Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
What to Upload to SlideShare
What to Upload to SlideShare
Loading in …3
×
1 of 21

Information is Power! Using Defensive Solutions in Cybersecurity

0

Share

Download to read offline

Learning Objective: Learn and explore benefits and opportunities in cybersecurity

Living and work environments have been revolutionized by technology. And, it seems the possibilities are endless. From social networking to homeland security, impact of technological advancements is massive. However, as technology is used to capture every corner of our world, the terror of cyber threats and abuse remains an ongoing battle. Join us in this seminar where a panel of cybersecurity professionals discusses approaches to protect critical intelligence and design practical solutions for defending against and avoiding cybercrime and attacks before they happen.

At the end of this seminar, participants will be able to:

a. List strategies for building safe and secure cybersecurity environment.
b. Explore strategy and policies that impact cybersecurity.
c. Examine the impact of cybersecurity in diverse industries.
d. Explore advances and opportunities for STEM professionals.
e. Identify ways to get ahead of the threat.

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Information is Power! Using Defensive Solutions in Cybersecurity

  1. 1. Dermawan Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim. Information is Power! Using Defensive Solutions in Cyber Security
  2. 2. Aaron J. Ferguson, Ph.D. TechnicalDirector, Cryptographic Solutions National Security Agency • Native of Brooklyn, NY (Bedford Stuyvesant) • Education • BSEE, Howard University (#youknow) • MS, Operations Research, University of New Haven • MA and Ph.D., Applied Mathematics/Statistics, University of Delaware • 22 Years at NSA (Senior Executive since 2014) • Responsible for providing technical leadership to NSA's Cybersecurity Discovery missions with an emphasis on Cryptographic Solutions (Organization of ~300 people) • Expertise: Cybersecurity, Internet of Things, Machine Learning/Artificial Intelligence, Open Source/ Publicly Available Information, high-speed encryptor technologies, cryptographic algorithm evaluation
  3. 3. LaLishaHurt Deputy Chief Information Security Officer Sr. Director, Technology Shared Services General Dynamics Information Technology • Native of Richmond, VA • Education • BS, Systems Engineering, University of Virginia (#wahoowa) • MBA, University of Baltimore • MS, Information Assurance, University of Maryland (UMUC) • 20+ Years of Industry Experience across private and public sector • 3 Years at General Dynamics Information Technology (GDIT) • Responsible for leading and delivering cyber services internal to the enterprise as well as to external local, state, federal and Department of Defense customers • Expertise: Cyber security, Global policy, IT governance, IT risk management, strategic management, audit assurance, digital transformation, mergers & acquisitions
  4. 4. Carl Jackson Director, Systems Engineering Lockheed Martin • Native of Baltimore, MD (West Side!) • Education • BS Physics, Morgan State University • Baltimore Polytechnic Institute • 39 Years of Industry Experience • 29 Years at Lockheed Martin (including IBM Federal Systems) • Responsible for leading Systems Engineering at Sikorsky Aircraft Company (a Lockheed Martin Company) • System Engineering Processes and Procedures, Cybersecurity, Model-Based Engineering/Architecture Advanced Design and Road-Mapping, Engineering Proposals, Engineering Estimating and Support for Key Captures, Obsolescence Management • Optimizing the digital design environment through implementation of model- based systems design, automation and agile best practices • Expertise: Systems Engineering, Cybersecurity, Technical Leadership
  5. 5. La’Naia Jones Deputy Chief Information Officer for the Intelligence Community Office of the Director of National Intelligence (ODNI)
  6. 6. Jason Harrell Title Company
  7. 7. Round 1 – Question 1 Who matters more to the Internet’s future, states or individuals?
  8. 8. Round 1 – Question 2 What group or organization do you think is the biggest cyber threat?
  9. 9. Round 1 – Question 3 What service sector needs to increase their investment in cybersecurity, Energy, Banking, Small governments?
  10. 10. LIGHTNING ROUND - Question 1 •In Your opinion, what is the number one security myth?
  11. 11. LIGHTNING ROUND - Question 2 •How early should cybersecurity education start?
  12. 12. LIGHTNING ROUND - Question 3 •What sparked your interest in Cybersecurity?
  13. 13. Round 2 – Question 1 Is cyberspace at risk of being “militarized”?
  14. 14. Round 2 – Question 2 What are the emerging and future technologies that we will have to worry the most about from a security perspective?
  15. 15. Round 2 – Question 3 Is it ok for a victimized organization to “hack back”?
  16. 16. Round 3 – Question 1 What is more important? Experience or certifications, e.g., Security+, Network+, CISSP?
  17. 17. Round 3 – Question 2 As a professional, what is the one critical skill needed as a cyber security leader?
  18. 18. Round 3 – Question 3 Do you think that the pace of technical change will have a profound impact on the U.S. economy in a negative way, a positive way, or both?
  19. 19. LIGHTNING ROUND - Question 1 •What keeps you up at night?
  20. 20. LIGHTNING ROUND - Question 2 •If you had to go to a cyber battle to defend, what is the one thing you are taking with you?
  21. 21. LIGHTNING ROUND - Question 3 • What is your cyber prediction for 2020? 5 years, 10 years?

×