Rob T. Lee (@robtlee) 's Twitter Profile
Rob T. Lee

@robtlee

Technical Advisor to US Govt | Chief of Research and Head of Faculty, @SANSInstitute | Cybersecurity Expert & Threat Hunter | Godfather of DFIR

ID: 13867012

linkhttps://linktr.ee/robtlee calendar_today23-02-2008 15:29:56

5,5K Tweet

26,26K Followers

1,1K Following

Rob T. Lee (@robtlee) 's Twitter Profile Photo

When AI meets it's AI parent.... what happens within minutes is kind of wild. Amazing demo from Baratunde at the Aspen Digital Shared Future AI Forum today. The security implications of agent-to-agent (A2A) protocols are worth your attention right now.

Ronald van Loon (@ronald_vanloon) 's Twitter Profile Photo

Beyond encryption: Why #QuantumComputing might be more of a science boom than a #CyberSecurity bust by Rob T. Lee VentureBeat Read more: buff.ly/vf8Qqtx #ArtificialIntelligence #MachineLearning #ML #DeepLearning #Technology cc: Olivier Grisel @miketamir @theadamgabriel

Beyond encryption: Why #QuantumComputing might be more of a science boom than a #CyberSecurity bust
by <a href="/robtlee/">Rob T. Lee</a> <a href="/VentureBeat/">VentureBeat</a>
 
Read more: buff.ly/vf8Qqtx
 
#ArtificialIntelligence #MachineLearning #ML #DeepLearning #Technology 
 
cc: <a href="/ogrisel/">Olivier Grisel</a> @miketamir @theadamgabriel
SANS ICS (@sansics) 's Twitter Profile Photo

🚨 Live at #ICSSummit | Nina Kollars & Jason Vogt share how Taipei ran 9 wargames w/ 160+ participants at CYBERSEC 2025 to game #CyberResilience. Their focus areas? ‣ Power & comms redundancy ‣ Local cyber firm strategy ‣ Offshoring vs onshoring 🔗 sans.org/u/1yvS

🚨 Live at #ICSSummit | Nina Kollars &amp; Jason Vogt share how Taipei ran 9 wargames w/ 160+ participants at CYBERSEC 2025 to game #CyberResilience.

Their focus areas?
‣ Power &amp; comms redundancy
‣ Local cyber firm strategy
‣ Offshoring vs onshoring

🔗 sans.org/u/1yvS
SANS ICS (@sansics) 's Twitter Profile Photo

⚡️ LIVE at #ICSSummit | We're thrilled David Worthington flew in from Australia to show us how Jemena put the #ICS 5 Critical Controls into action & how he goes about reporting the results to the board. 🔗 Join us FREE online now: sans.org/u/1yvS

⚡️ LIVE at #ICSSummit | We're thrilled David Worthington flew in from Australia to show us how <a href="/JemenaLtd/">Jemena</a> put the #ICS 5 Critical Controls into action &amp; how he goes about reporting the results to the board.

🔗 Join us FREE online now: sans.org/u/1yvS
Rob T. Lee (@robtlee) 's Twitter Profile Photo

Appreciate Kevin Townsend and SecurityWeek asking the security professionals. We know we can’t build secret access points into encrypted systems (especially with no visibility for the orgs buying and relying on these tools) and expect them to stay secure. Security needs to be in

Rob T. Lee (@robtlee) 's Twitter Profile Photo

I personally use AI for at least 30 minutes a day and encourage cyber leaders and executives to do the same. You cannot win if you don’t fundamentally understand AI’s benefits and risks. You need a way to reduce risk for implementation, and that starts with seeing where people

Rob T. Lee (@robtlee) 's Twitter Profile Photo

About 15 years ago, I got the chance to learn how to drive offensively. You're driving 80 miles an hour and have to react to things that pop up in front of you every few seconds. With the instructor on our right and something equivalent to a Star Wars blast shield blocking our

Rob T. Lee (@robtlee) 's Twitter Profile Photo

Every now and then, this meme comes in extremely handy. I loved the movie, but immediately went to my computer and generated this. #KPOPDEMONHUNTERS

Every now and then, this meme comes in extremely handy. I loved the movie, but immediately went to my computer and generated this. #KPOPDEMONHUNTERS
Rob T. Lee (@robtlee) 's Twitter Profile Photo

A decade ago, advanced persistent threats (APTs) required months to complete a kill chain from initial compromise to data exfiltration. By 2023, this timeline has compressed to weeks. Massachusetts Institute of Technology (MIT) research reveals that AI-powered adversary systems execute attack sequences 47 times

Rob T. Lee (@robtlee) 's Twitter Profile Photo

We need more experts who understand both AI and cybersecurity. This isn't optional anymore. It's survival. Make AI part of your daily routine. This is a path that I'm on - In order to be healthy today, you need to focus in on four things: to get proper sleep. Get a proper diet.

We need more experts who understand both AI and cybersecurity. This isn't optional anymore. It's survival. 

Make AI part of your daily routine. This is a path that I'm on - In order to be healthy today, you need to focus in on four things: to get proper sleep. Get a proper diet.
Heather Mahalik Barnhart (@heathermahalik) 's Twitter Profile Photo

Are you going to the DFIR Summit this year? I am and cannot wait. Check out what Baby Heather thinks. :) #DFIR #digitalforensics #DFIRSummit SANS DFIR for585.com/dfirsummit25

Rob T. Lee (@robtlee) 's Twitter Profile Photo

Yes, AI will automate certain technical security roles over the next several years. But the need for human ingenuity within cyber defense will ALWAYS remain. Combatting highly sophisticated threat actors across a widened attack surface cannot be accomplished with advanced

Rob T. Lee (@robtlee) 's Twitter Profile Photo

I've seen a continual reduction in cybersecurity investment in the 20 years I've been doing this. Security dollars are never the fun dollars for an organization (as I have been told for many years), but investment in a robust cybersecurity defense - first in talent, then

Rob T. Lee (@robtlee) 's Twitter Profile Photo

Should boards have one deep technologist who can speak AI, or should every member start building technical fluency? It’s both. You need someone who can explain in plain language the implications of AI adoption throughout the enterprise. But the rest of the board can’t just sit

Rob T. Lee (@robtlee) 's Twitter Profile Photo

The US AI Action Plan was released by the The White House yesterday specifically calling out AI incident response. America's AI Action Plan specifically mandates "promote mature federal capacity for AI incident response" as a critical infrastructure protection measure. This

Rob T. Lee (@robtlee) 's Twitter Profile Photo

Proud to share AI Cybersecurity Careers, a strategic guide to high-paying cybersecurity positions in the AI transformation era. This is the first in a series on ten high-demand roles. Organizations need strategic thinkers who can handle problems that literally didn't exist two

Proud to share AI Cybersecurity Careers, a strategic guide to high-paying cybersecurity positions in the AI transformation era. This is the first in a series on ten high-demand roles.

Organizations need strategic thinkers who can handle problems that literally didn't exist two