“I would endorse and look forward to do any business with Matts name associated with it. Matt is a world class expert in terrorism research in both the real and cyber worlds.”
Activity
-
"Censys was founded on research" - Zakir Durumeric Today we're boldly doubling down on that mission.
"Censys was founded on research" - Zakir Durumeric Today we're boldly doubling down on that mission.
Liked by Matthew Devost
-
Amazing success story from a former student. Thanks Danielle Errant for pointing out that there is no "one path" to cybersecurity and showing that…
Amazing success story from a former student. Thanks Danielle Errant for pointing out that there is no "one path" to cybersecurity and showing that…
Shared by Matthew Devost
Publications
-
Addressing Cyber Instability
Cyber Conflict Studies Association
See publicationCompilation of CCSA research on cyber conflict.
-
All Done Except the Coding: Implementing the International Strategy for Cyberspace
Georgetown Journal
In May of this year, the Obama Administration released its International Strategy for Cyberspace, which aims to enhance prosperity, security, and openness in the cyber domain. The authors argue that the strategy is necessary as the Internet continues to gain importance for both the public and private sectors, but that much needs to be done in order for it to be effective. Highlighting key decisions and actions that must still be made, the authors offer recommendations for implementing the…
In May of this year, the Obama Administration released its International Strategy for Cyberspace, which aims to enhance prosperity, security, and openness in the cyber domain. The authors argue that the strategy is necessary as the Internet continues to gain importance for both the public and private sectors, but that much needs to be done in order for it to be effective. Highlighting key decisions and actions that must still be made, the authors offer recommendations for implementing the Administration’s plan successfully.
Other authorsSee publication -
Threats in the Age of Obama
Nimble Books
If you are on a mission to change the way government works, particularly in the national security arena, this is one a place where some independent and intellectually diverse thinking is to be found. In these essays, we offer our view of some of the more pressing threats the Obama administration will have to deal with in these early days of the 21st century.
The essays in this volume are contributed by Daniel H. Abbott, Christopher Albon, Matt Armstrong, Matthew Burton, Molly Cernicek…If you are on a mission to change the way government works, particularly in the national security arena, this is one a place where some independent and intellectually diverse thinking is to be found. In these essays, we offer our view of some of the more pressing threats the Obama administration will have to deal with in these early days of the 21st century.
The essays in this volume are contributed by Daniel H. Abbott, Christopher Albon, Matt Armstrong, Matthew Burton, Molly Cernicek, Christopher Corpora, Shane Deichman, Adam Elkus, Matt Devost, Bob Gourley, Art Hutchinson, Tom Karako, Carolyn Leddy, Samuel Liles, Adrian Martin, Gunnar Peterson, Cheryl Rofer, Mark Safranski, Steve Schippert, Tim Stevens, and Shlok Vaidya.Other authorsSee publication -
Hacking a Terror Network
Syngress
I was the technical editor of this book.
Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in…I was the technical editor of this book.
Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.Other authorsSee publication -
Cyber Adversary Characterization - Auditing the Hacker Mind
Syngress
Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.
Other authorsSee publication -
Current and Emerging Threats to Information Technology Systems and Critical Infrastructures
Global Business Briefing
See publicationEssay written for the Global Business Briefing journal detailed a lot of the basis for threat assessments I was conducting for U.S. government and corporate clients
-
Organizing for Information Warfare: The Truth is Out There!
Terrorism Research Center
Follow-up to the Toaster paper looked at unique organizational challenges associated with addressing the IW threat.
