Author

Hector Santiago

Hector Santiago has 3 articles published.

Hector Santiago
Dr. Hector Santiago entered civilian government service after serving as a linguist and signals intelligence professional in the US Army for almost nine years. Starting his post-military career in 2006, Dr. Santiago has since worked throughout the intelligence community for over eleven years as an intelligence professional with a specialty in cyber threat analysis and telecommunications infrastructure. He has deployed to Baghdad, Iraq in support of multinational military operations, and has directly worked with the Federal Bureau of Investigations and the US Commerce Department on cyber threat and supply risk issues. Dr. Santiago was the creator of the Department of Homeland Security’s non-forensic attribution methodology (NFAM) used for identifying anonymous threat actors in the cyber domain, and was a key contributor to founding the database DHS leverages for tracking and identifying cyber threats to the US Federal Government. He was awarded a doctor of science degree (in Cybersecurity) from Capitol Technology University, and has master’s degrees from Liberty University (in Business Administration), Capitol Technology University (in Telecommunications and Information Systems Management), and the National Intelligence University (in Strategic Intelligence). He was awarded a bachelor’s degree of fine arts (in Illustration) from Syracuse University. Dr. Santiago is a two-time graduate of the Defense Language Institute (DLI) in Monterey, California, where he studied Russian and then Chinese, and has been a member of MENSA for over nine years. Dr. Santiago was born and raised in the Bronx, New York City.

PERSPECTIVE: Characterizing Adversarial Capability in Cyberspace Before Taking Action

To defeat adversaries in the cyber domain, defeat their ability to incentivize others or limit the effectiveness of cyber actors.

Keep Reading

PERSPECTIVE: The Most Misused Word in Intel and Implications for Cybersecurity

A lack of analytical rigor for ID of true indicators may include total belief in a connection where none exists.

Keep Reading

Is an Organization’s Need for a Cyber Army Just an Indicator of Resource Mismanagement?

Look at prior choices to exempt all relevant stakeholders from the responsibility of addressing shortcomings until too late.

Keep Reading

Go to Top
Malcare WordPress Security