HP Government Summit security sessions encourage attendees to "Think like a bad guy"

The HP Software Government summit, held on April 2nd, opened with a morning keynote by Gen. Michael Abrashoff—decorated commander of the USS Benfold. With coffee in hand, the attendees began their morning with a powerful speech on how Gen. Abrashoff turned the worst-performing naval ship into the best. He centered on how he had to change his approach—moving from a traditional command-and-control style to a non-traditional, Grassroots Leadership, where he strived to put himself in his crew’s shoes. Although his story was about Naval command, his approach was fit for any leadership position. He stressed the need to unleash innovation and lead change through understanding.

 

Shortly thereafter, Government Security professionals headed to the first session of the security track: Cybersecurity: What Everyone Needs to Know. Led by Dr. P.W. Singer, attendees listened to the frank discussion centering around how cyber issues have not only dominated recent headlines, but have more broadly evolved from simply a technology matter into an area that we all need to understand. Dr. Singer’s book, by the same title as the session, answers key questions that have arisen from these issues. And, everyone was given a free, signed copy, as well.

In session 2, Joe Jarzombek, CSSLP, U.S. Department of Homeland Security, delivered a fixating session on the road to software assurance and continuous monitoring. His expertise in cyber infrastructure resilience and software & supply chain assurance is hugely impressive—he touched on how the majority of cyber vulns and some of the largest incidents can be traced back to simple and preventable software defects.

 

Rashaad Steward, HP SOC Security Services, kicked off session 3 with a staggering fact: The cost of data breaches has increased by 78 percent over the last four years and the time it takes to resolve a cyber attack has increased 130 percent over the same period. A summarization of data gathered during maturity assessments performed by HP was presented, which allowed all attendees to see common mistakes and the lessons that can be learned from them. Also from HP Security, one of our in-house researchers led the last session: Threat Actors Operating in the Middle East. Concentrating on Iranian threat actors, the attendees saw information on the actors and breakdowns on the groups to which they belong. Also revealed were the groups’ tactics, techniques, and procedures used to infiltrate systems. Click here to see the Cyber Risk Report from which this session was drawn.

 

If you missed this opportunity, mark your calendars for HP Protect 2014, held in Washington, D.C. This is HP’s premier security conference, where you can collaborate with nearly 1,500 security professionals to jointly identify primary targets, predict vulnerabilities, trade threat secrets, and determine how to attack adversaries relentlessly.

Labels: HP| security
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation