{"id":198603,"date":"2017-06-14T04:08:33","date_gmt":"2017-06-14T08:08:33","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-intersection-of-cybersecurity-and-intelligent-automation-federalnewsradio-com\/"},"modified":"2017-06-14T04:08:33","modified_gmt":"2017-06-14T08:08:33","slug":"the-intersection-of-cybersecurity-and-intelligent-automation-federalnewsradio-com","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/the-intersection-of-cybersecurity-and-intelligent-automation-federalnewsradio-com\/","title":{"rendered":"The Intersection of Cybersecurity and Intelligent Automation &#8230; &#8211; FederalNewsRadio.com"},"content":{"rendered":"<p><p>      Segment 1:The Current State of      Continuous Monitoring and CDM Programs    <\/p>\n<p>    That would be a formula for cyber chaos  except for the rise    of automation.That is, agency security staffs are    adopting strategies for automatingcybersecurity tasks    such that peoplehave more actionable information more    quickly. Automation alsofrees staff up for higher level    tasks such as planning, research and data analysis.  <\/p>\n<p>    To explore these issues, Federal News Radio convened a panel of    experts:  <\/p>\n<p>    Letteer explained a new Marine Corps implementation of the    Navys comply to connect policy under which every endpoint is    automatically scanned and evaluated for cyber threats each and    every time its user logs on. If it passes muster, the system    checks it hourly while it is connected.  <\/p>\n<p>    Scanlon detailed how, after last years government-wide cyber    sprint, HHS has established two-factor authentication for all    of its users, en route to two-factor for systems administrators    and network staff members.  <\/p>\n<p>    He also explained why the need for cyber defense automation is    extra important for HHS. Many of the departments agencies and    bureaus are connected directly to the greater health care    ecosystem, and health care data is among the most sought-after    target of hackers.  <\/p>\n<p>    Hubbard said automation and orchestration of information    technology processes such as cybersecurity monitoring and    mitigation arent new, but they are becoming more widely    adopted as agencies improve their fundamentals of vulnerability    patching, multi-factor authentication, and inventorying and    monitoring of critical assets.  <\/p>\n<p>    The panelists also discussed how cloud computing,    software-as-a-service, and the internet of things add to both    the urgency and complexity of cybersecurity automation.  <\/p>\n<\/p>\n<p>    Moderator  <\/p>\n<\/p>\n<p>    Tom Temin, Federal News Radio  <\/p>\n<p>    Tom Temin has been the host of the Federal Drive since 2006.    Tom has been reporting on and providing insight to technology    markets for more than 30 years. Prior to joining Federal    News Radio, Tom was a long-serving editor-in-chief of    Government Computer News and Washington Technology magazines.    Tom also contributes a regular column on government information    technology.  <\/p>\n<\/p>\n<p>    Panelists  <\/p>\n<p>    Leo Scanlon, Senior    Advisor for Healthcare and Public Health Sector Cybersecurity,    Office of the CIO, HHS  <\/p>\n<p>    Leo Scanlon is the HHS Senior Advisor for Healthcare and Public    Health (HPH) Sector Cybersecurity and the Deputy Chief    Information Security Officer for the Department of Health and    Human Services. He serves as chairman of the HHS Cyber    Security Working Group, which coordinates cybersecurity    collaboration between HHS Operating Divisions and their    partners in the private sector. He is the executive sponsor of    the HHS Healthcare Cybersecurity Communications and Integration    Center (HCCIC). The HCCIC supports cyber threat and indicator    sharing across HHS Operating Divisions, DoD and civilian agency    partners, and healthcare cybersecurity stakeholders in the    intelligence and law enforcement communities, and the National    Health Information Sharing and Analysis Center (NHISAC).  <\/p>\n<p>    Leo has worked at the interagency level as a co-chair of the    Identity Credential and Access Management sub-committee of the    Information Security and Identify Management Committee (ISIMC),    and as a tri-chair of the ISIMC. He is co-chair of the    Government Advisory Council of the International Information    System Security Certification Consortium (ISC2), and government    chair of the ACT-IACT Cybersecurity Community of    Interest.<\/p>\n<\/p>\n<p>    Dr. Ray Letteer,    Chief, Cybersecurity Division, United States Marine    Corps  <\/p>\n<p>    Dr. Letteer is the Marine Corps Senior Information Security    Official (SISO) and the Chief of the Cybersecurity Division of    the Command, Control, Communications, and Computer (C4)    Department at Headquarters, U.S. Marine Corps. As such, he is    responsible for and oversees all Cybersecurity (CY) tasks,    standards, and conditions within the Marine Corps, which    includes Computer Network Defense (CND), Defensive Cyber    Operations (DCO), Public Key Infrastructure (PKI), Electronic    Key Management Systems (EKMS), and Certification &    Accreditation (C&A).  <\/p>\n<p>    Dr. Letteer serves as the appointed Approving Official (AO) for    the Marine Corps Enterprise Network (MCEN), which includes all    networks and networked systems whether in garrison or    tactically deployed. He is also the Functional Area Manager    (FAM) for Marine Corps EKMS\/KMI\/PKI issues.  <\/p>\n<\/p>\n<p>    Tony Hubbard,    Principal, KPMG  <\/p>\n<p>    Mr. Hubbard has spent 25 years providing cybersecurity    consulting services to the Federal Government. He currently    leads KPMGs Federal Cybersecurity practice supporting the    Defense & Intel communities as well as Federal Healthcare    and Civilian agencies with a wide range of cybersecurity    services, including identity access management support and    cyber governance, among others. Mr. Hubbard has authored    articles and spoken widely on Federal Government cyber    challenges and opportunities. He received his Bachelors degree    from Shepherd University, and is a Certified Information    Systems Security Professional (CISSP) and Certified Information    Systems Auditor (CISA).  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/federalnewsradio.com\/sponsored-content\/2017\/06\/the-intersection-of-cybersecurity-and-intelligent-automation\/\" title=\"The Intersection of Cybersecurity and Intelligent Automation ... - FederalNewsRadio.com\">The Intersection of Cybersecurity and Intelligent Automation ... - FederalNewsRadio.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Segment 1:The Current State of Continuous Monitoring and CDM Programs That would be a formula for cyber chaos except for the rise of automation.That is, agency security staffs are adopting strategies for automatingcybersecurity tasks such that peoplehave more actionable information more quickly.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/the-intersection-of-cybersecurity-and-intelligent-automation-federalnewsradio-com\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187732],"tags":[],"class_list":["post-198603","post","type-post","status-publish","format-standard","hentry","category-automation"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/198603"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=198603"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/198603\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=198603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=198603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=198603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}