Today is the day we've been waiting for! Follow this thread as I highlight @DondiWest as part of the #ShareTheMicInCyber campaign. I am proud to give this talented #cybersecurity practitioner the spotlight. #BlackNatSec #BlackTechTwitter #Share the Mic in Cyber graphic. Says "#ShareTheMicInCy
@DondiWest is a #Cybersecurity Attorney @Microsoft where he tracks global cybersecurity laws and regulations in order to identify and mitigate legal risk stemming from compliance obligations. #sharethemicincyber Connect with Dondi on LinkedIn linkedin.com/in/dondi
Dondi is a proud #HBCU graduate & attended @aamuedu, earning a B.S. in Math w a focus in Applied Stats, & as an ugrad student, published research in regression analysis & number theory. As a student, Dondi went everywhere w his TI-82 graphing calculator, which he still has.
Interestingly, @DondiWest’s interest in computers and electronics started as a child, where he was known for taking apart and examining all the electronics around the house including telephones, radios and TVs.
During his freshman year in college, @DondiWest was recruited into the #Navy’s highly selective Baccalaureate Degree Completion Program where he served on active duty while completing his degree. After graduating he attended Officer Candidate School (OCS) & earned his commission.
Following OCS, @DondiWest was trained as a Navy Information Warfare Officer at Navy Technical Training Command, where he learned skills in Intelligence Analysis, Signals Intelligence (SIGINT), Cryptology and Information and Cyber Warfare.
Dondi’s first job in the Navy was on the staff of the Admiral charged with leading the Naval Security Group, where he focused on Network Warfare and Intelligence Analysis
As a Naval Officer, @DondiWest spent the majority of his time on active duty at the NSA, and if you ask him, one of his coolest jobs was working as the Global Targets Desk Officer in the National Security Operations Center (NSOC)...
...where he reported on geopolitical events and threat intelligence for 120 countries spanning Eastern Europe, Sub Saharan Africa, and Latin America. NSOC is famously known as the nerve center of the NSA.
While on active duty serving as an intelligence analyst supporting offensive cyber operations, @DondiWest realized that the law and cybersecurity would intersect, and decided to go to law school. In fact, Dondi’s law school admission essay was about cybersecurity law.
While attending @UMDLaw, @DondiWest served as an Associate Editor of the Maryland Law Review, and he published a paper on Cyber Warfare Law that was the basis for his 60 minute talk at DEFCON 18. DEFCON is the world’s largest hacker convention.
You can check out the video of Dondi's DEFCON18 talk here!
As an evening law student, @DondiWest’s day started at 5am on Ft Meade supporting cyber operations, then he would drive to law school & attend class from 6-9:30pm. He did this for 4 years. He still doesn’t know how he did that. He had to still support his family while in school.
After leaving the Navy, Dondi continued to work in the DoD and intelligence community as a contractor where he supported NSA and U.S. Cyber Command.
As a contractor at Booz Allen Hamilton, @DondiWest also worked during the early days of cyber warfare supporting the Joint Functional Component Command for Network Warfare (JFCC-NW), which is the predecessor organization for U.S. Cyber Command.
While at JFCC-NW, @DondiWest mainly focused on providing intelligence support to U.S. Cyber Operations that countered the online content and virtual radicalization of cyber terrorists and Islamic extremist.
While at JFCC-NW and Cyber Command, Dondi developed a deep passion and understanding of the doctrine laws and policies related to Cyber Warfare, International Cyber Law, and the laws of armed conflict in cyberspace.
Dondi worked as a cyber staff officer for the ODNI’s National Intelligence Manager for Cyber, where he managed portfolios for the entire IC that focused on Supply Chain Risk Management, Cyber Deterrence and Govt-Private Partnership. In this capacity, he reported progress...
...in these areas to the Executive Office of the President, National Security Staff for Cyber.
As a Cybersecurity Attorney, Dondi believes that even private companies must now intimately understand the laws, doctrine & policies related to Information Warfare. He strongly believes that most large companies are or will become unwitting participants in Cyber Warfare campaigns
Dondi credits his Big Mama (grandmother) who raised him with shaping his career, as she was unknowingly the best “intel analyst” he ever knew. She taught him to read at 4 from a newspaper, they still read the paper together & she kept a radio scanner in her living room...
to listen to police communications so they would know everything happening in Selma.
.@dondiwest's grandparents are well known for helping to lead the historic Civil Rights movement in Selma, and even with 11 children, they allowed activists like Representative John Lewis, Stokely Carmichael, and MLK to live with them.
In fact, Jonathan Daniels, a white seminarian and activist was living with the West family at the time of his murder. Here is a pic of Dondi’s mom and uncle with Daniels. commondreams.org/further/2019/0…
Dondi would meet the late John Lewis on the Edmund Pettis Bridge as a result of representing @Microsoft at Lewis’ annual pilgrimage to Selma with @FaithandPolitic and when Dondi introduced himself, Lewis stated “She (Big Mama) took care of us. She took us in when no else would.”
A proud native of #Selma, Dondi wants the world to know that Selma, the birthplace of the civil rights movement, is in crisis. Selma is now ridden with crime, and Dondi loses at least one childhood friend every month to violence.
.@dondiwest wants to challenge all companies to look into how they can invest in the development of Selma, because a debt is owed to his great city. #ShareTheMicInCyber

