Search for tag: "security"

Defense Cloud Computing-Security-DISA-Part 3 Nov. 2013

David Bennett: Take that is absolutely on target. The identity piece of this is going to be key as we move forward as we put enterprise email into place. We created identity synchronization service…

From  Kevin Jackson 21 plays 0  

Cybersecurity-Vision-DHS-Jan. 14

Brendan Goode: Certainly the threat doesn’t go away. JIm Flyzik: Yeah. Brendan Goode: I think there’s too much of a reward for people that are successful. The low bar venture to get in to…

From  Kevin Jackson 17 plays 0  

Cybersecurity-Progress-DHS-Jan. 14

Brendan Goode: In particular I see it as an era of increased focus on information sharing. I think that's one of the most challenging and significant strategic challenges that we face, in…

From  Kevin Jackson 9 plays 0  

Cybersecurity-Programs-DHS-Jan. 14

Brendan Goode: That's a tough question, because we've had several successes at the department over the past year. I'd like to pick one that's specific to me, which is the Einstein…

From  Kevin Jackson 33 plays 0  

DHS-Cybersecurity-Priorities-Jan. 14

Brendan Goode: Sure. First of all, it’s always fun doing these panels because you continue to see common themes being shared. JIm Flyzik: Really, yeah. I’m taking little notes here when I…

From  Kevin Jackson 13 plays 0  

Cybersecurity-Challenges-DHS-Jan. 14

Brendan Goode: Sure. Cybersecurity is a problem that if you allow the scaling complexity to overwhelm you, it can quickly. And capacity is an issue behind that as well. One thing we’ve been…

From  Kevin Jackson 11 plays 0  

FEF-Virt-DCC-Viewing Security-US Army-April 2014

From  Kevin Jackson 1 plays 0  

FEF-Virt-DCC-Viewing Security-US Air Force-April 2014

From  Kevin Jackson 2 plays 0  

Continuous Monitoring-Profiles-DHS-June 2014

John Streufert: I appreciate Rod bringing that up. The Center for Strategic and International Studies has told us that 75% of the attacks used known vulnerabilities that could be patched and more…

From  Kevin Jackson 2 plays 0  

Continuous Monitoring-Progress-DHS Part 3-June 2014

John Streufert: Well, Jim, I’d like to narrow it down to just one… JIm Flyzik: Okay. John Streufert: But I’m pleased to report to you that at this juncture, the focus of our…

From  Kevin Jackson 2 plays 0  

FEF-Continuous Monitoring-Lessons Learned-DHS-June 2014

From  Kevin Jackson 2 plays 0  

FEF-Secure Cloud Computing-Security-NGA #3-May 2014

From  Kevin Jackson 8 plays 0  

Secure Cloud Computing-Security-Labor-May 2014

Dawn Leaf: So, I think I’d like to add a slightly different perspective. JIm Flyzik: Okay. Dawn Leaf: So the security requirements for IT systems and services are the same whether they’re…

From  Kevin Jackson 3 plays 0  

Secure Cloud Computing-Security-Army-May 2014

Ltc Paul Stanton: Yes, sir. It’s a huge concern for us. As we move towards a goal of creating a virtually consolidated data store, we have to consider the threat environment and the fact that…

From  Kevin Jackson 13 plays 0  

Defense Cloud Computing-Security-US Army-Nov. 2013

Gary Blohm: When we went to enterprise email and we first do our transition to it. It was a little rough at first. It was rough because we did not have standard practices. Security in otherwise will…

From  Kevin Jackson 3 plays 0  

Defense Cloud Computing-Security-Air Force-Nov. 2013

Frank Konieczny: We are addressing it in a very interesting way. We are addressing it in moralistic from both the network and from both of the data viewpoint. First of all, the cloud broker is…

From  Kevin Jackson 1 plays 0