Transforming Cybersecurity to Protect Our Citizens, Infrastructure & Economy
A perfect storm of forces has stretched traditional cybersecurity to a breaking point. Federal civilian agencies, military organizations and the intelligence community must continue to address the opportunities and challenges in digital transformation and cloud adoption while understanding how enemies get into the network and preventing harm. Legacy solutions that focus on threat blocking and static assessments will fail in this digital world. A totally new approach to cyber is needed to protect our nation, citizens, infrastructure and economy.
CDM: A New Way to Defend
Fireside chat with Kevin Cox, the CDM Program Manager. Continuous Diagnostics and Mitigation (CDM) can help federal agencies become more prepared by becoming more proactive. A discussion on the current and future status of the civilian government CDM program.
Signal to Noise — How Analytics Help Security Analysts Identify & Mitigate Real Risks
Today's typical security stack can produce a lot of data: network logs, endpoint security logs, sensor data, change events, etc. Security analysts are drowning in a sea of noisy security alerts, including a lot of false alarms, and it’s not cost-effective to keep hiring more and more analysts to sift through all the alerts. Learn how leading organizations are sorting through all this noise to identify the signals that point to real, imminent risks, and take action to mitigate.
Empowering the Smart & Secure Adoption of Cloud Solutions
A key step in any digital transformation strategy is figuring out how to best leverage cloud – from IaaS to SaaS – to continue to expand capabilities and improve service delivery anytime, anywhere for agency constituents to better achieve mission objectives. Hear how government agencies and departments can benefit from the security lessons and improvements driven by commercial enterprise adoption.
Securing Critical Infrastructure Across Daunting Domains
This panel of experts will address some of the key problems organizations face as they manage security around the confidentiality, integrity and availability of Critical Infrastructure systems. Hear how agencies work across the operational aspects of the infrastructure including their manufacturer ecosystem necessary to support them and the unique security challenges these areas face in the evolving threat landscape.
Insider Threats Walking Upright & Right Through Your Doors
The evolution of threats mirrors the March of Progress – from an unrecognizable enemy to a regular guy walking upright, right through your company’s doors with new tactics to commit fraud and sabotage. In today's zero perimeter world, we need to be more focused on dealing with internal threats, not just external. This panel will discuss effective insider threat mitigation drawing on decades of experience to discuss what works and what does not. They'll highlight the need to recognize context and intent of user behavior for early and accurate threat detection and the future of effective mitigation through risk adaptive protection.