Tech

How Close is the Enemy


Expo Theatre (Hall G) - Feedback   

Bookmark and Share

Kevin G. Coleman

Hackers, terrorists, insiders, nation states and others all pose threats, but who really is capable of damaging our critical systems infrastructure. Not too long ago we were only concerned about hackers breaking into our systems. Today, we face a number of threats in cyber space. Trusted insiders now account for more that fifty percent of the system breaches that occur, poor quality software provides vulnerabilities for exploitation, and the most recent threat of being caught up in a cyber war. This presentation will examine and put into context these three threat areas in an effort to assist you in determining the current threat level as well as insight into the threat level near term. All information presented here has been developed in the past four months. Get the latest Intel on these threats.