Subscribe
About
RSS
Brought to you by
Government
Transportation
Healthcare
Technology
Financial
Watch
Listen
Attend
Content Studio
Amazon's Michael Cotton on how automation is changing cybersecurity
Nov 13, 2018 | CYBERSCOOP
-In this Story-
Michael Cotton Amazon
Watch now
Previous
More
Check Point's Edwin Doyle on the changing cybersecurity landscape
HP's Tommy Gardner on how quantum computing will change cybersecurity
Cisco's Peter Romness on how organizations can support their cybersecurity workforce
SailPoint's Jim Russell on AI's future impact on cybersecurity
Paul Welch's vision: Automation, automation, automation
Google's Daniel Prieto on the shortages in the cybersecurity workforce
Intel's Steve Orrin on where malware is headed
Google's Jason Callaway on how to stay resilient
VMWare's Bill Rowan on how the incoming workforce will change cybersecurity
Amazon's Tim Anderson on machine learning's impact on cybersecurity
Amazon's Eric Brandwine on AI's practical developments
IBM's Adewale Omoniyi on emerging technologies in cybersecurity
IBM's Ian Doyle on the growing importance being placed on resilience
IBM 's Joe Hamblin on how frameworks lead to cybersecurity maturity
DHS's John Costello on improving election security
Robby Mook on how election security is evolving
DHS Steve Rice on how the workforce is changing
NSA's Rob Joyce on how threat awareness has improved
DHS's Chris Krebs on how cybersecurity is changing
Forcepoint's Guy Filippelli on holistic security buying
TSA’s Paul Morris advises culture change for better cyber intelligence
SBA's Beau Houser on how to raise the maturity level of operations
Tackling cybersecurity from the 'inside out'
How network structure can enhance threat intelligence
NSA's Mark Hakun on how everyone is responsible for network security
NSA's David Hogue on streamlining threat intel
USDA's Chad Sheridan on tailoring cybersecurity plans for humans
Security is nothing without context
Booz Allen's Brad Stone on the effectiveness of threat intelligence
Lauren Knausenberger on the growing threat landscape
Commerce Department's Rod Turk on knowing your network
NYC CISO on threat intelligence's integral security role
FireEye's Sandra Joyce on the benefits of threat intelligence
Rob Karas on the different ways to approach a cybersecurity strategy
DHS's John Felker on how to be effective with security tools
FireEye's John Watters on the dynamic nature of threat intelligence
DHS official Chris Krebs on guarding your 'crown jewels'
How the Army leverages threat intelligence
FireEye's Rob Caldwell on the advantages of threat intelligence
Will two-factor authentication ever be widely used?
How GDPR has changed companies' data retention policies
How North Korea's hackers have changed
The value in sharing threat intelligence with other organizations
The three stages of patch management around WannaCry
Is malware hiding in your Kodi box?
What deception can do for your enterprise
Can the growth of secure communications products continue?
The growing threat to industrial control systems
Breaking down Olympic Destroyer's false flags
How 'Code Like a Girl' aims to keep girls involved in STEM
How GDPR is changing the cybersecurity conversation in the C-suite
Keeping IT threats away from OT systems
Criminals want to use industrial systems to mine cryptocurrency
How enterprises can deal with the influx of IoT devices
Pushing IT and OT to blend their security work together
Election security goes beyond federal dollars
How adversaries are using brand reputation in their attack plans
How IoT is being leveraged for cryptojacking
Washington's growing love affair with bug bounty programs
How to deal with the growing threat of massive DDoS attacks
How AI is being leveraged for social engineering attacks
Sophisticated, automated bot use is growing
The growing relationship between IT and OT
What it takes for enterprises to be cyber resilient
A 'playbook' for every APT
How the federal government is dealing with the ever-changing perimeter
Why DNS resolvers are having a moment
Allowing mobile solutions to be secure and successful
The impact of the NIST cybersecurity framework
How the DOD is operationalizing automation
Guarding against the unknown threats
Moving the threats away from your employees
The 'right' security conference in the making
Fusing security with usability
Paving the way for the future
Tackling the challenges of enterprise mobility management
How tech is helping train a new line of warfighters
Moving the federal workforce into the next decade
Tony Scott - Accelerating innovation in government
How the U.S. Air Force is moving to mobile
What VR can teach our warfighters
How mobile security is leading to better productivity
How mobile applications are helping to move U.S. Courts away from legacy systems
Accelerating Innovation in Government - DISA's Terry Carpenter
Hardware's role in stopping hacks
The need to improve our cybersecurity fundamentals
The need for a holistic security view
How to combat the cybersecurity workforce shortage
How Pennsylvania is making cyber resiliency fun
The adjustments needed to keep up with today's adversaries
The two things organizations should do to be more proactive
Why working with government investigators can be a huge deterrent to cybercrime
Why everyone in an organization needs to understand cyber-risk
Why the easy cybersecurity problems should be left to automation
It's simple: Follow good cyber hygiene practices
The thought process behind the 'cyber moonshot'
Why protecting the edge (and not the network) is so vital
How Illinois has built resiliency into its state laws
Why DHS is embracing DMARC
Why security should be shifted into the design phase
Why your entire organization needs to be in the security feedback loop
Why the cybersecurity field hasn't seen the worst of the storm
Why complexity is the enemy of good cybersecurity
Why every organization needs to think about automation
Changing the cybersecurity mindset of your entire organization
Why cybersecurity isn't something you just buy
The need to make cybersecurity part of your business strategy
The pressing need to change cybersecurity's model
Why identity matters so much to cybersecurity
Make no mistake. Cybersecurity is a battlefield.
