4.Adopting a Threat-Aware Proactive Defense
4.Adopting a Threat-Aware Proactive Defense
Unified Security Practice Manager
The high-level idea is to collect and analyze security telemetry from tools and sensors in order to come up with “quantitative” prescriptions about how a change in sensors settings or the deployment of a new sensor or module... more »
Voting
4.Adopting a Threat-Aware Proactive Defense
Using Threat Intelligence to Establish Proactive Defenses
Voting
4.Adopting a Threat-Aware Proactive Defense
Think Like The Adversary
Current security tools independently address weaknesses; suites of tools offer more complete... more »
Voting
4.Adopting a Threat-Aware Proactive Defense
ACT-IAC Membership Meeting Ideas
Establish SLAs and/or performance metrics for threat detection, incentivizing contractors.
Voting
4.Adopting a Threat-Aware Proactive Defense
Design defense around your mission or business Cyber Key Terrain
Voting
4.Adopting a Threat-Aware Proactive Defense
Cyber event Response Training (SuperSIG)
Practice response to cyber threats as part of overall emergency response capacity to build resiliency.
Voting
4.Adopting a Threat-Aware Proactive Defense
Blue Team / Red Team Requirements (SuperSIG)
Create Blue Team audits followed by Red Team operations performed by pre-qualified contractors or in-house staff using efficient contract services vehicle managed by GSA. Focus is beyond standard penetration testing and embraces “hunting” tactics largely used by DOD Red Teams to emulate adversaries. Increases resiliency and ability to enhance capability to address early indicators of APTs.
Voting
4.Adopting a Threat-Aware Proactive Defense
Threat Aware Proactive Defense
4) How should the government expand beyond its emphasis on perimeter defense and even Defense in Depth, and instead put more relative resources toward combining actionable threat intelligence with robust response and resiliency strategies and architectures that account for the adversary's point of view?
Voting
4.Adopting a Threat-Aware Proactive Defense
Start with the Crown Jewels & Stop Spreading Peanut Butter
Voting
4.Adopting a Threat-Aware Proactive Defense
Supported ITAPS recommendations
How should the government expand beyond its emphasis on perimeter defense and even defense-in-depth, and instead put more relative resources toward combining actionable... more »
Voting
4.Adopting a Threat-Aware Proactive Defense
Adopt content-centric security of data
Adopt content-centric security of data using digital rights management techniques to protect data at the source and track exfiltrations of data that depart from pre-set boundaries.
Voting
4.Adopting a Threat-Aware Proactive Defense
Distributed Corroboration Of Service (DCOS)
Voting
4.Adopting a Threat-Aware Proactive Defense
A Proposed Strategy for the Cyber Defense of U.S. Critical Infra
Voting
4.Adopting a Threat-Aware Proactive Defense