Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

HP Government Summit security sessions encourage attendees to "Think like a bad guy"

MarthaAviles ‎04-07-2014 10:00 AM - edited ‎09-25-2015 08:26 AM

The HP Software Government summit, held on April 2nd, opened with a morning keynote by Gen. Michael Abrashoff—decorated commander of the USS Benfold. With coffee in hand, the attendees began their morning with a powerful speech on how Gen. Abrashoff turned the worst-performing naval ship into the best. He centered on how he had to change his approach—moving from a traditional command-and-control style to a non-traditional, Grassroots Leadership, where he strived to put himself in his crew’s shoes. Although his story was about Naval command, his approach was fit for any leadership position. He stressed the need to unleash innovation and lead change through understanding.

 

Shortly thereafter, Government Security professionals headed to the first session of the security track: Cybersecurity: What Everyone Needs to Know. Led by Dr. P.W. Singer, attendees listened to the frank discussion centering around how cyber issues have not only dominated recent headlines, but have more broadly evolved from simply a technology matter into an area that we all need to understand. Dr. Singer’s book, by the same title as the session, answers key questions that have arisen from these issues. And, everyone was given a free, signed copy, as well.

In session 2, Joe Jarzombek, CSSLP, U.S. Department of Homeland Security, delivered a fixating session on the road to software assurance and continuous monitoring. His expertise in cyber infrastructure resilience and software & supply chain assurance is hugely impressive—he touched on how the majority of cyber vulns and some of the largest incidents can be traced back to simple and preventable software defects.

 

Rashaad Steward, HP SOC Security Services, kicked off session 3 with a staggering fact: The cost of data breaches has increased by 78 percent over the last four years and the time it takes to resolve a cyber attack has increased 130 percent over the same period. A summarization of data gathered during maturity assessments performed by HP was presented, which allowed all attendees to see common mistakes and the lessons that can be learned from them. Also from HP Security, one of our in-house researchers led the last session: Threat Actors Operating in the Middle East. Concentrating on Iranian threat actors, the attendees saw information on the actors and breakdowns on the groups to which they belong. Also revealed were the groups’ tactics, techniques, and procedures used to infiltrate systems. Click here to see the Cyber Risk Report from which this session was drawn.

 

If you missed this opportunity, mark your calendars for HP Protect 2014, held in Washington, D.C. This is HP’s premier security conference, where you can collaborate with nearly 1,500 security professionals to jointly identify primary targets, predict vulnerabilities, trade threat secrets, and determine how to attack adversaries relentlessly.

0 Kudos
About the Author

MarthaAviles

Events
Aug 29 - Sep 1
Boston, MA
HPE Big Data Conference 2016
Attend HPE’s Big Data Conference on August 29 - September 1, 2016 to learn from peers in every industry and hear from Big Data experts and thought lea...
Read more
Sep 13-16
National Harbor, MD
HPE Protect 2016
Protect 2016 is our annual conference on September 13 - 16, 2016, and is the place to meet the world’s top information security talent, discuss new pr...
Read more
View all