Many cybersecurity frameworks exist that do an excellent job of describing the ‘who’, ‘what’, ‘why’ and ‘how’ of the hundreds of activities associated with cyber defense. What is missing is any indication of ‘when’ and ‘where’ these activities should be implemented. In today’s economic environment, no organization is sufficiently resourced to fully protect all devices at all times.
For cybersecurity to become truly effective, organizations need a mechanism to integrate all available data to quickly discover and prioritize cyber threats against their most critical processes and devices. The goal is to increase agility when responding to complex intrusions (those that integrate cyber and physical activities). Geo-temporal attributes are the only ones common to all human activities, including cyber, however, most current cyber operations consider only the logical relationship between devices. GIS offers the best hope for providing a smarter approach.
Join us to discuss how a true integration of logical and geographical analysis might improve organizations’ ability to detect cyber attacks early resulting in less expensive and more effective protection of critical data and infrastructure.
5:00 p.m. - 6:00 p.m.
• Registration and Networking: Mix and mingle with fellow DC-metro-area GIS and developer professionals while enjoying complimentary hors dʹoeuvres and beverages.
6:00 p.m. - 7:00 p.m.
• Esri cyber lead Ken Stoni will discuss re-conceptualizing cyberspace as dataflows and implementing the concept in GIS software. This could allow organizations to create smart segmentation against which cyber and non-cyber data can be applied and high-quality response decisions can be made.
• RedSeal will demonstrate how to automatically generate IT Network Topologies from layer 3 device configuration files. RedSeal uses the topology and the results of vulnerability scanning software to determine the reach of each compromised host. This allows computer security teams to organize their work based on the damage that could be caused by each compromised host; it’s a risk-based approach to resource prioritization.
• Esri solution engineer Scott Cecilio will show a prototype cyber common operational picture built from the Esri and RedSeal technologies. The demonstration will highlight how the geospatial approach can enhance traditional IT decision-making.
7:00 p.m. - 8:00 p.m.
• Networking: Mix and mingle a little longer.