Cyber Operations Tools: Stemming the Threat through I.T.


This event qualifies for .6 CEUs

This event qualifies for 6 CPEs

This event qualifies for 6 CLPs


The threat of persistent and malicious cyber-attacks continues to rise, and the government is taking decisive action to ensure that cyberspace remains a national asset rather than a strategic liability.

 

As agencies seeks ways to identify cyber-threat patterns and stem the tide of intrusive actions, training on the transformative leaps that current I.T. tools provide is needed.

 

That’s why cybersecurity professionals are invited to spend an hour or all day with industry experts as they provide in-depth demonstrations of new technological capability for combating the cyber threat.

 

Through this series of 45-minute, live demonstrations, industry experts will discuss trends and future capabilities in cybersecurity tools.  In addition, thought leaders from the Defense Information Systems Agency and the Department of Homeland Security will deliver keynote addresses on how DoD and civilian agencies are implementing successful Cyber Operations strategies.

 

Preview the session topics below, pick one or all, and register today to earn 1.0 CPE credit for each hour attended.

 

Industry experts will demonstrate throughout the day and discuss:

  • How to protect against malicious insiders and external attackers using unified privilege, session & password management solutions - BeyondTrust.
  • Automated methods to redirect data being attacked to secure areas for analysis and to prevent future network intrusions - Brocade.
  • Ways to optimize command and control visualization in the Operations Center - Cyviz.
  • Advancements in architecture design using API security gateway technology to consolidate access control with information assurance - Forum Systems.
  • The use of captured network packets and forensic analysis to construct a visual replay of targeted network activity - NetScout.
  • Methods to accelerate the SOCs intelligence capability using network and endpoint visibility and threat detection - Palo Alto Networks.

Speaker and Presenter Information

Gregory Touhill

Gregory Touhill, Brig Gen (ret), CISSP, Deputy Assistant Secretary for Cybersecurity Operations and Programs at US Department of Homeland Security

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, Census Bureau, USAID, National Guard Association, EEOC


This event has no exhibitor/sponsor opportunities


When
Thu, Mar 12, 2015, 7:00am - 5:00pm


Cost
Complimentary:    $ 0.00


Where
Virginia Tech Research Center
900 N. Glebe Road
Arlington, VA 22203
Get directions


Website
Click here to visit event website


Organizer
FEDINSIDER
immixGroup


Contact Event Organizer



Return to search results