Dewayne Hart Headshot
Report a problem with this profile
[email protected]

Dewayne Hart      

Cybersecurity Advisor & Author of the "Cybersecurity Mindset – A Virtual and Transformational Thinking Mode"

Dewayne Hart is an "All Cyber" professional; his knowledge of the cybersecurity blueprint significantly drives businesses to advance security programs and operations. He has developed a common-sense approach to roadmap cybersecurity. Before embarking upon his career in the commercial IT world, Hart completed 20 years in the U.S. Navy. His military experience involved sustaining computer and weapons defense systems; and speaking to junior military personnel on leadership development.

After retiring in 2008, he transitioned his technology experience into federal contracting. He played critical roles in cyber defense and safeguarding sensitive systems. As a security compliance leader for networks, data, and software platforms, he supported various governmental and corporate agencies' Information Assurance (IA) initiatives. During his time with the Department of Defense (DoD), Hart served as an IA Lead at the Naval Telecommunications Center, Enterprise Information Security Engineer at the Space and Naval War Center Command(SPAWAR), and the IA Lead at the Defense Forensic Science Center (DFSC). For Fortune 500 companies, he successfully developed and navigated Threat & Vulnerability Management (TVM), Information Security & Compliance, and Security Engineering programs. Hart's experience enables his audience to gain first-hand knowledge on reducing cybercrime, driving resilience, and safeguarding applications, cloud, data, infrastructure, and networking platforms.

Hart's other focuses include leading his Cybersecurity consulting firm - Secure Managed Instructional Systems, LLC (SEMAIS). The firm was formed in 2014 and provides Cybersecurity Advisory and Workforce Development in support of organizational Cyber Defense and Risk Management initiatives. He also hosts the Chief of Cybersecurity YouTube channel. The channel delivers a broad range of cybersecurity content, such as Digital Parenting, Cybersecurity Maturity, The Hackers Mentality, Workforce Modernization, Cybercrime, and Cybersecurity Program Management.

In 2022, Hart authored the "Cybersecurity Mindset," which addresses the constantly evolving tactics that increase risk and continually expose individuals and organizations to become vulnerable. Through "Cyber Talk" , he extracts concepts from the publication to educate his audience on cybersecurity transformation, cyber engagements, and best practices. In the "Cybersecurity Mindset," he continually addresses how threats and conflicts are escalating and why our mindset must be adapted-all of which drive organizations and end-users to think differently in the cyber war. The publication follows a well-structured layout and conceptual model that addresses 20-high level cybersecurity workstreams. By mastering the structured layout, readers and his audience can assess, reshape, and rethink their security engagements; and drive "360-Degree" of security visibility. In addition, business professionals can use the publication to build value-propositions, service offerings, and streamline security programs.

Speech Topics

Lets Talk Why You Need 360-Degree of Cyber Visibility

Visibility is the foundation of sound Cybersecurity: applying to physical devices, applications, and data - you must be able to visualize, control, and, by extension, drive protection. And because the traditional network perimeter no longer exists, visibility challenges are more complex. Organizations struggle to gain accurate data on asset coverage, vulnerability key metrics, and actual risk exposure. This speaking session discusses how sustaining visibility is a "360-Degree" effort from Technical, Operational, and Organizational planning. A further discussion is directed toward continuous monitoring and cyber tools –which accelerate data analysis and accuracy. The audience will gain first-hand knowledge of protection applications, cloud, data, infrastructure, and network environments.

You Heard It Once, Now Again - Stop Feeding The Hackers' Appetite

Numerous challenges have been aimed at defeating hackers' aggression. The methodologies work well for some, but others often fall prey by opening a revolving door that destroys the cybersecurity shield. The risk outcomes carry far more implications due to soft targets, threat vectors, and lapses in safeguards. Despite knowing that hackers are soft target driven, many organizations struggle to communicate that "Feeding Hackers' Appetite" is a risk-enabling concept. This speaking session explains why hackers' target exploitation is the weakest link, gateways additional risks, and survives when the cybersecurity shield becomes defeated.

Help Cybersecurity By Using AI and Data Automation

Cybersecurity introduces a changing environment where data analysis must be consistent, rapid, and viewable. The SOC Analyst depends on User Interface (UI) data that can be easily intrepid, so informed decisions can outperform hackers and incidents. Counteracting and adapting to a changing environment also requires accurate but valuable data. Various programs and processes feed the SOC environment. The most successful contributor has been Artificial Intelligence (AI). This speaking session discusses how AI can accelerate the data analysis process and rapidly advance decision-making. Information about threat intelligence, Machine Learning, and "Big Data" analytics are positioned to keep organizations well-informed about hackers' tactics and strategies.

Your Cyber Protection Program Needs Attention

Critical systems and applications must remain available as organizations digitally modernize and onboard technologies. Typical failures are supposed to withstand cyber stress and sustain availability – since proper planning, vulnerabilities, attacks, and risk states should be known. Shifting blame is not an option – which means protection must operate as an offensive and defensive shield. When risk exceeds protection, organizations cybersecurity landscape can become vulnerable! This speaking session roadmap various strategies and concepts to increase protection across various platforms, operate resiliency. Terms such as continual engagement, proactive defense, and security visibility are introduced. The discussion also focuses on operational resiliency and defense against disruption.

These Secret Tips Will Modernize Your Cyber Workforce

Cybersecurity workforce programs have traditionally focused on education, certification, and skillset advancement. The scenario is familiar across many technology boundaries, teams, and corporations. Every day, workforce development caters to skillset analysis and learning gaps. By far, the initiatives have achieved great success. These concepts have served security well, but advancing a workforce ensures that the organization has aligned its team structures, labor categories, and skillset requirements. This speaking session discusses how to realign the cybersecurity workforce to operate better; and how a talent management system can support modernization strategies.

Related Speakers View all

More like Dewayne