Military Lessons on Cyberdefense
with Dr. Marcus ThompsonDr. Marcus Thompson is a retired Major General and former Head of Information Warfare for the Australian Defense Force. In this episode, Dr. Thompson talks with Alvaro Vitta about best practices for protecting sensitive data and making risk-based decisions.

This is a show for anyone who cares about using digital approaches in the public sector to deliver better outcomes. We explore stories from around the world, where public servants have been successful at driving change. We meet the people behind the stories, to hear their first-hand experiences and lessons learned. Throughout the series we discuss technology and trends, as well as the cultural aspects of making change happen.
On the second episode of our cybersecurity mini-series, Dr. Marcus Thompson talks with guest host, Alvaro Vitta about military lessons on cyber defense. He shares best practices for protecting sensitive data and why making risk-based decisions is so important.
Alvaro Vitta [host] | LinkedIn
Marcus Thompson [guest] | LinkedIn
Microsoft Public Sector Center of Expertise for more information and transcripts of all episodes
Discover and follow other Microsoft podcasts at aka.ms/microsoft/podcasts

Episode summary
Dr. Marcus Thompson is a retired Major General and former Head of Information Warfare for the Australian Defense Force. On the second episode of our cybersecurity mini-series, Dr. Thompson talks with Alvaro Vitta about best practices for protecting sensitive data and why making risk-based decisions is so important.
Listen to this episode on any of these podcast platforms:
How does the military protect sensitive data?
Dr. Marcus Thompson is a retired Major General and former Head of Information Warfare for the Australian Defense Force. Since leaving the Australian Army Marcus has founded Cyber Compass. On the second episode of our cybersecurity mini-series, Dr. Thompson talks with Alvaro Vitta about best practices for protecting sensitive data and why making risk-based decisions is so important.
A diverse set of experience
Dr. Marcus Thompson is the founder of CyberCompass, an independent advisory focused on improving cyber security. But before his current role, he spent over three decades of his career serving in the Australian Army. Heโs served on deployments to East Timor, Iraq and Afghanistan, he holds a PhD in cybersecurity, and he was named Head of Information and Warfare for the Australian Defense Force. Thompson holds a plethora of mission-driven capabilities that a lot of organizations, both government and non-government, can learn from.
โI find myself reflecting on what lessons Iโve learned in the past 18 months since leaving the military and leaving government service, and I think that there are some really helpful observations that I think my former colleagues, you know, certainly in the Australian Department of Defense and elsewhere, could use and the biggest observation Iโve had is that I think industry can do more, and government can facilitate industry doing more.โ
Thompson continued, โAnd I think the key thing here is, let government do what only government can do, and then look for opportunities to bring industry in to help with the rest. Because that deep technical expertise that resides within industry, I think the ability of industry to innovate, and innovate at scale, just remains something that I think certainly in Australia government could perhaps do a bit better. You know, the bureaucrats could be a bit better with that.โ
Self-defense, passive defense and active defense
Government organizations have to navigate the challenge of protecting their sensitive data while also having access to it and using it. It can be crucial not to let your guard down.
โJust remember that there is a threat, there is a cybersecurity threat out there. The threat is real, the threat is active, and it wishes you harm, it wishes your organization harm, it wishes your family harm, it wishes your nation harm. And I think all good comprehensive approaches to cybersecurity start with a recognition that the threat is real, that itโs active, and that it wishes you harm.โ
Thompson suggests thinking about protecting data in three different ways: self-defense, passive defense, and active defense.
โWhat are we posting on social media, what are we freely giving away to the internet at, what is our workforce doing, that a professional threat actor, with a targeting mindset can turn around and use against us โ to attack us, you know socially-engineered phishing campaigns. Itโs about culture and awareness, so when youโre thinking about your self-defense, have a look at your culture. You can just continue to bang the drum about the importance of cybersecurity and encouraging all of the workforce to not be the weakest link. Thatโs self-defense.โ
โPassive defense, I mean this is the domain of our system administrators, our CIOs, and maybe our CISOs. This is where we think, you know, howโs our network hygiene? Are we patching our systems? Are we patching our hardware? Are we patching our software? Do we have multifactorial authentication incremented within our organization? How many people have administrator rights, you know, have that privileged access, who might then become a potential sort of insider threat?โ
โAnd then the active defense โ well, this is the bit where we say, all right, we know that if we implement good hygiene, good network hygiene, weโre patching, weโve got multifactorial authentication and all that, all those important functions, you know, thereโs still a chance that a sophisticated threat actor can get in, can get past those defenses, so what have we got? Do we have a highly capable security operations center, the ultimate risk mitigator, looking at our infrastructure to immediately detect, contain and resolve any penetrations, any breaches of our security?โ Thompson said.