Other authorsSee publication -
Information Warfare
Thunder's Mouth Press
See publicationHackers who break into companies' computers, steal or scramble data and plant "viruses" are only the most publicized threat to electronic security, according to this shocking and eye-opening report. It shows that the computer systems and information highways of U.S. businesses, government and the military are surprisingly vulnerable to theft, data manipulation and sabotage by "information warriors" such as corporate employees, business competitors, organized crime, drug cartels, terrorists, law…
Hackers who break into companies' computers, steal or scramble data and plant "viruses" are only the most publicized threat to electronic security, according to this shocking and eye-opening report. It shows that the computer systems and information highways of U.S. businesses, government and the military are surprisingly vulnerable to theft, data manipulation and sabotage by "information warriors" such as corporate employees, business competitors, organized crime, drug cartels, terrorists, law enforcement officials, insurance companies and others. Schwartau, an information security specialist, tells of electromagnetic eavesdroppers who use a modified TV set to pick up computer screens' emissions; HERF (high-energy radio frequency) guns that can zap an entire computer network; and microchip manufacturers who insert cloned or counterfeit chips so that complex equipment will eventually crash. He outlines a national information policy (which he was asked to present to the Clinton administration), a blueprint to safeguard electronic privacy. Schwartau closes with a practical chapter for individuals or companies seeking to ward off snoops and electronic troublemakers.
-
Information Terrorism: Can You Trust Your Toaster?
Terrorism & Political Violence
This paper on cyberterrorism received the prestigious Sun Tzu award from the National Defense University and has been reprinted in numerous books and academic journals including the peer reviewed Terrorism and Political Violence journal.
Other authorsSee publication -
National Security in the Information Age
University of Vermont
See publication1995 thesis on information warfare and national security has been published internationally and referenced in numerous international government reports.
Patents
-
System and method for detecting potential threats by monitoring user and system behavior associated with computer and network activity.
Issued US 13/829,613
See patentA system and method is provided to monitor user and system behavior associated with computer and network activity to determine deviations from normal behavior that represent a potential cyber threat or cyber malicious activity. The system and method uses a multi-factor behavioral and activity analysis approach to determine when a trusted insider might be exhibiting threatening behavior or when a user's computer or network credentials have been compromised and are in use by a third-party. As a…
A system and method is provided to monitor user and system behavior associated with computer and network activity to determine deviations from normal behavior that represent a potential cyber threat or cyber malicious activity. The system and method uses a multi-factor behavioral and activity analysis approach to determine when a trusted insider might be exhibiting threatening behavior or when a user's computer or network credentials have been compromised and are in use by a third-party. As a result, changes in insider behavior that could be indicative of malicious intent can be detected, or an external entity masquerading as a legitimate user can be detected.
Projects
-
Chairman of the Joint Chiefs 2020 Vision Red Team
-
Central Intelligence Agency Counter-Terrorist Center Invitational Roundtable on "Information Systems Terrorism"
-
DDR/E Joint Warfighting Science and Technology Plan, Information Warfare Plan
-
NIST Invitational Working Group on Computer Vulnerability Data Sharing
-
Department of Defense Office of Net Assessment, Information Warfare Analysis Group
-
-
Mirror Image Training to Combat Terrorism
-
See projectTRC developed the renowned Mirror Image training program in 2001 to allow military, intelligence, security and first responder personnel to better understand the international terrorist threat. Participants were subjected to an intense immersion program where they were trained to think and act like the adversary and adopt their tactics, techniques, and procedures. TRC Mirror Image training became a U.S. Army Foundry course, was featured in major news media, and became the most popular training…
TRC developed the renowned Mirror Image training program in 2001 to allow military, intelligence, security and first responder personnel to better understand the international terrorist threat. Participants were subjected to an intense immersion program where they were trained to think and act like the adversary and adopt their tactics, techniques, and procedures. TRC Mirror Image training became a U.S. Army Foundry course, was featured in major news media, and became the most popular training course the TRC ever developed.
-
Project Pediatric Preparedness
-
This project explained these unique needs and gaps, and provided a foundation for homeland security planning for pediatric victims of terrorism. The final report described the minimum capabilities essential for emergency response to pediatric victims. The report laid out fifteen Functional Areas for pediatric response – general areas describing functions, tasks, and missions of emergency response.
-
Responder Knowledge Base
-
As President of TRC, conceived, prototyped, designed, built and operated the RKB over a period of six years. The RKB provided emergency responders, purchasers, and planners with a trusted, integrated, online source of information on products, standards, certifications, grants, and other equipment-related information.
