Already purchased this program?
Login to View
This video program is a part of the Premium packages:
- IEEE MemberUS $299.99
- Society MemberUS $299.99
- IEEE Student MemberUS $299.99
- Non-IEEE MemberUS $299.99
Strengthening the Security Ecosystem
- IEEE MemberUS $49.99
- Society MemberUS $49.99
- IEEE Student MemberUS $49.99
- Non-IEEE MemberUS $49.99
Strengthening the Security Ecosystem
Strengthening the cyber ecosystem?s security and resilience requires a way to reduce the number of vulnerabilities as well as to automatically mitigate attack methodologies. Peter Fonash, CTO of the US Department of Homeland Security (DHS), describes DHS?s role in cybersecurity, summarizes existing programs to improve cybersecurity, discusses cybersecurity challenges, and presents initiatives to meet those challenges. The cybersecurity community has been forming a general consensus that defenses must be more automated, less reactive, more distributed, and better informed. Various ongoing activities are aimed at enabling automated collective action to strengthen the cyber ecosystem?s resilience and security in the face of advanced threats. These activities support a range of automated collective actions, including the sharing of indicators and information, the selection of courses of action, and the coordination of responses.
Strengthening the cyber ecosystem?s security and resilience requires a way to reduce the number of vulnerabilities as well as to automatically mitigate attack methodologies. Peter Fonash, CTO of the US Department of Homeland Security (DHS), describes DHS?s role in cybersecurity, summarizes existing programs to improve cybersecurity, discusses cybersecurity challenges, and presents initiatives to meet those challenges. The cybersecurity community has been forming a general consensus that defenses must be more automated, less reactive, more distributed, and better informed. Various ongoing activities are aimed at enabling automated collective action to strengthen the cyber ecosystem?s resilience and security in the face of advanced threats. These activities support a range of automated collective actions, including the sharing of indicators and information, the selection of courses of action, and the coordination of responses.