Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Cybersecurity Insights from RSA 2018: Cutting Through the Noise, Holding Back the Threats

by Peter Jacobs
May 30, 2018
in Cybersecurity
Reading Time: 2 mins read
A A
RSA 2018
Share on FacebookShare on Twitter

Talking about the “current” state of cybersecurity can be challenging, as new threats and new solutions appear daily. But at the 2018 RSA Conference, the theme of “Now Matters” has a dual meaning for the security community: where things stand today sets the stage for where government and commercial organizations can take action, so it’s critical to understand the current landscape in order to prepare for future attacks.

On the latest installment of the Government Technology Insider Podcast, we spoke with Malcolm Harkins, Chief Security and Trust Officer at Cylance about the current state of cybersecurity to find out what we’ve learned, how we can apply it, and if we can really expect to keep our data and systems secure.

Harkins facilitated or spoke on four programs at the conference and he brought his insights to our discussion on a spectrum of critical security issues, including: noise – the constant deluge of information about threats (along with management’s concerns) – and the motives behind the sources of that information; trust – whether we can trust the data and systems on which your business operations depends; and threats – the evolving landscape of risk, and how to manage that risk proactively.

Through real-world examples, Harkins links cyber-risk to the spectrum of risks facing organizations, and talked about what can be done to avoid slowing down business, or worse, inviting catastrophe. He suggests that we may be aiming too low when it comes to security.

CISO’s can’t control threat actors, but they can identify what controls failed and focus on the things you can do to manage risk more effectively. Ultimately, he explained, while we can’t eliminate risk, we can do a much better job of managing it.

Harkin’s insights are a call-to-action for public and private organizations of every description. Listen to the podcast below.

https://governmenttechnologyinsider.com/wp-content/uploads/2018/05/GTI-Podcast-Malcolm-Harkins-Cylance-RSA-2018.mp3
Tags: Cyber Threats Federal GovernmentcybersecurityGovernment CybersecurityMalcolm HarkinsRSA 2018Security and trust

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5369 shares
    Share 2148 Tweet 1342
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    41 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us