Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

CES 2018: Data Breaches and Information Security Top the Agenda Amidst Tech Hype

by Jenna Sindle
January 23, 2018
in Cybersecurity
Reading Time: 4 mins read
A A
CES
Share on FacebookShare on Twitter

When you think of the Consumer Electronics Show (CES) data breaches and information security aren’t usually top of mind. But knowing just how disruptive innovation can be, the organizers of this event created an enterprise technology forum, CES Government, to discuss the impact of the latest tech on society. CES Government attracts some of the country’s best and brightest information security leaders, including John Higginbotham, Chairman and CEO of Blue Ridge Networks, to strategize on securing our digital future.

Away from the spotlights and hustle of the show floor, Higginbotham along with Rear Admiral Edward “Sonny” Masso, USN (Ret.), and executives from the Departments of Homeland Security, Justice, FBI, and other Federal, State, and Local organizations participated in the CES Government 2018 Cyber Roundtable.  Their discussion focused on examining the very real threat that cyber attacks present to our economy and our national security as we build Smart Cities, embrace digital health, and live more of our lives online.  Not surprisingly, especially looking at all the new tech on display on the show floor, it is increasingly difficult for all industries to keep pace with threats and threat vectors but particularly for government and industry critical infrastructure operators that are responsible for public safety and security.

To help industry leaders breakdown the complexities of the current cyber security landscape, Higginbotham and his fellow participants took a deep dive into key issues including:

  • Today’s major cyber threats and how they have evolved over the past three years.
  • What threats we are likely to be facing in the near future.
  • Recent key developments in enterprise-grade data security
  • And, how enterprises can effectively integrate new technologies into legacy infrastructure and architecture.

Catching up with Higginbotham after the roundtable he shared that “though we’re in a period of tech disruption with more ways to connect to each other, devices, networks, and critical infrastructure than ever before, it need not to be a period of information insecurity.”

For Higginbottom, whose organization Blue Ridge Networks is trusted by many federal agencies and commercial enterprises to secure critical infrastructure, the key to essentially eliminating vulnerabilities and entry points for cyber attacks, including those undetectable by traditional cybersecurity approaches, is to create secure enclaves that isolate critical operations on networks and endpoints, but still facilitates collaboration to take advantage of the efficiencies that these new interoperable technologies enable.

“It’s important to remember that the fundamentals of good cyber hygiene will always stand even the most complex, or target-rich, organization in good stead,” said Higginbotham.  “Then,” he continued, “put cyber security vendors through their paces to find the solutions that empower mission success without compromising on information security, or requiring you to re-architect your existing IT infrastructure to work effectively.”

Traditional network security solutions that work by scanning traffic to detect threats are becoming increasingly overwhelmed by the volume and velocity of threats as well as the number of devices that most organizations and agencies need to connect to the enterprise network.  In order to be effective in today’s highly connected and inherently complex network environments organizations, security solutions need to find new ways to manage secure connectivity while circumventing complexity.

While it sounds like an impossible task, Higginbotham provided plenty of assurance that it is possible to bring new layers of defense to bear to help address the cybersecurity challenge. “To my mind it’s all about creating secure enclaves that ensure the privacy and integrity of the protected traffic through eliminating the risk of unauthorized access with pre-authenticated endpoints and having the tools to enforce policies.  This can be accomplished without disrupting the user experience at lower costs and higher efficiency to increase enterprise productivity.”

Learn more about robust and resilient cyber security solutions for a connected world here.

Tags: AIArtificial Intelligence and CybersecurityCES 2018CES Government RoundtableData Breachesinformation securityMachine LearningTop Data Breaches of 2016Top Data Breaches of 2017. Legacy Cyber security solutions

RELATED POSTS

Investigations
AI & Data

2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

June 2, 2022
Pandemic Relief Fraud
AI & Data

Combating Pandemic Relief Fraud by Leveraging Artificial Intelligence

May 18, 2022
AI at the Edge
AI & Data

Enabling Artificial Intelligence at the Edge

April 21, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5356 shares
    Share 2142 Tweet 1339
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    40 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    11 shares
    Share 4 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us