25.08.2015 Views

GSN Aug/Sept Digital Edition

  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cybersecurity and Convergencemised.Finally, investigate ATP solutions. For a report onmajor products, take a look at the test report fromMiercom, “Symantec Advanced Threat Protection:Network”, http://miercom.com/pdf/reports/20150218.pdfDon Maclean serves as DLT Solutions’ Chief CybersecurityTechnologist. Maclean has over 20 years of expertisein the Federal security industry working withnumerous Federal agencies to help them achieve theirmission through leading security and compliance technologysolutions. Prior to joining DLT Solutions, Macleanspent the last five years at VMD Systems Integrators,Inc. guiding Federal civilian agencies through the ITsecurity landscape. His previous roles include several seniorIT security positions at leading integrator MAR Inc.and BAE Systems. Maclean’s vast cybersecurity experiencewill be instrumental in bolstering DLT Solutions’security portfolio.References:[1]“Duqu: A Stuxnet-like malware found in the wild”, p. 7http://www.crysys.hu/publications/files/bencsathPBF11duqu.pdf[2]“The Duqu 2.0, Technical Details” p. 17http://www.slideshare.net/KasperskyLabGlobal/the-duqu20asophisticatedcyberespionageactorreturns“Duqu: A Stuxnet-like malware found in the wild”, p. 47http://www.crysys.hu/publications/files/bencsathPBF11duqu.pdf[3]“The Duqu 2.0, Technical Details” pp. 5-6http://www.slideshare.net/KasperskyLabGlobal/the-duqu20asophisticatedcyberespionageactorreturns[4]“The Duqu 2.0, Technical Details” p. 43http://www.slideshare.net/KasperskyLabGlobal/the-duqu20asophisticatedcyberespionageactorreturnsRecommended Readings:“Advanced Persistent Threats: A Symantec Perspective”http://www.symantec.com/content/en/us/enterprise/white_papers/b-advanced_persistent_threats_WP_21215957.en-us.pdf“Symantec Advanced Threat Protection: Network”http://miercom.com/pdf/reports/20150218.pdf“Regin: Top-tier espionage tool enables stealthy surveillance”http://www.live.symantecbtob.webcollage.net/wcdevres/_wc/pdf/regin-analysis.pdf“2014 Targeted Attacks Study: The New Art of War – How toDetect, Predict and Eliminate Advanced Targeted Threats”http://www.inforisktoday.com/handbooks/new-art-war-2014-targeted-attacks-study-h-51#Dr. Andy OzmentContinued from page 25Johnson said any legislation mustinclude incentives for private companiesto share the threats theyreceive with the NCCIC and alsoshields from liability. Johnson alsowants a national data breach re-porting program andtougher penaltiesfor criminals intrudinginto systemsand stealingpersonal data.“As we improveour defenses, cyber adversarieswill continue to improve28their own efforts to break throughthem,” Johnson said. “This problemis not unique to the government;it is shared across the globalcybersecurity community. Ouradversaries are constantly evolving,and so must our tools to combatthem.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!