Shane M. Barney
Chief, Information Security Division, Chief Information Security Officer
Gerald Caron III
Director of Enterprise Network Management
Bureau of Information Resources
U.S Department of State
Cloud assets are dynamic and so are the threats. What is authorized and how should an agency monitor what is real and what is a threat? How are agencies monitoring real time threat verification?