Sounil Yu

Sounil Yu

Reston, Virginia, United States
10K followers 500+ connections

About

I am an author, speaker, advisor, and board member in the cybersecurity field. I created…

Experience

  • Knostic Graphic

    Knostic

    Washington, District of Columbia, United States

  • -

    Washington D.C. Metro Area

  • -

    Washington D.C. Metro Area

  • -

  • Company ghost image

    • -

    • -

  • -

    Washington, District of Columbia, United States

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Washington, District of Columbia, United States

  • -

  • -

    Washington, District of Columbia, United States

  • -

  • -

  • -

    Washington D.C. Metro Area

  • -

    Fairfax, VA

  • -

  • -

  • -

    Raleigh-Durham, North Carolina Area

Education

  •  Graphic

    -

    -

    Activities and Societies: Alpha Phi Omega

  • -

    -

Volunteer Experience

  • Volunteer

    Volunteer

    Project N95

    - 2 years 3 months

    Health

    A non-profit group of volunteers focused on getting PPE and medical equipment into the hands of healthcare providers.

  • Conference Co-Chair

    Art into Science: A Conference on Defense

    - Present 7 years 5 months

    Science and Technology

    https://www.artintoscience.com/. Art into Science is a conference on defense, organized by defenders. This conference is intended on creating a professional discipline through discussions that mature our practices and share our methodologies in a systematic and consistent way.

  • Board Member

    Board Member

    FAIR Institute

    - Present 8 years 3 months

    Science and Technology

    The FAIR Institute is dedicated to sharing and advancing the FAIR standard for measuring and managing information risk.

  • OpenC2 Standards Committee Co-Chair

    OpenC2 Standards Committee Co-Chair

    OASIS

    - 1 year 9 months

    Science and Technology

    OpenC2 fulfills an important need by providing a standardized command and control language that will enable easier operational integration of cybersecurity capabilities and products. This in turn supports an integrated and adaptive defense that can be executed in machine time.

  • Industry Advisory Board Co-Chair

    Center for Cybersecurity Analytics and Automation

    - 5 years 4 months

    Science and Technology

    The mission of the Center for Cybersecurity Analytics and Automation (CCAA) is to bring together interdisciplinary academic researchers and industry partners to advance the science and state-of-the-art for security analytics and automation.

Licenses & Certifications

  • Certified Information Systems Security Professional (CISSP)

    (ISC)²

    Issued
    Credential ID 22263
  • GIAC Certified Forensics Analyst (GCFA)

    SANS Institute

    Issued Expires
  • GIAC Certified Penetration Tester (GPEN)

    SANS Institute

    Issued Expires

Publications

  • Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity Landscape

    JupiterOne Press

    The Cyber Defense Matrix helps practitioners, vendors, and investors understand the range of capabilities needed to build, manage, and operate a security program. The simple, logical construct of the Matrix organizes technologies, skillsets, and processes to help readers quickly discern what capabilities solve what problems, what gaps exist in one’s security program, and where there are opportunities for new capabilities to be created. Although the Cyber Defense Matrix was initially designed to…

    The Cyber Defense Matrix helps practitioners, vendors, and investors understand the range of capabilities needed to build, manage, and operate a security program. The simple, logical construct of the Matrix organizes technologies, skillsets, and processes to help readers quickly discern what capabilities solve what problems, what gaps exist in one’s security program, and where there are opportunities for new capabilities to be created. Although the Cyber Defense Matrix was initially designed to help organize security technologies, many other use cases have been discovered to help build, manage, and operate a security program. This book captures these use cases and their implementations to help readers navigate the complex landscape of cybersecurity.

    See publication
  • Security Chaos Engineering (Contributor)

    O'Reilly Media

    Information security is broken. Users and customers continually entrust companies with vital information, and companies continually fail to maintain that trust. Year after year, the same attacks are successful. But the impact has become greater. Those who build, operate, and defend systems need to acknowledge that failure will happen. People will click on the wrong thing. The security implications of code changes won't be clear. Things will break.

    This report explains how engineers can…

    Information security is broken. Users and customers continually entrust companies with vital information, and companies continually fail to maintain that trust. Year after year, the same attacks are successful. But the impact has become greater. Those who build, operate, and defend systems need to acknowledge that failure will happen. People will click on the wrong thing. The security implications of code changes won't be clear. Things will break.