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Maddie Stone

Maddie Stone Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @maddiestone

27 Aug
I’m really fucking tired. On average, about every week I receive some message about how I’m “unskilled”, “P0’s biggest mistake”, “not technical”. And about every other month one of these messages is posted very publicly or emailed to my managers. 1/7
This is nothing new since I first was an intern. It’s damn clear that the comments are bullshit. That the people taking the time to send me these msgs or create the anonymous accounts are telling a lot more about themselves than about me. But it’s still exhausting. 2/7
If you’re getting these messages too, it’s not about you. I’ve quite literally done everything these folks asked: I’ve done novel research at every level between a die on a CPU and applications. I have the CVEs. Large volumes of my work are publicly available...and yet. 3/7
Read 7 tweets
21 Feb
Lately, I've been watching talks from pre-2010. There's so much important infosec work/history out there, but you need to know what to look for.

What are some of your favorite talks, blogs, events, etc from 2012 or before that you'd recommend to those newer to the industry?
For my "learning Windows" adventure, these have been awesome
* Analyzing local privilege escalations in win32k - @mxatone (2008)
* Kernel exploitation – r0 to r3 transitions via KeUserModeCallback -@j00ru (2010)
* Kernel Attacks through User-Mode Callbacks - @kernelpool (BH 2011)
@mxatone @j00ru @kernelpool I also highly suggest "Professional Source Code Auditing" from BH 2002 by @mdowd @neelmehta @halvarflake Chris Spencer and Nishad Herath

Read 5 tweets
9 Nov 19
I had a conversation today w a man who manages a security team. For me, tbqh this convo was pretty upsetting, but I do think he was coming from a sincere place so hopefully this helps someone else who is also coming from a good place, but is just getting it wrong. THREAD.
The man was chatting about hiring. He said his team is only men, but he gets other women he knows in the industry to come to recruiting events w him because women are much more interested when they see another women there & don’t tend to come up to his booth when it’s just him.
I said, yes, of course. When we see another woman or someone like us on the team, it at least means we won’t be alone. I told him I thought it was false advertising to use other women in this way in order to recruit.
Read 9 tweets
14 Feb 19
I get asked all the time how to get started in binary RE. There are tons of great resources out there, so #1 is just get started with something, anything! But if you're open to suggestions for building a strong, general reverse engineering foundation, here are my suggestions:
1. If you've never taken a computer architecture course or need a refresher: NAND2Tetris. It's free! coursera.org/learn/build-a-… Seriously. It will give you a great understanding of the relationship between Software, Hardware, and the assembly we RE, and it's fun!
2. Learn C. Anyway that sounds good to you is the right way. Why? Pointers & memory are hard. It's even harder to learn them in ASM. Play with C & understand bit operations & how arrays work so they'll be known patterns when you look at them in asm.
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!