Panel discussion on the topic of bridging military and hacker cultures to build effective teams for cyberspace missions, moderated by Justin Helphenstine.
MG Stephen Hager
Major General Stephen J. Hager was commissioned in 1987 as a Signal Corps Officer. As an active duty officer he served as Platoon Leader and Executive Officer for Alpha Company, 742nd Military Intelligence Battalion, 704th Military Intelligence Brigade at Fort Meade, Maryland. Major General Hager left active duty, and joined the Army Reserves in 1995.
Currently, Major General Hager is dual hatted as the Deputy Commander for Operations, Cyber National Mission Force, and the Mobilization Assistant to the Commander, USCYBERCOM. His military education includes the Army Signal Officer Basic Course, Advanced Cryptologic Management Course, Signal Officer Advanced Course, Observer/Controller Course, Mobilization Planners Course, The Combined Arms Services Staff School, the Army Command and General Staff College, the Battalion/Brigade Pre-Command Course, and the Army War College.
Major General Hager’s awards and decorations include the Bronze Star Medal, Defense Meritorious Service Medal, Meritorious Service Medal (sixth award), the Army Commendation Medal (second award), the Army Achievement Medal (third award) and various other campaign and service ribbons. He received a Bachelor of Science Degree in Mathematics and a Master’s of Science Degree in Engineering Computer Science from Santa Clara University. He also received a Master’s of Strategic Studies from the United States Army War College.
Rachel Wilson is a Managing Director and Head of Cybersecurity for Morgan Stanley Wealth Management. She is responsible for protecting the cybersecurity of Wealth Management systems and the integrity and confidentiality of Firm and client data. Additionally, Rachel advises the leadership of Wealth Management on numerous cybersecurity issues, leads field and client education on cyber risk and mitigations, and drives innovation for new cybersecurity and authentication technology.
Rachel was recognized by Morgan Stanley Wealth Management as part of the 2019 MAKERS Class, a program that honors women who serve as groundbreakers, innovators and advocates. She was also named one of the Top Women in WealthTech 2020 by ThinkAdvisor.
Prior to joining the Firm in 2017, Rachel spent 15 years at the National Security Agency (NSA), where she held several key senior executive-level leadership positions. As part of her tenure, Rachel spent nearly five years leading NSA’s cyber exploitation operations as the Deputy and then Chief of the Remote Operations Center within NSA’s Tailored Access Operations. In this capacity, she led the planning and execution of thousands of cyber exploitation operations against a wide array of foreign intelligence, military, and cyber targets, and served as the committing official for many of NSA’s highest risk and most important intelligence gathering activities.
Kate serves as a professor of cybersecurity at Georgetown University and a keynote speaker, having formerly reported extensively on cybersecurity as a staff member at The Wall Street Journal and CNBC. Prior to her role in academics and media, Kate helped develop ideal security processes, create disaster communications plans and educate experts as a cybersecurity executive at JPMorgan Chase and Company and Promontory Financial Group, an IBM Company.
Kate holds a master’s degree in strategic cybersecurity enforcement from The George Washington University and holds a B.A. in literature from The Ohio State University. She has helped build courses and teach as an adjunct professor at The University of Maryland in addition to Georgetown, and she frequently teaches bespoke education courses at Fortune 500 corporations.
In today’s world, no matter if you are an individual, own a small business, or a mega corporation, you need to protect yourself against cyber-attacks from all angles, and Kate knows how to do just that and more.
John Hultquist leads the analysis team that tracks cyberespionage threats for FireEye’s government and commercial clients. His team has uncovered dozens of cyberespionage operations including publicly known operations such as the Russian Sandworm hackers who carried out attacks on the Ukrainian grid. He has over eight years experience covering cyberespionage and hacktivism, working in senior intelligence analysis positions at the US government prior to iSIGHT Partners and FireEye. Before working in the cyber-realm, he worked with the ISACs and was involved in counterinsurgency operations with the US Army.