1 00:00:00,099 --> 00:00:05,110 The extent at which software drives everything (we) do is is an exciting and interesting area, 2 00:00:05,110 --> 00:00:09,930 and once you understand exactly how this software works, especially in the face of a determined 3 00:00:09,930 --> 00:00:15,860 adversary who might seek to do us harm, uh, the level of dependence on software systems is 4 00:00:15,860 --> 00:00:17,520 a bit terrifying. 5 00:00:17,520 --> 00:00:22,090 As engineers, of course, we should all have a natural curiosity to learn how things work, 6 00:00:22,090 --> 00:00:24,640 and then to figure out how to make them work better. 7 00:00:24,640 --> 00:00:29,420 When our entire engineering workforce, regardless of discipline, possesses a level of knowledge 8 00:00:29,420 --> 00:00:34,999 in cybersecurity, where they can then innovate and communicate effectively with experts who 9 00:00:34,999 --> 00:00:39,530 spend their t-, all of their time within the cyber domain, then we're gonna be able 10 00:00:39,530 --> 00:00:45,370 to make great strides in our ability to deliver systems that can withstand cyberattacks and 11 00:00:45,370 --> 00:00:48,090 achieve information advantage on the battlefield. 12 00:00:48,090 --> 00:00:54,359 Um, there's a couple of ways that engineer, aspiring engineers and students and folks in the engineering 13 00:00:54,359 --> 00:00:58,249 workforce can gain more knowledge in cybersecurity. 14 00:00:58,249 --> 00:01:02,710 First off, if you're in college, you can find a local hacking or "capture the flag" team 15 00:01:02,710 --> 00:01:04,170 and introduce yourselves. 16 00:01:04,170 --> 00:01:08,380 These groups typically thrive on sharing knowledge about things that they find interesting. 17 00:01:08,380 --> 00:01:12,229 And they'll be as interested in learning about aspects of the field of engineering that you 18 00:01:12,229 --> 00:01:15,000 study as you are in cybersecurity. 19 00:01:15,000 --> 00:01:20,710 The second, engineers can, can learn to code; really, in some ways, it's as simple as that. 20 00:01:20,710 --> 00:01:26,570 If you're an engineer, the logic behind coding should be relatively simple to follow and, uh, 21 00:01:26,570 --> 00:01:32,520 present you with greatly enhanced level of understanding and knowledge on how software 22 00:01:32,520 --> 00:01:37,710 drives the complex control systems that makes your engineering discipline work. 23 00:01:37,710 --> 00:01:44,219 Um, and third, putting it into practice, capture the flag events are a common way to, to practice 24 00:01:44,219 --> 00:01:48,200 these kinds of skills and and work in a larger team setting. 25 00:01:48,200 --> 00:01:53,729 Over the last year, I was personally privileged to be able to put on a very large capture 26 00:01:53,729 --> 00:01:59,409 the flag event in collaboration with the defense digital service and Air Force and Space Force 27 00:01:59,409 --> 00:02:04,979 called a hack-a-sat. It was the first ever satellite hacking capture the flag competition 28 00:02:04,979 --> 00:02:11,530 that we, uh, uh, took publicly to DEF CON, which is one of the largest hacking conventions in 29 00:02:11,530 --> 00:02:12,530 the world. 30 00:02:12,530 --> 00:02:16,920 And what it did is, it brought together teams of experts in aerospace engineering, electrical 31 00:02:16,920 --> 00:02:23,640 engineering, and hacking in an effort to save a save a satellite that had been stolen by 32 00:02:23,640 --> 00:02:24,640 cyber attackers. 33 00:02:24,640 --> 00:02:29,220 And it was a great way for these engineers to learn the basics of cybersecurity and how 34 00:02:29,220 --> 00:02:32,950 it directly intersects with their, with their field of discipline. 35 00:02:32,950 --> 00:02:38,850 So, look for events like this,and, uh, uh, call up some of your friends and put together a team and 36 00:02:38,850 --> 00:02:44,810 The, it, it'll be very challenging, but rewarding, rewarding activity to participate in.