(ISC)² CyberSecureGov 2016: Clearswift & US Government cyber leaders discuss how to stop evasive malware from threatening the Nation.

(ISC)² CyberSecureGov 2016

The US Government’s cyber leaders will gather this week at the (ISC)² CyberSecureGov 2016 in Washington, D.C. to hear from the industry’s top experts and their peers on the latest attacks threatening the Nation, while reviewing recommended strategies that can be immediately implemented to bolster the country’s cyber defense.

Key topics will include: “The Most Prolific Hacktivist, Nation State and Mercenary Hackers Targeting Our Nation,” “Hacking the Power Grid” and “Rethink Your Defense Against The Next Wave Of Malware Cyber Attacks And Information Borne Threats” from Clearswift’s Dr. Guy Bunker on Friday, May 20, 2016 11:20am-12:05pm – Track 3.

What to Expect

Cybersecurity change agents protecting the government’s critical resources need to rethink how they defend against the next wave of malware attacks and information borne threats, two of today’s most pressing and employee centered security challenges.

Dr. Bunker will analyze the latest attack techniques and information borne risks while discussing how new adaptive technology and non-disruptive security appraoches enable employee collaboration and enhances the organization’s security culture.

Attendees will walk away from this session with the latest update on how new malware driven cyber-attacks —similar to those used in attempts to disrupt the Ukrainian and Israeli power grids— utilize automated social engineering and payload delivery techniques to bypass perimeter defenses, causing havoc to critical government infrastructure and maliciously extracting sensitive data. Dr. Bunker, international cybersecurity expert, will further provide the audience critical insights on how information-borne threats and the proliferation of cloud collaboration, social media and mobile/BYOD has exponentially increased the risk of undetected data leaks and target-rich opportunities for cyber espionage.

Immediate Action

To immediately act on this expanded threat intelligence, cybersecurity change agents will learn how to align new adaptive technology with non-disruptive security methods to enable secure employee collaboration and enhance the organization’s overall security defense and culture. They will learn how this technology provides the control required to go a level deeper and automatically remove often malicious malware and sensitive information as it passes in and out of an organization’s network without the need for human intervention, allowing the rest of the communication or online activity to continue. And as a result, cybersecurity change agents can take on the role of an enabler, not strictly an enforcer.

Additional Information

Related Articles