Dr. Estwick Moderating Webcast: Three-Prong Approach to Security
When: July 27, 2017 @ 2:00 pm – 3:00 pm EST
The days of a fixed network edge are gone. Digital transformation, cloud computing, Bring Your Own Device (BYOD) and the Internet of Things (IoT) have fragmented the traditional government network, making it nearly impossible to determine where an agency’s actual perimeter lies. Government systems have grown so complex that they have created an “everywhere perimeter,” including physical objects, cyber assets and network configurations, all of which must be properly secured.
Security is a constant battle for government organizations. Agencies need to safeguard critical applications and information, contain breaches and isolate hackers, as well as manage and secure IoT, while simultaneously meeting a myriad of compliance and regulatory obligations. So, how do agencies safeguard their “everywhere perimeter”?
Join us on July 27 for a live webcast on why a “Three-Prong Approach to Security” is necessary in today’s ever-changing technology landscape. You will learn how this approach seamlessly connects physical, network and cyber systems, and understand why each component plays a vital role in a comprehensive security strategy.
The link to the recorded webcast is: http://www.govexec.com/sponsor-content/three-prong-approach-security/#watch-now
This webcast will discuss:
- Challenges that agencies face when protecting multiple security vectors
- Three components of an effective security strategy
- How to secure physical systems to prevent backdoor attacks
- Key areas of focus for countering cybersecurity attacks
- Best practices to consider when combining physical, network and cyber security
- And more…
………….
Various technology manufacturers as well as government employees will be in attendance. Our audience will be interested in hearing the panel’s thoughts and experiences regarding top of mind priorities, challenges, and best practices in an effort to better their cyber security initiatives within an agency.