Click a block to view session details
Accenture Federal Services Cyber Strategist and former CIA CTO, Gus Hunt, will discuss the inadequacies of traditional approaches to cyber security employed to protect our National Security interests. Between the frictionless nature of threats and the 10-100X increase in interconnected systems and devices driven by the Internet of Things, the threat landscape will worsen dramatically over the next several years. A different approach to cyber security is essential, one that achieves true cyber resilience-the ability for mission to continuously operate and deliver its intended capabilities, despite suffering an adverse cyber event. All the pieces to achieve this goal exist today. Mr. Hunt will show how bringing them together can change the game in cyber security and shift the balance in our favor.
The presentation will address cyber safety at home and protecting personal data. At the conclusion, attendees will know the tools and strategies on how to protect themselves in cyber space including:
• What are VPNS and why you should use one all the time
• What else is needed in addition to anti-virus software to protect you from Malware, including on your phone
• Windows O/S: how to clean your registry
• How to mask credit cards when purchasing items on-line
• How to mask your email address
• Have a Gmail account? A neat little trick to set up an alias
• European email providers vs. US email providers.which provides more privacy
• How to password protect important documents before you send
• Using the right browser to protect your privacy
• How and why to clean your cache
• How to stop sites from tracking you
• Extensions in browsers make life easier but are they safe?
• Bluetooth, "the good, the bad and the ugly"
• How to safely use public Wi-Fi
• Is cloud back-up safe? The "ins and outs"
Data used to be the prime target of online criminals focused on identity theft and fraud. In today's Federal Cloud First environments, cloud resources themselves are the latest popular cyber targets. Unsecured cloud hypervisors which manage virtual cloud architecture are huge cybersecurity and fiscal risks. These cloud administration consoles can easily be taken over by malicious actors to spin up clusters for the use of bitcoin and crypto currency mining. Metered charges can mount into the hundreds of thousands within minutes as cloud savvy criminals attack our compute resources.
The proposed 45 minute talk will provide a brief overview of Cloud Architecture basics, Hypervisor attack vectors using real word examples and a primer for avoiding cloud resource attacks. Appropriate for all technical levels from cyber-curious to cyber-expert.
The need to protect information, technology, and people from harm or misuse has its' roots back to the beginning of time. Come learn what drives this need for privacy and security. Learn how CMS has evolved its' protection practices over the past 50 years and recognize what the cyber future holds.
Nancy J. Limauro
Over the last 16 years, the Department of Homeland Security's (DHS) National Cybersecurity Awareness Month (NCSAM) Campaign has helped the American public understand how to be safer and more secure online. NCSAM is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online. Join this interactive session with a member of the team who developed the national NCSAM campaign for 2019 to learn more about the importance of cybersecurity awareness, and the free tools that DHS provides to federal employees to incorporate more cyber-secure practices into your life at work and at home.
Join us for a discussion on instilling improved information security (InfoSec) habits into your IT staff. Security is critical, but with the many responsibilities IT professionals juggle daily, the most important parts of a security model can be easily overlooked. Enforcing good InfoSec habits in your IT organization's culture can be challenging. So, how can your organization overcome these challenges?
Attend this session to learn:
a_A¢ Ideas about building security into your IT community with daily activities and conversations
a_A¢ How an approach styled after a secure development lifecycle can lead to improved security practices
a_A¢ About the importance of a deep level of visibility into one's IT infrastructure, which network and application performance monitoring tools provide, to build strong IT controls
a_A¢ Survey results which include the issues posed by contractors and temporary workers, and how agencies are relying on training, access control, and monitoring to reduce risk
Federal Business Council, Inc.
All rights reserved.