A recent Ponemon Institute survey on Cybersecurity Risks in the Federal Government that polled 615 IT and IT security practitioners in the United States across the federal government, noted that in the past 12 months, the volume and severity of agency cybersecurity incidents have increased. In fact, 63 percent of respondents say the volume cybersecurity incidents is increasing and 65 percent of respondents say the severity of these incidents is getting worse. The pandemic contributed, but these trends are not new. The SolarWinds breach and the far-reaching vulnerabilities that unraveled as a result is the latest example of why our nations’ cyber posture must evolve.
For an agency like the Department of Homeland Security (DHS), which plays a leadership role across government in securing our country’s cyberspace, assessing these new and evolving cybersecurity risks and coming up with a plan to fundamentally change and strengthen the security and reliability of our Federal information systems and the nation’s critical infrastructure is not an easy challenge. This is especially true as the adversaries now include nation states who have deep resources and continue to grow bolder in their cyber attacks on national information systems and critical infrastructure.
If we look at how cybersecurity has traditionally been approached up to this point, it’s centered on threat-centric responses. You built a wall around your perimeter, controlled access in and out of that wall, and when something bad happened, you responded. That was effectively your defense, and it was relatively easy to implement.
Today, the traditional perimeter has dissolved and cyber activity once easy to define as “good” or “bad” has become nebulous. This poses a crushing problem to threat-centric security, whose static policies are forced to make decisions about cyber activity with no insight into its broader context.
The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation.
As we look to solve these challenges, it is important to consider the importance of cognitive science and cybersecurity, the role of continuous risk adaptive security, and how Zero Trust Architectures may help.
Join thought leaders and technical experts in government solutions and Forcepoint’s experts as they dive into the critical data protection issues facing the DHS today. Actionable insights for how to remain ahead of adversaries and risks.
WHY A RISK-ADAPTIVE APPROACH IS CRITICAL FOR DHS - FIRESIDE CHAT:
Cybersecurity expert and Forcepoint CTO, Petko Stoyanov, describes why a risk-adaptive approach to data protection and zero trust is crucial for the DHS. Based on supporting IT experience within the Intelligence Community and Department of Defense.
BLUE PRINT INSIGHTS:
- Technical experts provide a high-level overview of how risk-adaptive data protection can work within DHS' environments.
BEHAVIORAL SCIENCE INSIGHTS - FIRESIDE CHAT:
- Ways to overcome bias in cybersecurity. Insights from cognitive science expert, Dr. Margaret Cunningham.
FUTURE INSIGHTS - CLOSING FIRESIDE CHAT
- A look at the future impact of Zero Trust within Government Security with government and operational cybersecurity experts.
Register today via this link or the green button on the right.
This event is an invite-only and intended for Department of Homeland Security employees only. Forcepoint reserves the right to refuse registrations for members of industry or other government agencies
Hosted By: Forcepoint, Global Governments & Critical Infrastructure (G2CI) and Thundercat Technology.
CPE CREDIT AVAILABLE: 1 CPE credit
CPE certification at the Forcepoint Virtual Conference: DHS' Zero Trust, Risk-Adaptive Data Protection is being administered by Carahsoft Technology Corp. Carahsoft is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education of the National Registry of CPE Sponsors. State boards of accountancy have final authority in the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website.
For more information on the CPE credits being offered, our CPE sponsor (NASBA), and the submission process, please read our CPE information page.