Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

HP Government Summit security sessions encourage attendees to "Think like a bad guy"

MarthaAviles ‎04-07-2014 10:00 AM - edited ‎09-25-2015 08:26 AM

The HP Software Government summit, held on April 2nd, opened with a morning keynote by Gen. Michael Abrashoff—decorated commander of the USS Benfold. With coffee in hand, the attendees began their morning with a powerful speech on how Gen. Abrashoff turned the worst-performing naval ship into the best. He centered on how he had to change his approach—moving from a traditional command-and-control style to a non-traditional, Grassroots Leadership, where he strived to put himself in his crew’s shoes. Although his story was about Naval command, his approach was fit for any leadership position. He stressed the need to unleash innovation and lead change through understanding.


Shortly thereafter, Government Security professionals headed to the first session of the security track: Cybersecurity: What Everyone Needs to Know. Led by Dr. P.W. Singer, attendees listened to the frank discussion centering around how cyber issues have not only dominated recent headlines, but have more broadly evolved from simply a technology matter into an area that we all need to understand. Dr. Singer’s book, by the same title as the session, answers key questions that have arisen from these issues. And, everyone was given a free, signed copy, as well.

In session 2, Joe Jarzombek, CSSLP, U.S. Department of Homeland Security, delivered a fixating session on the road to software assurance and continuous monitoring. His expertise in cyber infrastructure resilience and software & supply chain assurance is hugely impressive—he touched on how the majority of cyber vulns and some of the largest incidents can be traced back to simple and preventable software defects.


Rashaad Steward, HP SOC Security Services, kicked off session 3 with a staggering fact: The cost of data breaches has increased by 78 percent over the last four years and the time it takes to resolve a cyber attack has increased 130 percent over the same period. A summarization of data gathered during maturity assessments performed by HP was presented, which allowed all attendees to see common mistakes and the lessons that can be learned from them. Also from HP Security, one of our in-house researchers led the last session: Threat Actors Operating in the Middle East. Concentrating on Iranian threat actors, the attendees saw information on the actors and breakdowns on the groups to which they belong. Also revealed were the groups’ tactics, techniques, and procedures used to infiltrate systems. Click here to see the Cyber Risk Report from which this session was drawn.


If you missed this opportunity, mark your calendars for HP Protect 2014, held in Washington, D.C. This is HP’s premier security conference, where you can collaborate with nearly 1,500 security professionals to jointly identify primary targets, predict vulnerabilities, trade threat secrets, and determine how to attack adversaries relentlessly.

0 Kudos
About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Jun 7-9
Las Vegas
Discover 2016 Las Vegas
Discover 2016 in Las Vegas, the ultimate showcase technology event for business and IT professionals to learn, connect, and grow.
Read more
Each Month in 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
View all