26.05.2017 Views

GSN_Apr_FINAL+links

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BeyondTrust survey links breaches<br />

to aging federal infrastructure<br />

Continued from page 35<br />

based or risk profile.<br />

• Unite threat intelligence from<br />

multiple sources to better prioritize<br />

risks across the environment<br />

Since the asset risk-to-user privilege<br />

risk pattern is a common attack<br />

vector, deploy solutions that correlate<br />

asset-based risk with user-based activity<br />

to gain a more complete picture<br />

of risks, gaining<br />

needed prioritization<br />

of the most<br />

impactful risks. For<br />

example, advanced<br />

persistent threats<br />

(APTs) can be analyzed<br />

against privileged<br />

password,<br />

user, and account<br />

activity, along with<br />

asset characteristics<br />

such as vulnerability<br />

count, vulnerability level, attacks<br />

detected, risk score, applications, services,<br />

software and ports. Consuming<br />

multiple data feeds from in-place solutions<br />

into a single console can help<br />

mitigate additional costs and reduce<br />

complexity.<br />

“The federal government is moving<br />

to modernize its aging infrastructure,”<br />

said Kevin Hickey, President<br />

and CEO at BeyondTrust. “But that<br />

takes time, and in the meantime, federal<br />

systems face a real risk. These are<br />

simple steps IT can take today to help<br />

mitigate that risk.”<br />

Federal Cyber-Security<br />

Threat Survey Report<br />

For more information on the 2017 US<br />

Federal Government Security Survey,<br />

please visit: https://beyondtrust.com/<br />

aging-fed-it-risky.<br />

About BeyondTrust<br />

BeyondTrust is a global information<br />

security software company that<br />

helps organizations prevent cyber attacks<br />

and unauthorized data access<br />

due to privilege abuse. Our solutions<br />

give you the visibility to<br />

confidently reduce risks<br />

and the control to take<br />

proactive, informed action<br />

against data breach<br />

threats. And because<br />

threats can come from<br />

anywhere, we built a<br />

platform that unifies the<br />

most effective technologies<br />

for addressing both<br />

internal and external<br />

risk: Privileged Access Management<br />

and Vulnerability Management. Our<br />

solutions grow with your needs, making<br />

sure you maintain control no matter<br />

where your company goes. BeyondTrust’s<br />

security solutions are trusted<br />

by over 4,000 customers worldwide,<br />

including half of the Fortune 100. To<br />

learn more about BeyondTrust, please<br />

visit www.beyondtrust.com.<br />

(ISC)² delivers cybersecurity<br />

workforce recommendations to<br />

White House<br />

Continued from page 36<br />

cyber workforce; our recommendations<br />

reflect the importance of<br />

building future cybersecurity policy<br />

— including the pending executive<br />

order — on the existing foundation.”<br />

About (ISC)²<br />

(ISC)² is an international nonprofit<br />

membership association focused<br />

on inspiring a safe and secure cyber<br />

world. Best known for the acclaimed<br />

Certified Information Systems Security<br />

Professional (CISSP®) certification,<br />

(ISC)2 offers a portfolio of<br />

credentials that are part of a holistic,<br />

programmatic approach to security.<br />

Our membership, over 120,000<br />

strong, is made up of certified cyber,<br />

information, software and infrastructure<br />

security professionals who<br />

are making a difference and helping<br />

to advance the industry. Our vision<br />

is supported by our commitment to<br />

educate and reach the general public<br />

through our charitable foundation<br />

– The Center for Cyber Safety<br />

and EducationTM. For more information<br />

on (ISC)², visit www.isc2.<br />

org, follow us on Twitter or connect<br />

with us on Facebook.<br />

© 2017 (ISC)² Inc., (ISC)², CISSP, SSCP, CCSP, CAP,<br />

CSSLP, HCISPP, CCFP, ISSAP, ISSEP, ISSMP and CBK<br />

are registered marks, of (ISC)², Inc.<br />

CEO/Editorial Director<br />

Adrian Courtenay<br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Editor<br />

Steve Bittenbender<br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Senior Writer<br />

Karen Ferrick-Roman<br />

412-671-1456<br />

karenferrickroman@gmail.com<br />

Columnist<br />

Shawn Campbell<br />

Campbell on Crypto<br />

shawn.campbell@safenetat.com<br />

Columnist<br />

George Lane<br />

Hazmat Science & Public Policy<br />

georgelane@hotmail.com<br />

Contributing Author<br />

Lloyd McCoy Jr<br />

Immix Group<br />

The News Leader in Physical, IT and Homeland Security<br />

Contributing Author<br />

Walter Ewing<br />

Contributing Author<br />

Wendy Feliz<br />

Contributing Author<br />

Joshua Breisblatt<br />

Contributing Author<br />

J. Michael Barrett<br />

Contributing Author<br />

Christopher Millar<br />

Gatekeeper Security<br />

Art Director<br />

Gerry O’Hara, OHDesign3<br />

gerry@ohd3.com<br />

203-249-0626<br />

Production Manager<br />

Brenden Hitt<br />

Brenden.hitt@gsnmagazine.com<br />

Direct: 203-216-7798<br />

COMING ATTRACTIONS<br />

May<br />

Special Reports:<br />

Technology Focus<br />

License Plate Detection,<br />

Smart Vehicle Surveillance<br />

Market Sector Focus<br />

Maritime, Coastal, Port Security<br />

FREE SUBSCRIPTION<br />

SIGN-UP<br />

Monthly Digital Edition<br />

Airport/Seaport Newsletter<br />

Daily Insider Newsletter<br />

Cybersecurity Newsletter<br />

CLICK HERE<br />

44 45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!