recommendations for
play

Recommendations for Improved DIB Cybersecurity Dr. Eric Cole SVP - PowerPoint PPT Presentation

Recommendations for Improved DIB Cybersecurity Dr. Eric Cole SVP & CTO of the Americas eric_cole@mcafee.com April 7 th , 2010 About Dr. Eric Cole Previous Federal Cybersecurity Official (IC) Previous cybersecurity chief


  1. Recommendations for Improved DIB Cybersecurity Dr. Eric Cole SVP & CTO of the Americas eric_cole@mcafee.com April 7 th , 2010

  2. About Dr. Eric Cole • Previous Federal Cybersecurity Official (IC) • Previous cybersecurity chief scientist at major DIB corporation • Member of commission on cyber security for the 44 th President • Performed security assessment, analysis and network designs for several large DOD and federal agencies • As McAfee CTO Americas has visibility into best practices from all major sectors of economy (ex. Financial Services, CI/KR, Government, DIB) 2 2 McAfee Risk and Compliance April 22, 2010

  3. Background • Our recommendations are based on proven best practices drawn from throughout society, not just .gov and .dib • While much has been done, much more can be done • No silver bullets • Security is about mission enablement and incident cost avoidance • As a subcontractor to many DIB primes, we too would be subject to proposed DFARS

  4. Key Drivers for Cyber Security • The threat environment is changing More stealthy, constantly changing, encrypted, hybrid • Requires a new approach to managing and controlling vulnerabilities • Signature approaches no longer scale • Look at outbound traffic performing clipping level analysis • Internal threat as important as the external threat 4 April 22, 2010

  5. A 21 st Century Approach to Cybersecurity • Common security posture baseline and regular re- assessment of people, process and technology • Common training and certification regimes (SANS, ISC, DoD 8570) • Common process best practices – ITIL, ISO, CAG • Adoption of proven defense-in-depth security architectures – NIST, DoD • Enhanced situational awareness, continuous monitoring and real time actionable global threat intelligence (GTI) drawn from within .mil, .gov, .dib, and worldwide

  6. Conclusion – Securing the Government • Focus on data and protection of information – Data is more portable – Virtualization – Cloud computing • Continue to secure the endpoint – Complement traditional measures with behavioral HIPS (host based intrusion prevention) • Move security to virtualized environments • Secure the cloud • Prevention is ideal but detection is a must – Attacks are going to happen – Focus on timely detection in cases where prevention is not possible • Mission resilience 6 April 22, 2010

  7. THANK YOU FOR YOUR TIME

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend