Cybersecurity in the age of analytics
As new IT innovations emerge, so do new attacks on IT systems. In the meantime, cyber threat actors are adapting to these changes faster than traditional cybersecurity measures can protect against them. This discrepancy is creating an intelligence gap. With the global cost of cybercrime estimated to be $445 billion a year—and the average attack occurring for eight months before being detected—organizations need to evolve beyond the traditional IT security approach and incorporate an added layer of human insight into their strategy. On June 23 at 1:00 p.m. ET, an expert panel talks about cybersecurity in the age of analytics.
Some of the questions to be discussed:
- How effective can legislation be at balancing the need for cybersecurity measures while protecting the privacy of individual citizens? Is it possible to strike a balance?
- Can intelligence play a role in striking that balance (for example, the USA Freedom Act)?
- How effective do you think the government sanctions proposed against overseas hackers will be? Could there be additional ways to deter these hackers?
- The federal government just reported a massive breach where 4 million workers’ personal information may have been stolen from government systems. After detecting the breach, it purportedly took the government a month to determine that personal information was stolen. Can you comment on why this took so long? In your opinion, what could have been done to find out what was comprised more quickly?
- What do you think are the biggest challenges in achieving security in today’s interconnected world? Do you think total cybersecurity can ever be fully realized?
- If you were designing your ideal cybersecurity strategy for your own organization, what would it look like?
- How should organizations that are being attacked work with the intelligence community to share responsibility for disrupting and protecting against attacks?
Wayne Wheeles is an expert in cyber-security, locational intelligence and multichannel marketing. Wayne was a featured speaker at Hadoop World 2011, and he is a well-known columnist and blogger. Wayne is under consideration for the Presidential Innovations Fellows team.
Richard Stiennon is a veteran of the security industry and, as an industry analyst, has years of experience advising enterprises, vendors and government agencies on their security strategies. He continues to help large enterprises better protect their networks and to help vendors serve those needs. Richard is the author of Surviving Cyberwar (Government Institutes, 2010) and UP and to the RIGHT: Strategy and Tactics of Analyst Influence (IT-Harvest Press, 2012).
Andrew Friedrich is the federal director of big data, cybersecurity and information management solutions. He has an extensive background in security solution design and delivery across national security missions, financial services and state and local government. His employment history spans everything from enterprise software companies to grassroots, high-tech start-ups.
Michael Martin is the director of information governance practice for BTRG, focused on delivering information governance and data management solutions for BTRG customers. He brings more than 19 years of experience in the information technology industry specializing in information governance, enterprise implementations and technology solutions. Michael and BTRG have been successfully solving data quality, data growth, data privacy, data security, test data management and compliance problems for Fortune 1000 customers across many industries such as aerospace and defense, healthcare, financial services, higher education, retail, telecommunications and others.
Derived and developed from 25 years of expertise from the intelligence community, IBM i2 solutions are the next-generation intelligence analysis solutions to address ongoing issues. IBM i2 lets organizations enhance their cybersecurity strategies with actionable, real-world intelligence. This added layer of insight will take businesses past the detection of an existing threat, and enable them to identify the who and why behind it—creating a comprehensive understanding of their threat landscape and turning a defensive cyberstrategy into a proactive one.
Recently, IBM reinforced its commitment to help build a safer planet with the announcement of the Safer Planet Portfolio—a robust suite of solutions for law enforcement, emergency management, defense/national security, cyber threat intelligence and counter fraud designed to help professionals working in these areas protect lives, ensure economic stability and protect critical infrastructure. Learn more about how to build a Safer Planet.