    This report explains how engineers can navigate security in this new frontier. You'll learn the guiding principles of security chaos engineering for harnessing experimentation and failure as tools for empowerment—and you'll understand how to transform security from a gatekeeper to a valued advisor. Case studies from Capital One and Cardinal Health are included.
    - Apply chaos engineering and resilience engineering to securely deliver software and services
    - Transform security into an innovative and collaborative engine for enhancing operational speed and stability
    - Anticipate and identify security failure before it turns into an incident, outage, or breach
    - Harness failure to continuously improve your security strategy
    - Learn your systems' ability to handle security-relevant failures such as system exploitation and server failures
    - Apply a series of controlled experiments in engineering testing processes

    Other authors
    See publication
  • Practical Guide to Security in the AWS Cloud

    SANS Institute

    This book is a collection of knowledge from 18 contributing authors who share their tactics, techniques, and procedures for securely operating in the cloud. Each of the 27 chapters introduces a component of a bigger picture that, once put together, creates a holistic approach for your organization's security operations in the cloud.

    See publication
  • Lessons Learned in Automated Decision Making / How to Delay Building Skynet

    RSA Conference

    There is much talk of topics like artificial intelligence, machine learning, and automation within the security industry. We are led to believe that these capabilities will revolutionize our security practices. However, we need to be conscious of the limits of these capabilities before we entrust them with matters of importance. To understand the limits, we need to understand what each of these capabilities really mean and how they fit together. Unfortunately, most people combine these…

    There is much talk of topics like artificial intelligence, machine learning, and automation within the security industry. We are led to believe that these capabilities will revolutionize our security practices. However, we need to be conscious of the limits of these capabilities before we entrust them with matters of importance. To understand the limits, we need to understand what each of these capabilities really mean and how they fit together. Unfortunately, most people combine these capabilities and use the terms almost interchangeably. Doing so is dangerous and can create unintended consequences.

    See publication
  • The Cyber Defense Matrix Reloaded

    RSA Conference

    This is an update to the Cyber Defense Matrix briefing given at the 2019 RSA Conference. Cybersecurity practitioners can use this to organize vendors, find gaps in security portfolios, understand how to organize security measurements, prioritize investments, minimize business impact, visualize attack surfaces, align other existing frameworks, and gain a fuller understanding of the entire space of cybersecurity.

    See publication
  • Distributed Immutable Ephemeral (DIE) - New Paradigms for the Next Era of Security

    Art into Science: A Conference on Defense

    We are rapidly approaching the next era of security where we need to be focused on the ability to recover from irrecoverable attacks. This can also be defined as resiliency. The traditional view of resiliency attempts to quickly restore assets that support services that we care about. This new approach/paradigm looks at resilience in ways that promote design patterns (distributed, immutable, ephemeral) where we do not care about a given asset at all while still keeping the overall service…

    We are rapidly approaching the next era of security where we need to be focused on the ability to recover from irrecoverable attacks. This can also be defined as resiliency. The traditional view of resiliency attempts to quickly restore assets that support services that we care about. This new approach/paradigm looks at resilience in ways that promote design patterns (distributed, immutable, ephemeral) where we do not care about a given asset at all while still keeping the overall service functioning. This new approach allows us to avoid having to deal with security at all.

    See publication
  • The Cyber Defense Matrix: A Scientific Model for Cybersecurity

    Art into Science: A Conference on Defense

    Scientific modeling assists in making our complex world easier to understand and quantify. To untrained observers, the landscape of cybersecurity is extraordinarily complex. A scientific model for cybersecurity can help make it easier to study, comprehend, and improve the practice of cybersecurity. This session describes such a model, better known as the Cyber Defense Matrix, and its practical uses in understanding our past, present, and future.

    See publication
  • Understanding The Security Vendor Landscape Using the Cyber Defense Matrix

    RSA Conference

    The Cyber Defense Matrix enables organizations to define clear categories for the range of products and services that are available in the marketplace to solve our various infosec problems. This model removes confusion around the security technologies that we buy and helps organizations align their vendors to have the right suite of capabilities to execute their information security mission.

    See publication

Projects

  • Cyber Defense Matrix

    - Present

    The Cyber Defense Matrix helps practitioners organize security technologies and capabilities. This matrix removes confusion around the security technologies that we buy and helps organizations align their vendors to have the right suite of capabilities to execute their information security mission.

    In addition, this matrix helps to measure the efficacy and coverage of controls, align them against emerging threats and requirements, and manage a security program through design patterns…

    The Cyber Defense Matrix helps practitioners organize security technologies and capabilities. This matrix removes confusion around the security technologies that we buy and helps organizations align their vendors to have the right suite of capabilities to execute their information security mission.

    In addition, this matrix helps to measure the efficacy and coverage of controls, align them against emerging threats and requirements, and manage a security program through design patterns that emerge from the use of the Cyber Defense Matrix.

    See project

View Sounil’s full profile

  • See who you know in common
  • Get introduced
  • Contact Sounil directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses