Why Asset Management Matters for Cybersecurity

Time: 2 p.m. ET
Duration: 1 hour
Cost: 
No Fee

A useful way to think about dealing with cybersecurity threats is from an asset management angle. The average agency has multiple software applications of its own devoted to detecting and mitigating threats. By one estimate, large agencies have on average no less than 100 cybersecurity tools. The Cybersecurity and Infrastructure Security Agency also supplies agencies with tools used governmentwide. It adds up to a long list of assets. But that’s not where it ends.

Each of these applications generates data about something in the IT infrastructure, often large amounts. These data sets, too, are assets to manage.

These assets exist in addition to the agency’s hardware components, from network appliances to end user devices.

Not to be overlooked are the growing volumes of data in commercial clouds.

The goal, then, of asset management become what one industry expert calls the essential challenge, namely, establishing a single and comprehensive source of truth. That is, visibility into the totality of cyber assets. Combined with the right analytics, the result is information that is both actionable and effective.

An expert panel details the challenges of cybersecurity asset management as well as the latest strategies for meeting them.

Listen to the full show:

Complimentary Registration

Please register using the form on this page or call (202) 274-4830.

This program is sponsored by    

 

 

By providing your contact information to us, you agree: (i) to receive promotional and/or news alerts via email from Federal News Network and our third party partners, (ii) that we may share your information with our third party partners who provide products and services that may be of interest to you and (iii) that you are not located within the European Economic Area.

By providing your contact information to us, you agree: (i) to receive promotional and/or news alerts via email from Federal News Network and our third party partners, (ii) that we may share your information with our third party partners who provide products and services that may be of interest to you and (iii) that you are not located within the European Economic Area.

Comments

Panel of experts

  • Ken Kline

    Director of Cyber Engineering, Federal Emergency Management Agency

  • Alma Cole

    Chief Information Security Officer, U.S. Customs and Border Protection

  • Geraldine Clawson

    CDM Portfolio Team Lead for DEFEND Group F, Cybersecurity Infrastructure Security Agency

  • Bobby McLernon

    Vice President, Federal Sales, Axonius

  • Tom Temin

    Host, The Federal Drive, Federal News Network

Sign up for breaking news alerts