scenarios, then it's going to be so much harder to up your defensive once you've already been targeted.
B (0:34)
Hello and welcome to another episode of Data Security Decoded. I'm your host, Caleb Tolan, and if this is your first time joining us, welcome to the party. Make sure you hit that subscribe button so you're notified when new episodes are live and if you're already a subscriber. Thanks for coming back. We'd love it if you'd give us a rating. Drop a comment below, let us know what you think of the show. And in this episode, I had the pleasure of sitting down with Dustin Drouillard, who brings a wealth of experience and threat intelligence and specializing in the intersection of geopolitics and cybersecurity. We had a fascinating conversation on how geopolitical tensions impact cyber operations, the human nature of threat actors, and trends amongst the next generation of defenders. I really enjoyed speaking with Dustin. I'm sure you'll love this conversation, so let's dive in. Dustin, thank you so much for joining us. Before we dive into the meat of the conversation, can you tell us a little bit about your first introduction to cybersecurity and what made you decide to pursue this as a career?
A (1:25)
First, Caleb, thanks for having me today. And I'd say my career isn't necessarily unusual, but it wasn't exactly planned in a linear way. I started out as an intelligence analyst in the army, and I didn't know it at the time, but it kind of provided solid background for when I later pivoted into cyber operations. But along the way I learned, you know, I was introduced to new technologies, different complex analysis scenarios and different types of data sources. Human intelligence report is very different from a signals intelligence or imagery intelligence. And so when I was introduced to the cyber as a source, if you will, it was kind of a nice addition to a lot of what I'd already been trained in and experienced with. So along the way the army decided that they needed to kind of get in on the cyber thing, if you will. And so they, they offered me a position where they're taking a bunch of intelligence analysts and IT professionals and putting us together and calling that Cyber eventually developed into what became, you know, now a dedicated cyber branch within the Army. But at the time, it was kind of a little bit of all these skills mixed together, and I kind of assumed that that would just be a temporary assignment. I'd move back on to other things. But once I got exposed to a lot of cyber operations, I really enjoyed the challenge. There's something new every day. There's so much complexity, you know, and I really enjoyed it. And I decided I wanted to stay within that kind of technical analysis, so realm within the rest of my career. And since then, that's really what I've been focused on.
