GSN_Apr_FINAL+links
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
BeyondTrust survey links breaches<br />
to aging federal infrastructure<br />
Continued from page 35<br />
based or risk profile.<br />
• Unite threat intelligence from<br />
multiple sources to better prioritize<br />
risks across the environment<br />
Since the asset risk-to-user privilege<br />
risk pattern is a common attack<br />
vector, deploy solutions that correlate<br />
asset-based risk with user-based activity<br />
to gain a more complete picture<br />
of risks, gaining<br />
needed prioritization<br />
of the most<br />
impactful risks. For<br />
example, advanced<br />
persistent threats<br />
(APTs) can be analyzed<br />
against privileged<br />
password,<br />
user, and account<br />
activity, along with<br />
asset characteristics<br />
such as vulnerability<br />
count, vulnerability level, attacks<br />
detected, risk score, applications, services,<br />
software and ports. Consuming<br />
multiple data feeds from in-place solutions<br />
into a single console can help<br />
mitigate additional costs and reduce<br />
complexity.<br />
“The federal government is moving<br />
to modernize its aging infrastructure,”<br />
said Kevin Hickey, President<br />
and CEO at BeyondTrust. “But that<br />
takes time, and in the meantime, federal<br />
systems face a real risk. These are<br />
simple steps IT can take today to help<br />
mitigate that risk.”<br />
Federal Cyber-Security<br />
Threat Survey Report<br />
For more information on the 2017 US<br />
Federal Government Security Survey,<br />
please visit: https://beyondtrust.com/<br />
aging-fed-it-risky.<br />
About BeyondTrust<br />
BeyondTrust is a global information<br />
security software company that<br />
helps organizations prevent cyber attacks<br />
and unauthorized data access<br />
due to privilege abuse. Our solutions<br />
give you the visibility to<br />
confidently reduce risks<br />
and the control to take<br />
proactive, informed action<br />
against data breach<br />
threats. And because<br />
threats can come from<br />
anywhere, we built a<br />
platform that unifies the<br />
most effective technologies<br />
for addressing both<br />
internal and external<br />
risk: Privileged Access Management<br />
and Vulnerability Management. Our<br />
solutions grow with your needs, making<br />
sure you maintain control no matter<br />
where your company goes. BeyondTrust’s<br />
security solutions are trusted<br />
by over 4,000 customers worldwide,<br />
including half of the Fortune 100. To<br />
learn more about BeyondTrust, please<br />
visit www.beyondtrust.com.<br />
(ISC)² delivers cybersecurity<br />
workforce recommendations to<br />
White House<br />
Continued from page 36<br />
cyber workforce; our recommendations<br />
reflect the importance of<br />
building future cybersecurity policy<br />
— including the pending executive<br />
order — on the existing foundation.”<br />
About (ISC)²<br />
(ISC)² is an international nonprofit<br />
membership association focused<br />
on inspiring a safe and secure cyber<br />
world. Best known for the acclaimed<br />
Certified Information Systems Security<br />
Professional (CISSP®) certification,<br />
(ISC)2 offers a portfolio of<br />
credentials that are part of a holistic,<br />
programmatic approach to security.<br />
Our membership, over 120,000<br />
strong, is made up of certified cyber,<br />
information, software and infrastructure<br />
security professionals who<br />
are making a difference and helping<br />
to advance the industry. Our vision<br />
is supported by our commitment to<br />
educate and reach the general public<br />
through our charitable foundation<br />
– The Center for Cyber Safety<br />
and EducationTM. For more information<br />
on (ISC)², visit www.isc2.<br />
org, follow us on Twitter or connect<br />
with us on Facebook.<br />
© 2017 (ISC)² Inc., (ISC)², CISSP, SSCP, CCSP, CAP,<br />
CSSLP, HCISPP, CCFP, ISSAP, ISSEP, ISSMP and CBK<br />
are registered marks, of (ISC)², Inc.<br />
CEO/Editorial Director<br />
Adrian Courtenay<br />
917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Editor<br />
Steve Bittenbender<br />
502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Senior Writer<br />
Karen Ferrick-Roman<br />
412-671-1456<br />
karenferrickroman@gmail.com<br />
Columnist<br />
Shawn Campbell<br />
Campbell on Crypto<br />
shawn.campbell@safenetat.com<br />
Columnist<br />
George Lane<br />
Hazmat Science & Public Policy<br />
georgelane@hotmail.com<br />
Contributing Author<br />
Lloyd McCoy Jr<br />
Immix Group<br />
The News Leader in Physical, IT and Homeland Security<br />
Contributing Author<br />
Walter Ewing<br />
Contributing Author<br />
Wendy Feliz<br />
Contributing Author<br />
Joshua Breisblatt<br />
Contributing Author<br />
J. Michael Barrett<br />
Contributing Author<br />
Christopher Millar<br />
Gatekeeper Security<br />
Art Director<br />
Gerry O’Hara, OHDesign3<br />
gerry@ohd3.com<br />
203-249-0626<br />
Production Manager<br />
Brenden Hitt<br />
Brenden.hitt@gsnmagazine.com<br />
Direct: 203-216-7798<br />
COMING ATTRACTIONS<br />
May<br />
Special Reports:<br />
Technology Focus<br />
License Plate Detection,<br />
Smart Vehicle Surveillance<br />
Market Sector Focus<br />
Maritime, Coastal, Port Security<br />
FREE SUBSCRIPTION<br />
SIGN-UP<br />
Monthly Digital Edition<br />
Airport/Seaport Newsletter<br />
Daily Insider Newsletter<br />
Cybersecurity Newsletter<br />
CLICK HERE<br />
44 45