Leading Cyber Minds Converge At Hanscom
| Targeted News Service |
HANSCOM AIR FORCE BASE, Mass.,
Numerous regional cyber leaders convened at
Organized by the
ACSC Executive Director
Toward that end, two Hanscom senior leaders, Director of Engineering and Technical Management
Stamey discussed the edge Hanscom program specialists bring to U.S. warfighters: a full spectrum of command and control that harnesses space, air, terrestrial and cyber assets.
"However, that asymmetric capability is probably also our top vulnerability," he said, noting that protecting the various systems and the data they produce is a constant challenge. But protection efforts aren't sufficient against the most advanced and persistent threats, he said. The
Protecting systems and data - either by shielding them from attack or enabling them to rapidly reconstitute - doesn't necessarily mean keeping everything in a locked room nearby though. Forum discussion centered, in fact, on analyzing whether and when it makes sense to store data in "clouds," huge, remotely managed data centers with great capacity and built-in security.
"I started out anti-cloud," Rudolph said during his presentation. "I wanted to control the network, the computer and storage." Over time, however, he has become a strong cloud proponent, arguing that working within the cloud is far more cost-effective and that it generally offers enhanced security, with control features that reduce spillage and vulnerability to attack.
He spoke about the U.S. government's federal data center consolidation effort, emphasizing that the ultimate goal should be "to get to zero," meaning no reliance on government-operated data centers. For now, however, the federal government will rely on a hybrid model that combines private cloud, public cloud and traditional data centers, he said.
A panel discussion among industry "cloud adopters" revealed similar sentiments, with early skeptics gradually developing increasing trust.
"Three months ago, if you asked me about the cloud, I'd have said 'Hell, no,'" said
Another panelist,
Cloud providers themselves were also on hand and were quick to offer assurances.
Third party audit results and the opinion of technical peers are among the things information security managers can use to build confidence in cloud providers, according to
"At Google, if we spill or leak data, it will hit the front page of the
The event also featured a
"One of the reasons this region has an advantage is the talent we have here," he said.
by
66th Air Base Group Public Affairs
TNS 30FurigayJane-140431-4753362 30FurigayJane
| Copyright: | (c) 2014 Targeted News Service |
| Wordcount: | 766 |



St. Luke’s: Downtown Boise expansion plans target efficiency
Advisor News
- The best way to use a tax refund? Create a holistic plan
- CFP Board appoints K. Dane Snowden as CEO
- TIAA unveils ‘policy roadmap’ to boost retirement readiness
- 2026 may bring higher volatility, slower GDP growth, experts say
- Why affluent clients underuse advisor services and how to close the gap
More Advisor NewsAnnuity News
- Annuities: A key tool in battling inflation
- Pinnacle Financial Services Launches New Agent Website, Elevating the Digital Experience for Independent Agents Nationwide
- Insurer Offers First Fixed Indexed Annuity with Bitcoin
- Assured Guaranty Enters Annuity Reinsurance Market
- Ameritas: FINRA settlement precludes new lawsuit over annuity sales
More Annuity NewsHealth/Employee Benefits News
- Californians encouraged to join Covered California, enroll in health insurance by Jan. 31 deadline
- Texans are tightening their budgets to pay for health insurance after subsidies expired
- Farmers now owe a lot more for health insurance
- On the hook for uninsured, counties weighing costs
- Research from Northwestern University Feinberg School of Medicine Yields New Findings on Managed Care (Systematic Review of Managed Care Medicaid Outcomes Versus Fee-for-Service Medicaid Outcomes for Youth in Foster Care): Managed Care
More Health/Employee Benefits NewsLife Insurance News