Session #7: Enemy at the Gate: How Many Layers Does it take to Fortify the Modern Day Castle?
Description: There is a fundamental expectation that agencies will have the ability to identify and respond to any cyber-event. Amidst the added responsibility and heightened expectations, technology leaders are in a valiant fight to keep up.
Medieval lords lived in an environment much like our cyber-landscape today — chaotic, with their fiefdoms under constant attack. While today’s attackers operate with digital swords, the principle and effectiveness of a Defense in Depth approach holds as true today as it did back then.
Defense in Depth is the simple principle that while no security is perfect, the presence of many independent layer,s of defenses will geometrically increase the difficulty of an attacker to breach the walls, and slow them down to the point where your defenses have an opportunity to thwart the attack. Defense in Depth places core assets behind layers of varied and individually effective security controls, each of which has to be circumvented for an attack to be successful.
In this expert session, you’ll learn the key components of a Defense in Depth strategy, and how to evaluate your ability to anticipate and defend against the ever growing quantity and cost of cyber-attacks.
Expected Outcome: From this discussion, attendees will be able to:
1. Recognize the multifaceted layers that make up a defense in depth approach
2. Assess where you are today and how to strengthen your security posture
3. Understand how to best deploy resources to accelerate your objectives
Intended Audience: Technology leaders under pressure to evaluate and quickly strengthen their security posture, and who are seeking cost-effective ways to enhance or complement their existing capabilities.