Time and time again, data breaches demonstrate the pitfalls of relying on detection to identify malicious activities taking place on the network, rather than prevention of the threat in the first place. The emphasis—post event—has been what the agency did wrong.
But, what if we took a different approach that allowed agencies to share what has been working for them? Both before and after. Some tips and lessons from folks who have been thru the crisis. What worked best—cross domain intel, filtering, content inspection, hardware separation— or other approaches that helped mitigate the issue.
This event will bring together industry and government cybersecurity experts to discuss
what is working for U.S. cybersecurity efforts, how these successes can be applied by other agencies, and other areas for continued work and improvement.