|
David Bennett: Take that is absolutely on target. The identity piece of this is going to be key as we move forward as we put enterprise email into place. We created identity synchronization service…
|
|
Brendan Goode: Certainly the threat doesn’t go away.
JIm Flyzik: Yeah.
Brendan Goode: I think there’s too much of a reward for people that are successful. The low bar venture to get in to…
|
|
Brendan Goode: In particular I see it as an era of increased focus on information sharing. I think that's one of the most challenging and significant strategic challenges that we face, in…
|
|
Brendan Goode: That's a tough question, because we've had several successes at the department over the past year. I'd like to pick one that's specific to me, which is the Einstein…
|
|
Brendan Goode: Sure. First of all, it’s always fun doing these panels because you continue to see common themes being shared.
JIm Flyzik: Really, yeah. I’m taking little notes here when I…
|
|
Brendan Goode: Sure. Cybersecurity is a problem that if you allow the scaling complexity to overwhelm you, it can quickly. And capacity is an issue behind that as well. One thing we’ve been…
|
|
|
|
|
|
John Streufert: I appreciate Rod bringing that up. The Center for Strategic and International Studies has told us that 75% of the attacks used known vulnerabilities that could be patched and more…
|
|
John Streufert: Well, Jim, I’d like to narrow it down to just one…
JIm Flyzik: Okay.
John Streufert: But I’m pleased to report to you that at this juncture, the focus of our…
|
|
|
|
|
|
Dawn Leaf: So, I think I’d like to add a slightly different perspective.
JIm Flyzik: Okay.
Dawn Leaf: So the security requirements for IT systems and services are the same whether they’re…
|
|
Ltc Paul Stanton: Yes, sir. It’s a huge concern for us. As we move towards a goal of creating a virtually consolidated data store, we have to consider the threat environment and the fact that…
|
|
Gary Blohm: When we went to enterprise email and we first do our transition to it. It was a little rough at first. It was rough because we did not have standard practices. Security in otherwise will…
|
|
Frank Konieczny: We are addressing it in a very interesting way. We are addressing it in moralistic from both the network and from both of the data viewpoint. First of all, the cloud broker is…
|