-
Terrorism Early Warning Group (TEWG) Project
-
Having worked with the Los Angeles Terrorism Early Warning Group since 1997, the TRC and L.A.S.D submitted a grant application to the Memorial Institute for the Prevention of Terrorism to expand the TEW to six high threat cities in the U.S. After the September 11 attacks and the formation of the Department of Homeland Security, the TEW program was migrated to DHS and expanded to cover 56 high threat urban areas. The TRC worked with these 56 cities to develop early warning and intelligence…
Having worked with the Los Angeles Terrorism Early Warning Group since 1997, the TRC and L.A.S.D submitted a grant application to the Memorial Institute for the Prevention of Terrorism to expand the TEW to six high threat cities in the U.S. After the September 11 attacks and the formation of the Department of Homeland Security, the TEW program was migrated to DHS and expanded to cover 56 high threat urban areas. The TRC worked with these 56 cities to develop early warning and intelligence centers that became the precursor the national Fusion Center network.
Honors & Awards
-
Sun Tzu Art of War Research Award
National Defense University
Organizations
-
Mach 37
Mentor
- PresentMACH37™ is America’s premier market-centric cybersecurity accelerator. The Accelerator is designed to facilitate the creation of the next generation of cybersecurity product companies. MACH37™'s unique program design places heavy emphasis on the validation of product ideas and the development of relationships that produce an initial customer base and investment capital.
-
Black Hat
Review Board
- Present -
Cyber Conflict Studies Association
Founding Board Member
- PresentCCSA is a 501(c)3 non-profit organization dedicated to promoting and leading a diversified research agenda in the field of cyber conflict. CCSA's vision is to be the premier thought leader in the field by fostering dialogue, leading research, and developing academic programs focused on the implications of cyber conflict. To achieve this, CCSA promotes and leads international intellectual development efforts to advance the field of cyber conflict research. These activities include workshops…
CCSA is a 501(c)3 non-profit organization dedicated to promoting and leading a diversified research agenda in the field of cyber conflict. CCSA's vision is to be the premier thought leader in the field by fostering dialogue, leading research, and developing academic programs focused on the implications of cyber conflict. To achieve this, CCSA promotes and leads international intellectual development efforts to advance the field of cyber conflict research. These activities include workshops that bring together professionals from industry, academia and government to discuss strategic issues surrounding cyber conflict and the publication of insightful research articles and position papers in its Journal of Cyber Conflict Studies. CCSA also plays an important role in our national cyber-readiness strategy, serving as a resource for national security decision-makers and helping to frame and promote national cyber conflict policy.
-
Airline Pilots Association
Security Advisory Board
- -
Terrorism Early Warning Group
Member | Principal of TEW Expansion Project
-The Los Angeles Terrorism Early Warning Group (TEW) held its first formal meeting in October 1996— a full five years before radical jihadist terrorism lashed out against the United States. In light of the interagency intelligence failures that led to 9/11, the TEW’s founding seems prescient. At that time the problem of transnational “Fourth Generation” insurgents and criminals waging “netwar” was only the concern of a few maverick security analysts. Even the military was largely pre-occupied…
The Los Angeles Terrorism Early Warning Group (TEW) held its first formal meeting in October 1996— a full five years before radical jihadist terrorism lashed out against the United States. In light of the interagency intelligence failures that led to 9/11, the TEW’s founding seems prescient. At that time the problem of transnational “Fourth Generation” insurgents and criminals waging “netwar” was only the concern of a few maverick security analysts. Even the military was largely pre-occupied with building a “NetworkCentric” force to deploy against competitor states such as China and Russia. The rise of dangerous nonstate forces went largely unnoticed—until the world woke up one September morning to two burning towers. Fortunately, the Los Angeles TEW were lucky enough to capitalize on the talents of an international community of military and law enforcement personnel, intelligence and policy analysts, and leaders from the business and medical worlds interested in networking to stop terrorism. This eclectic group formed a group brain, sort of a “Wikipedia” of counter-terrorism.
