John Streufert: I appreciate Rod bringing that up. The Center for Strategic and International Studies has told us that 75% of the attacks used known vulnerabilities that could be patched and more than 90% of the successful tax require only the most basic techniques to mitigate and perhaps overriding importance, 96% of the successful breaches that they had monitored can be avoided if the department or agency puts in place simple or intermediate controls.
So what Rod is looking forward to is the future point where the basic hygiene trust in hardware objects, trust in software objects can contribute to weather map that would indicate what parts of the government sector under greatest stress. And those that are working on the future weather map technology look at CDM as foundational because we can’t draw a conclusion without knowing about the hardware assets and software assets that are out there and under management.
JIm Flyzik Sure.
00:01:04 END OF AUDIO
…Read more
Less…