Download presentation
Presentation is loading. Please wait.
Published byPiers Booth Modified over 9 years ago
1
11 Canal Center Plaza, Alexandria, VA 22314 T 800.663.7138 F 703.684.5189 www.robbinsgioia.com Enterprise Computing Conference (ECC) Workshop Alma R. Cole, CISSP, EACOE VP Cybersecurity Robbins Gioia 6/15/2015
2
Confidential and Proprietary ©2013 Robbins-Gioia, LLC Current Cybersecurity Challenges Increasing dependence on Information Technology Increasingly greater complexity in systems and interconnections Shortage of qualified cyber security personnel Wide spread in security requirements, system architectures, and risk tolerance One size does not fit all
3
Confidential and Proprietary ©2013 Robbins-Gioia, LLC Increase in cyber threat actor skills, organization, and motivation Increasing frequency and intensity of attacks Ineffectiveness of traditional security tools due to constantly changing attacker Tactics, Techniques, and Procedures Attacks Constantly Evolving 3 Increases in data breaches and intrusions
4
Confidential and Proprietary ©2013 Robbins-Gioia, LLC Needs for turning the tide against cyber intrusions 1.Grow and develop technical cybersecurity practitioners “Cyber ninjas wanted” Understand hacker methods and how to use security technologies to detect and prevent them Developing skilled analysts capable of finding the new attacks through use of network traffic analysis, malicious code reverse engineering, intrusion forensics, and etc. Understand cyber vulnerabilities and how to remediate them
5
Confidential and Proprietary ©2013 Robbins-Gioia, LLC 2. Develop cyber-savvy business professionals “To defend the organization you need to understand the organization” Develop Security Enterprise Architecture experts and methods to assure understanding, alignment, and context Ensure that cyber risk and security requirements to support business objectives can be prioritized and effectively communicated to business leadership Needs for turning the tide against cyber intrusions (cont.) 5
6
Confidential and Proprietary ©2013 Robbins-Gioia, LLC 3. Develop next generation tools and platforms Security programs and tools should be designed to plan for failure Apply organizational context, cyber intelligence, and trends to make sense of the data Develop systems capable of sharing cyber information at machine speed Needs for turning the tide against cyber intrusions (cont.) 6
7
Confidential and Proprietary ©2013 Robbins-Gioia, LLC Cybersecurity risk is at an all time high due to increasing dependency on IT, complexity of systems, and sophistication of cyber threats The next generation of cyber professionals must not only have the correct technical knowhow but must understand the organization and the language of business to adequately align security programs, optimize security tools, and communicate risk and requirements to business leaders Design security programs to expect failure but learn from it adapt to changing attacks Develop security tools to make sense of the noise and to utilize and share cybersecurity information Summary Thoughts 7
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.