Event Date: July 11, 2017 - July 26, 2017
Hosted By: Symantec & Carahsoft
Location: Fort Meade, MD
Attendees of these Cyber Defense Technical Exchange Meetings heard Symantec + Blue Coat discuss the following topics:
Cloud Access Security Broker/CloudSOC
Why is Cloud Access Security Broker (CASB) different from non-CASB cloud security architectures?
Identify Shadow IT and monitor cloud usage at a granular level
Govern data with granular usage controls and encryption/tokenization, combat threats with user behavior analytics, malware analysis, and incident response
Leverage and integrate with existing technologies, including DLP, web proxies, two-factor authentication, endpoint protection, encryption, and more
Full solution discussion on audit, mitigation, and CDP Server
Data Center Security/Secure End Point Protection
Endpoint Protection technologies deep dive: file reputation, behavioral protection, and advanced machine learning
How data center security helps boost forensic capabilities by providing host intrusion detection capabilities that are not currently offered by the existing HBSS solutions
Data center security goes beyond secure host baseline (SHB) and traditional application whitelisting solutions by leveraging trusted computing principals to confine any computer process and applications with behavioral application sandboxes
Government agencies need more than security tools and solutions to defend against today's constantly evolving cyber threat landscape. A cybersecurity culture must exist within all levels of an organization - starting at the top with C-level executives and flowing all the way down to the individual e...
Defending against insider threats - whether malicious or unintentional - is a top cyber priority for government agencies. But, "inside" is becoming a much bigger space to manage. And, as agencies move more resources to the cloud, the stakes are higher and the potential channels for data loss are mor...
The 2017 Federal Insider Threat Report - Defending against insider threats is a top Federal cyber priority. But, "inside" is becoming a much bigger space to manage. To understand this shift and build on the 2015 Inside Job report, MeriTalk surveyed 150 cyber security professionals.
Resources such as the Symantec Probe Network, Symantec
Website Security, and Skeptic™
give Symantec analysts unparalleled sources of data with which to identify,
analyze, and provide informed commentary on emerging trends in attacks,
malicious code activity, phishing, and spam. The result is t...
Since the Continuous Diagnostics and Mitigation (CDM) program was launched in 2012, the federal IT enterprise has changed dramatically. Fortunately, Symantec understands what it takes to leverage the full capabilities of CDM. This CDM playbook provides a look at how agencies can leverage CDM to str...
Symantec’s 2018 Internet Security Threat Report (ISTR) offers a comprehensive view of today’s threat landscape, covering topics such as:RansomwareTargeted AttacksThe Mobile Threat LandscapeInternet of ThingsMalware, Web Threats, and Email…and much more!
Symantec’s comprehensive 2019 Internet Security Threat Report (ISTR) details Big Numbers, Fact and Figures, Methodology, and a Year-in-Review of today’s threat landscape
The report covers topics such as:FormjackingCryptojackingRansomwareSupply Chain AttacksCloudIoTElection Interference…and mu...
Adapting to the New Reality of Evolving Cloud Threats. Cloud is the center of IT and increasingly, the foundation for cyber security. Understanding how threat vectors are shifting in cloud is fundamental to making the necessary updates to your security program and strategy. Symantec’s CSTR shines ...
As Internet accessibility and mobile technology adoption have increased in the United States, governments at all levels are embarking upon or extending e-Government initiatives to provide a higher, more convenient level of service to the public and lower the cost of those services. The best practice...