Why we need to stop calling cybercriminals 'hackers'
Why the cybersecurity basics matter so much
How to raise the maturity level of network defenders
How North Dakota keeps threats away from employees
The real difference between cybersecurity in the public and private sector
Why cyber hygiene is of the utmost importance for every organization
Why all employees should adopt the 'when, not if' mindset
The two things organizations can do to be more proactive
How CSRA is helping agencies embrace agile
The fundamentals of cyber resilience
How the Marine Corps is making next-gen IT a reality
How quick server recovery can lead to cyber resiliency
How to manage the push to next-gen IT
How Iowa protects its networks from DDoS and ransomware
The coming boom in cyber insurance
How to securely move your enterprise to the cloud
Why user awareness is so important for cyber resilience
A new project that helps with DNS security
How CompTIA is working to stem the cybersecurity workforce shortage
How enterprises are using machine learning for security
How to change your systems without disrupting your users
Texas CTO on educating end users about email threats
How organizations can thwart destructive cyberattacks
What cloud's continued growth means for information security
Qualys CISO Mark Butler on the need to simplify your security plan
How organizations can benefit from adaptive authentication
The evolution of destructive cyberattacks
How NASA is fitting supercomputers in small packages
South Dakota CSO on making sure attack triggers never each employee inboxes
The move to 'purple team' security operations
How terrorists' movement is being anticipated in cyberspace
Why more enterprises should be paying attention to machine identities
How the NIH is moving its mission to the cloud
Creating a insider threat program that won't scare your employees
Keeping end users away from bad email security decisions
The importance of finding actionable data in a threat intelligence deluge
How industrial enterprises can adapt to ICS attacks
Why attributing NotPetya is a tricky endeavor
What will become the new alpha of dark web marketplaces?
F5's David Holmes on how quantum computing will change encryption
How the D.C. government made its email resistant to cyber threats
The disconnect between the security industry and security practitioners
What needs to change with the government's vulnerability disclosure process
Ixia's Scott Register on how enterprises can implement TLS 1.3
Optiv's Ping Look on the need for a security 'feedback loop'
Vera's Prakash Linga on how enterprises can stop extortion attacks
F-Secure's Mikko Hypponen on how we should deal with artificial intelligence
Duo Security's Wendy Nather on her anti-FUD approach
Can international cyber norms ever be achieved?
