Back
The VET Newsletter

A Different Type of Warfare

April 8, 2022

If you’re looking for technical help to start or bolster your cyber defenses, consider hiring a veteran.

April 8, 2022

As we described in last month’s issue of the VET, we continue to monitor the situation in Ukraine closely. Beyond the horrific humanitarian and significant geopolitical implications of the conflict, there is a fascinating cybersecurity dynamic unfolding. Many analysts and journalists have discussed the “possibility” that Russia is engaging in cyber-attacks on both the Ukrainian people and its government; we say “possibility” because, unlike conventional attacks, cyberattacks can be difficult to attribute accurately. Just as the military tests conventional weapons systems, Russian forces appear to be using Ukraine as a live testing ground for its next generation of cyber weapons. If this proves to be true, we may be witnessing one of the first-ever conflicts where conventional and cyber weapons have been used in concert with each other.

Regardless of who is conducting the attacks, we know they are happening, and we know they can transcend borders. While most of us would like to believe we are insulated and far removed from this conflict, consider a (paraphrased) comment from my friend who is still on active duty and serving in a senior position within the current administration: “The U.S. should expect cyber-attacks to escalate over an extended period of time, coming through proxies for deniability, and targeted against those who are most vulnerable.” These are sobering comments, but very much in line with the refrain from many cyber experts; it’s not a matter of “if” but rather “when” companies large and small will be targeted.

My discussions with portfolio company leaders have revealed that while most agree with this statement – and despite their awareness and desire to establish solid defenses – they are unable to find adequate resources given the current labor market. Here’s the good news: veterans can help.

Every single branch of the military has a cybersecurity military occupational specialty (MOS), or job description. If you’re skeptical, check out this role summary from the Navy’s recruiting website:

As a Cyber Warfare Engineer (CWE), you are highly trained in specialized areas of disruptive technologies, cyberspace capability development and the full spectrum of cyberspace operations. Research, design, develop, test and evaluate software and firmware for Cyberspace Operations. Apply principles and techniques of computer science and computer engineering to build software and firmware to defend our nation’s vital computer networks. If an enemy seeks to steal information or sabotage capabilities, they’ll be met with the swift mental combat of a Sailor like you.

(Note: I’m an Army guy and even I was motivated after reading this!)

Key takeaway: If you’re looking for technical help to start or bolster your cyber defenses, consider hiring a veteran with these MOS codes listed in their experience: 17C (Army), 184X (Navy), 1B431 (Air Force and Space Force).

Another important consideration is the human component of cyber-attacks. A recent study by researchers at Stanford and cyber security firm Tessian estimates human error causes of almost 90% of all cyber-attacks. Even if you have strong cyber resources in your organization, you may have an open flank in the form of your biggest asset: your people.

Here again, veterans can help. In previous issues of the VET, I’ve written about the innate skillset that veterans bring from their time in the military: toughness, work ethic, leadership and more. It’s worth noting that, in addition to these fantastic characteristics, veterans are also trained on operational and data security on a regular basis and may even come to your organization with high-level security clearances or certifications. Veterans deeply understand the importance of security, whether data, cyber or physical, to the organization.

How do I know? Talk to any veteran, and I’m sure they can cite a story from basic training where they were “smoked” (i.e. verbally reprimanded, told to do pushups, assigned extra duty, etc.) for a variety of violations, including those related to security. If you’ve lived through this, you learn to never make the same mistake twice.

Key takeaway: Veterans understand the importance of cyber security and can be trusted to follow established policies and procedures that protect the broader organization.

Charlie Mike*

Dave & the Summit Partners Veterans Community

* “Charlie Mike” is the military phonetic alphabet for the letters C and M which stand for “continue the mission,” a phrase commonly used in tactical situations

(NOTE: you can help by forwarding this email to veterans within the Summit network so they can join the community and/or our LinkedIn Group)

Veteran Engagement Team Reads & Resources (R&R)

Veterans Community Member Spotlight

Brandon Roach is the Co-Founder and President of Global Ag Insurance Services, a crop insurance provider based in California.  A former member of the Summit Partners team, Brandon discusses his unique journey from leading operators as a Lieutenant in SEAL Team 5, to starting and growing his own business.  Brandon’s insights on transition, leadership, and risk are relevant (and inspirational) for both transitioning vets and entrepreneurial leaders within growth companies. Read the full interview here.

February Book of the Month

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon – Kim Zetter
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.

About the Author

Dave Averett is a Managing Director at Summit Partners, and the head of Summit’s Peak Performance Group (PPG). Dave works with management teams to help identify and execute growth strategies that build long-term value. Dave is also an Army Veteran, and a graduate of the United States Military Academy at West Point.