|By Bob Gourley||
|June 7, 2014 01:48 PM EDT||
By Bob Gourley
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Odds are you have concluded that the only way to mitigate the threat is through automation. Right?
Please join us for a discussion on automated removal of cyber threats on Thursday June 12 at 11am eastern for a webinar that will provide insights on how to execute on automating for defense.
Here are the details:
If you’re trying to stay ahead of advanced persistent threats getting inside your network while working with shrinking budgets that impact headcount and training, then you know that defending your enterprise isn’t easy. Manual remediation is costly and requires manpower and time you don’t have. In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation. The concept of automated remediation will be examined with new insight, along with suggestions on how to implement a machine-guided, advanced remediation strategy.
Participants in this webinar will:
- Learn how offensive measures can support your defensive strategy
- Understand benefits of automated malware removal, not just remediation
- Learn ways to reduce remediation costs and improve operational efficiencies
Guest Speaker: Bob Gourley, CTOVision Publisher and Crucial Point Founder and Chief Technology Officer Bob Gourley is the publisher of CTOvision.com and is the founder and Chief Technology Officer (CTO) of Crucial Point LLC, a technology research and advisory firm where he leads efforts in due diligence assessments and strategic consulting.
Bob’s first career was as a naval intelligence officer, which included operational tours in Europe and Asia. Bob was the first Director of Intelligence (J2) at DoD’s cyber defense organization JTF-CND.
Following retirement from the Navy Bob was an executive with TRW and Northrop Grumman, and then returned to government service as the Chief Technology Officer (CTO) of the Defense Intelligence Agency (DIA). Bob is a founding member and member of the board of directors of the Cyber Conflict Studies Association, a non-profit group focused on enhancing the study of cyber conflict at leading academic institutions and furthering the ability of the nation to understand the complex dynamics of conflict in cyberspace. He’s also on the board of Naval Intelligence Professionals, on the Intelligence Committee of AFCEA and the Cyber Committee of INSA. Bob’s blog, CTOvision, is now ranked among the top 50 federal technology blogs.
Hexis Cyber Solutions Industry Expert: Richard Park
As Director of Product Management for Hexis, Richard oversees the HawkEye G product line. He brings 20 years of product management, security, and network engineering experience having worked with firms including Netuitive, Sourcefire, Redback Networks, and UUNET Technologies, as well as the Department of Homeland Security, and NASA’s Earth Science Data and Information System (ESDIS).
Jul. 28, 2015 08:00 PM EDT Reads: 547
Jul. 28, 2015 07:15 PM EDT Reads: 711
Jul. 28, 2015 06:30 PM EDT Reads: 1,365
Jul. 28, 2015 05:30 PM EDT Reads: 246
Jul. 28, 2015 04:30 PM EDT Reads: 1,746
Jul. 28, 2015 04:00 PM EDT Reads: 2,175
Jul. 28, 2015 04:00 PM EDT Reads: 208
Jul. 28, 2015 03:30 PM EDT Reads: 478
Jul. 28, 2015 03:30 PM EDT Reads: 161
Jul. 28, 2015 03:00 PM EDT Reads: 1,057
Jul. 28, 2015 03:00 PM EDT Reads: 453
Jul. 28, 2015 03:00 PM EDT Reads: 1,243
Jul. 28, 2015 02:00 PM EDT Reads: 1,155
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to tran...
Jul. 28, 2015 01:00 PM EDT Reads: 317
Jul. 28, 2015 01:00 PM EDT Reads: 1,044