Insights from NSA’s Cybersecurity Threat Operations Center

Sdílet
Vložit
  • čas přidán 3. 06. 2024
  • Dave Hogue, Technical Director, National Security Agency (NSA)
    Dave Hogue will provide one of the first in-depth perspectives from a “Day in the Life” of NSA’s Cybersecurity Threat Operations Center (NCTOC)-the mission, threat landscape, and offer best principles for CISOs and other network defenders. Mr. Hogue will equip the audience with actionable insights that they can implement into their daily operations.
    Learning Objectives:
    1: Gain exclusive insights into top cyberthreats from NSA’s perspective.
    2: Learn actionable best practices to use in building an effective cyber-defense posture.
    3: Learn about what’s working and what’s not in emerging areas such as machine learning.
    www.rsaconference.com/events/...
  • Věda a technologie

Komentáře • 3

  • @novo7867
    @novo7867 Před 2 lety +2

    Nice work amazing thinking

  • @shaungrace9745
    @shaungrace9745 Před 5 lety +6

    Last thought. Social media creates blocks of everything, fundamentally. It means it's slower to load each block but perhaps software needs to slow down and be blocks of code/data. Easier to track etc and AI can use search parameters easier as eliminates words it doesn't have to scan.......But then actors might A.I. more blocks but that show up like a heard of giraffes in computer land - device lands

  • @shaungrace9745
    @shaungrace9745 Před 5 lety +7

    If 90% is dumb practice and much is email etc. Then place all questionable information in a folder and have the user agree that they incur any costs when looking through all this junk. And they must look at it & delete or they get a fee to hold it somewhere
    DoD not sure how u'd fine them for opening dumb email?
    And on each cyber (questionable) material. Use mass flow. Oh this is where it was from the user will say?
    Approved software with 1-10 star rating. Each star is result of a technical group who was employed to try and hack it before release. However 1-10star hack rating will also occur. There is so much money they could pay these star groups to release info as they try to break in for the good guy. Kinda need honest star groups and only 20 of, with all their info sent and paths checked in real time.
    Last. A human body has defense where the attack is always inside but neutralised. In most cases. So what if you had video of what not to do. Let people do the learning. SImple recordings of screen with evident bad mouse clicks and bad content