Breakout I
10:30 a.m. – 11:10 a.m.
Network monitoring and surveillance capabilities create data. Lots of data. The better and faster we understand that data, the better and faster we can defend ourselves. How can agencies automate their analysis of these rich new data streams and produce actionable, real time intelligence about online threats?
Signature-based anti-malware might be effective against automated, low skill attackers, but won't stop advanced intruders. Once inside a device, they can go anywhere the endpoint's legitimate owner is allowed — over and over again — looking for ways to get further in. How can agencies do dynamic threat detection and mitigation, and what tools do they need for realtime analysis and response?
It feels wrong. How can outsourcing your data to the cloud possibly make it safer, more accessible and easier to handle then when you stored it yourself? And yet it does. How does cloud security work? What guarantees do agencies have their data will be secure?