Hunting for Cyber Threats Targeting Weapon Systems
While traditional cybersecurity defenses focus on prevention, there are many vulnerabilities and potential attacks against weapon systems. While weapon systems are more software dependent and networked than ever before, cybersecurity has not always been prioritized with regards to weapon systems acquisition.
Threat actors have advanced in their sophistication as they are well-resourced and highly skilled, oftentimes gathering detailed knowledge of the systems they want to attack. Ensuring stronger detection methods is imperative, but because these types of threats are very targeted and advanced, agencies need the capability to proactively hunt.
Watch this recorded webinar to see how Fidelis and Carahsoft experts examine:
- How to perform a cybersecurity assessment of weapon systems
- What level of visibility is needed to see vulnerabilities and gaps across your weapon systems environment
- What type of detection methods you should consider
- How to hunt for threats that may bypass preventive and detection techniques
Bob Gourley, CTO & Co-Founder, OODA LLC
Bob is a co-founder and CTO of OODA LLC and the publisher of CTOvision.com. Bob’s first career was as a naval intelligence officer, which included operational tours in Europe and Asia. Bob was the first Director of Intelligence (J2) at DoD’s cyber defense organization JTF-CND. Following retirement from the Navy, Bob was an executive with TRW and Northrop Grumman and then returned to government service as the CTO of the Defense Intelligence Agency (DIA). Bob was named one of the top 25 most influential CTOs in the globe by Infoworld and was named by Washingtonian as one of DC’s “Tech Titans.”
Bob Henry, Engineer – Federal, Fidelis Cybersecurity
Bob brings 22 years of enterprise network and mission systems engineering expertise to the Fidelis Federal Solutions Division. More than twelve years have been dedicated to directly supporting DoD Component and Department requirements. As a network and data security subject matter expert, he has a proven success record in defining security requirements, implementing new technologies securely, providing technical consultation, and articulating technical initiatives to executive leaders.