Make decisions based on risk
According to Thompson, a compliance-based approach isnโt enough in the cyberdefense environment.
โWhen thereโs a new piece of malware on the streets, every seven to twelve seconds, you know, you might be compliant, at that nanosecond, in that instant, you might be compliant, but a moment later, youโre now being noncompliant.โ
Whatโs needed, he said, is a risk-based approach. And hereโs why:
โIt is not possible to bring the cybersecurity risk to zero. Thatโs just not a thing, so you know, a sensible conversation amongst leadership groups about cybersecurity risk, what we tolerate, what we canโt tolerate, and therefore, what we need to invest, today and into the future. These are sensible discussions that smart generalists can have, within government and outside government, and you donโt need to be a cybersecurity Jedi to have those sensible conversations.โ
Have those important conversations, invest in defense, and then what?
โAnd then monitor it, and then continue to monitor it, you know, are our settings right? Are we being true to our stated tolerance? Is our investment right? Is there something new that has changed our risk landscape, and these are right now in Australia, these are standard agenda items at board meetings for commercial entities and government entities, especially those who are now classified as critical infrastructure within Australia,โ Thompson added.
What government organizations should avoid
โI still see folk, especially in government, thinking they can do everything, and thatโs just really hard, weโve got, Iโm sure itโs well, in fact, I know itโs the same, around the world, but Iโll keep my commentary to Australia where weโve got a significant workforce shortage when it comes to cybersecurity professionals. My personal observation, anecdotally, is that weโre probably 30 to 35% underdone in terms of the number of quality cybersecurity professionals that we need here to defend our economy.โ
Thompson added, โI know that thereโs plenty of cybersecurity professionals work within government, just as there are plenty of cybersecurity professionals who work outside of government. And Iโd just offer that this is a unique workforce. You know, this is a workforce that is naturally curious, that is in a hurry, and that, if we can put it frankly, knows its value. And, the curiosity piece means that theyโre always looking to develop new skills. And if youโre not, if youโre not a big enough organization to hold a subsidiary workforce of sufficient size to satisfy that curiosity and provide those career opportunities for these individuals, then they will go somewhere else.โ
โSo, I sort of say, in effect, look, especially if youโre a small government entity, donโt try and do this yourself. Bring in the experts to do it for you, and let that workforce management challenge be their problem, not yours, because I think beyond the really big government entities it is really hard to hold that sort of capability internally.โ
Itโs a continuous journey
There are practical things that government organizations can do to help themselves optimize their data protection journey.
โNumber one is the labeling of data. Then you can store it and itโs easier to protect and secure. But I think also, I mean, even from a capability perspective, you know, none of us know what artificial intelligence technologies might come into the future. And so far, all weโre really seeing is automation rather than anything, sort of Terminator-like, you know, neurocognitive when it comes to artificial intelligence. But irrespective of what artificial intelligence technology comes in the future, itโs going to be dependent on data. And if that data is not labeled and stored, and getting all those policies squared away now, if that data is not discoverable, that technology would be useless,โ Thompson said.
Labeling data seems pretty simple and straightforward, but what else can organizations be doing?
โI think the other thing is, because our appetite for digital information, for data and for electronic devices, internationally, is insatiable. Our dependence on electronic devices and digital information data is growing exponentially, you know, every day. and I see no sign of that slowing down. So, policies around data discoverability and how long you have to keep it. And obviously, yeah, Microsoft has a significant product offering in that regard. So, hey, government, are you just going to continue to build and operate datacenters, or do you bring industry in to help you with that, whatever classification of data that you need for your โ you know, within government?โ
โI think theyโre the sorts of things that, from a pure data protection play, people can be thinking about, you know, that thereโs policy aspects here, thereโs technology aspects here, and thereโs human behavioral aspects here,โ Thompson concluded.
About the Center of Expertise
Microsoftโs Public Sector Center of Expertise brings together thought leadership and research relating to digital transformation in the public sector. The Center of Expertise highlights the efforts and success stories of public servants around the globe, while fostering a community of decision makers with a variety of resources from podcasts and webinars to white papers and new research. Join us as we discover and share the learnings and achievements of public sector communities.
Questions or suggestions?







