As the federal government shores up its systems and workforce, agencies must avoid defending against yesterday's cyber threats. New technology can make phishing attempts harder to detect and have users questioning the authenticity of data, images and information.
To explore tomorrow’s technology and threats, Defense One and Nextgov teamed up for the first-ever Cyber Summit. On November 19th federal and defense experts discussed new hiring authorities and training programs, cyber policy, tech modernization, threats against election security, offensive cyber ops and new initiatives to strengthen information verification.
Registration & Networking
Hiring and Training Tomorrow’s Cyber Workforce
Metrics-Driven Security: What You Need to Know
CrowdStrike’s 2019 Global Threat Report details how adversaries take an average of 1 hour and 58 minutes to turn initial access into an environment, into a full security incident. Measuring and understanding this “Breakout Time,” is central to designing a responsive and realistic security program. This is a crucial window to stop the breach – but is not the only metric you need to know. When an attack is in progress, you have on average of one minute to detect it, 10 minutes to understand it and one hour to contain it. Is your organization ready to meet the 1-10-60 Rule challenge? Learn the key steps you can take to improve your organization’s ability to rapidly detect, investigate and remediate threats; as well as the best practices for preventing, detecting in less than 1 minute, analyzing in less than 10 minutes, and responding in less than 60 minutes to stop adversaries
Industry Perspective: Combating Cyber Threats
Fact vs. Fiction: How the Government is Changing Information Verification
A Session Presented by our Underwriter HP Federal
Will the Future be Safer? Looking Ahead to Tomorrow’s Cyber Landscape