Many federal organizations are looking for Security Operations Center Best Practices. Many have never stepped back to see what the best practices are to manage them. Probably because the team is working 24 hours a day to stop malicious
This is an interview that takes a look at several options that can bring relief to a beleaguered team that works at a SOC.
In May of 2018, the Department of Homeland Security released a list of guidelines. During the interview, Mike talks about how to implement strategies like risk identification, vulnerability reduction, threat reduction, and consequence mitigation.
Cloudera began in 2008 with an idea to help manage large amounts of data – probably why part of their tagline is, “empower people to transform complex data into clear and actionable insights.”
His company is well known for its hybrid open-source Apache Hadoop distribution.
Today’s interview takes a Silicon Valley founder and has him examine the $89 billion federal information technology spend to give his observations on improvement. This is a discussion that covers everything from open source and cybersecurity to machine intelligence.
Mike shows how the federal government should take advantage of open source to improve services to citizens as well as to capture, store, and process unimaginable amounts of information.
'We are dealing with a company in China that does 100 million events a second in a search cluster' George Young from Elastic Click To Tweet
Here is a fun fact: when the Mars Rover sends data back to NASA, it sends it to a system based on Elastic. That is because of the search capability Elastic can provide. Well, if those rocket scientists can trust that kind of data to Elastic, then you may want to consider it as well. Many federal information technology professionals need new ways to understand big data. Elastic provides an open source solution that you can test drive for free.
Duo Security has worked with a wide range of organizations to improve federal authentication and security and reduce costs for administering authentication. During the interview, Sean Frazier differentiates among authentication methods like two-step verification, multi-factor authentication, and strong authentication. Sean gives an overview of how to manage authentication in a world where traditional methods like PIV may be limited.
Show NotesEpisode #547
Federal TechTalk with John Gilroy
Date: February 12,2019
Moderator: John Gilroy
Guest: Sean Frazier, DuoSecurity
Length: 40 minutes
Audio link: Federal Tech Talk with John Gilroy: #547