Solving the gaps of cyber preparedness
Veracode's Tim Jarrett on advancements in app security
Ron Carback on how the intelligence community relies on public-private partnerships
Rick Gordon on where funding is headed in the cybersecurity market
Philip Reitinger on pushing prevention when it comes to stopping cybercriminals
DHS's Nadia Carlsten on how the government is funding security startups
Endgame's Mike Nichols on how enterprises should adopt automation
NERC's Marcus Sachs on keeping APTs away from critical infrastructure
Melissa Ho on how security startups can get involved with DHS
Mark Turnage on the 'secret sauce' of scanning the dark web
BT's Mark Hughes on the cycle of cybersecurity trends
Karen Evans on the growth of U.S. Cyber Challenge
Cybereason's Israel Barak on changing information security's mindset
ZeroFOX's Evan Blair on social media security
Tony Cole on the government's improving cybersecurity posture
Sqrrl's Ely Kahn on the rise of threat hunting
Bugcrowd's Casey Ellis on growing bug bounties outside of tech firms
NSS Labs' Vikram Phatak on his company's role in the infosec community
Rapid7's Harley Geiger on tech policy in the new administration
Synack's Jay Kaplan on bug bounties and the federal government
Varonis' David Gibson on holistic security
SonicWall's Bill Conner on helping enterprises fight ransomware
Ixia's Steve McGregory on how businesses are responding to Mirai
Raytheon's Joshua Douglas on moving from reactive to proactive cybersecurity
Abhinav Gupta on how Samsung makes Android secure
Intel Security's Steve Grobman on evolving threats and enterprise endpoints
Splunk's Monzy Merza on how enterprises are embracing automation
Verizon's Bryan Sartin on the latest data breach trends
HackerOne's Mårten Mickos on his burgeoning bug bounty empire
CA Technologies' Mo Rosen on partnering with the public sector
Carl Leonard on cyber criminals' customer service evolution
Comodo's Kenneth Geers on on the future of cyberwar
Troy Hunt on keeping your company's data protected
RSA's Niloo Howe on business-driven security
MITRE's Bobbie Stempfley on what's next in cyber policy
Bob Gourley on cutting edge tools debuting at RSA
Rep. Michael McCaul on DOD and DHS's role in cybersecurity
Recorded Future's Levi Gundert on the changing world of cybercrime
Koolspan's Elad Yoran on mobile being the 'digital front line'
Cisco's Will Ash on how feds are upping their cybersecurity game
AmEx's Ann Barron-DiCamillo on demystifying cybersecurity myths
Rep. Gerry Connolly on how proposed IT laws could upgrade federal cybersecurity
Where the White House has come from — and is moving toward — on cybersecurity
Should the government be doing more on the private side when it comes to cybersecurity?
Intel's Brian Dye on how industry can support the feds' cybersecurity goals
VA's LaVerne Council discusses agency progress on cybersecurity
RSA President Amit Yoran on the new security paradigm
FedMentors: GSA's Matt Goodrich
FedMentor of the week: Paul Cunningham
FedMentor of the week: Jill Singer
FedMentor of the week: Thomas Bayer
FedMentor of the week: Paul Sforza
FedMentor of the week: Robin Crisp
FedMentor of the week: Denise Wofford
FedMentor of the week: Xavier Hughes
FedMentor of the week: Henry Sienkiewicz
FedMentor of the week: Neal Ziring
FedMentor of the week: Richard Spires
FedMentor of the week: Chris Willey
FedMentor of the week: Dan Risacher
FedMentor: Wolf Tombe
FedMentor of the week: Avi Bender
FedMentor of the week: Sasi Pillay
FedMentor of the week: Mark Schwartz
FedMentor of the week: Jose Munoz
FedMentor of the week: Robert Bectel
FedMentor of the week: Dean Hall
FedMentor of the week: Peter Fonash
FedMentor of the week: Howard Schmidt
FedMentor of the Week: Jerry Davis
FedMentor of the Week: Dorine Andrews
FedMentor of the Week: Kimberly Hancher
FedMentor of the Week: Bill Marion
FedMentor of the Week: Jeff Cotter
FedMentor of the Week: James Craft
FedMentor of the Week: Stan Buch
FedMentor of the Week: Angela Bailey, Deputy Associate Director, Recruitment & Hiring, OPM
FedMentor of the Week: Randy Laye, Edgewood Chemical Biological Center Engineering Deputy Director, Army
FedMentor of the Week: Jerry Williams, CIO, Dept. of Housing and Urban Development
FedMentor of the Week: Patrick Howard, Chief Information Security Officer, NRC
FedMentor of the Week: Danny Harris, CIO, Department of Education
FedMentor of the Week: Nick Skytland, NASA
FedMentor of the Week: Linda Cureton, CIO, NASA
FedMentor of the Week: Peter Tseronis, Chief Technology Officer, DOE
FedMentor of the Week: Michael Kane, CHCO, Dept. of Energy
FedMentor of the Week: Lt. Gen. William T. Lord
FedMentor of the Week: Micheal Carleton, CIO, HHS
FedMentor of the Week: Izella Dornell
FedMentor of the Week: Roger Baker
FedMentor of the Week: Mary Davie
FedMentor of the Week: Brigadier Gen. Steven Spano
FedMentor of the Week: David Wennergren
FedMentor of the Week: Gary Galloway
FedMentor of the Week: Donna Dodson
FedMentor of the Week: William “Bill” Klein, Edgewood Chemical Biological Center Engineering Associate Director, Army
FedMentor of the Week: Todd Park, CTO, HHS
Search for:
The best cybersecurity news, delivered straight to your inbox.
Sign up for our daily newsletter.
Privacy Policy
We use cookies
to provide you with the best experience across all Scoop News Group websites. By using Scoop News Group websites, you consent to the use of cookies.
Learn more
GOT IT!