-
Defense Science Board
Critical Homeland Infrastructure Protection Task Force
-The Task Force was established to assess the best practices for protecting US homeland installations and recommend various approaches to enhancing security and protection of these facilities.
-
Coalition Vulnerability Assessment Team (CVAT)
Team Co-founder and Lead
-Created and ran the first Coalition Vulnerability Assessment Team that engaged in red team operations against command and control systems during classified military exercises. Included targeting of systems in the U.S., U.K., Australia, New Zealand, Canada, and select NATO countries. This team was the first to target systems on board an aircraft carrier and nuclear submarine while they were at sea.
-
President’s National Security Telecommunications Advisory Committee, Network Security Group, Intrusion Detection Subgroup
-
Recommendations received
1 person has recommended Matthew
Join now to viewMore activity by Matthew
-
Version 2.0 - let's go! Seriously, the default answer to whether you can trust AI to support cybersecurity work should be "just use Blackwire."
Version 2.0 - let's go! Seriously, the default answer to whether you can trust AI to support cybersecurity work should be "just use Blackwire."
Shared by Matthew Devost
-
Jackie is amazing. Excited for this latest evolution of the company...
Jackie is amazing. Excited for this latest evolution of the company...
Shared by Matthew Devost
-
Excited to see where Whitespace takes IRIS, the warfighter-ready intelligence analysis agent, as it tackles intelligence challenges, streamlines…
Excited to see where Whitespace takes IRIS, the warfighter-ready intelligence analysis agent, as it tackles intelligence challenges, streamlines…
Liked by Matthew Devost
-
Things are hopping in the Hack Factory today. Love the energy with Blackwire Labs, Kovr.ai, DEVSEC, OODA LLC and Tidal Cyber all rocking 2026!
Things are hopping in the Hack Factory today. Love the energy with Blackwire Labs, Kovr.ai, DEVSEC, OODA LLC and Tidal Cyber all rocking 2026!
Posted by Matthew Devost
-
🎬It has been an incredible opportunity to be one of 50 cyber defenders featured in Midnight in the War Room, a new documentary debuting at Black Hat…
🎬It has been an incredible opportunity to be one of 50 cyber defenders featured in Midnight in the War Room, a new documentary debuting at Black Hat…
Liked by Matthew Devost
-
🙏Over the past week, I’ve been incredibly jazzed by the response to my stepping into the role of CEO of RSAC. I’m super grateful for the notes…
🙏Over the past week, I’ve been incredibly jazzed by the response to my stepping into the role of CEO of RSAC. I’m super grateful for the notes…
Liked by Matthew Devost
-
I'm back! And ready for a new adventure as Head of Product at DEVSEC Please hit me up if you've ever had to dig through a mountain of data in an…
I'm back! And ready for a new adventure as Head of Product at DEVSEC Please hit me up if you've ever had to dig through a mountain of data in an…
Liked by Matthew Devost
Other similar profiles
-
Elad Yoran
Elad Yoran
Elad brings 25+ years of experience at the intersection of cybersecurity and national security as an entrepreneur, executive, Board member, advisor, investor and soldier. He serves as Director on several on several government and industry boards, as Advisor Emeritus at the Army Cyber Institute, the Cloud Security Alliance, the West Point Jewish Chapel Fund, and previously on the FBI IT Advisory Council. Elad served as Associate Adjunct Professor at Columbia University School of International and Public Affairs (SIPA) teaching a class on innovation in the U.S. defense and national security ecosystem. Elad’s was honored as “Entrepreneur of the Year” by E&Y and his companies have been acquired by Cisco, CyberArk, Forcepoint, McAfee, RSA, SafeNet, and Symantec. <br><br>Elad is the author of articles going back to the original Internet Security Threat Report. He served as an officer in the U.S. Army and is a veteran of Operation Restore Hope in Mogadishu, Somalia. Elad holds an MBA from the Wharton School of the University of Pennsylvania and a B.S. degree from the United States Military Academy at West Point.
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content