Insight By Booz Allen Hamilton

Cyber Engineering: Performance vs. Security of evolving technology

The growing number of threats to even the most secure systems shines the light on the need for a larger cyber talent pool that understands emerging technology.

The number and magnitude of cyber vulnerable systems has never been as great as it is today. This is in large part a result of increasingly outdated technology paired with the evolution of innovative threat vectors.

Problems with cybersecurity and the potential solutions both exist where the physical hardware and software meet. To find these fixes, we look to cyber engineers in both industry and in government. These technicians use their time to craft new systems and code to avoid risks, and to make technology easier on the consumer.

One important consideration during the designing phase of a cyber system is to pay close attention to potential vulnerabilities or holes that could affect the process, or the consumer, later on. Agencies and businesses must also pay attention to how they store and dispense confidential information and whom they are recruiting for their teams.

The growing number of threats to even the most secure systems shines the light on the need for a larger cyber talent pool that understands emerging technology.

Shape

Definition of Cyber Engineering

We actually brought the cybersecurity engineers into the requirements process … from there they were able to determine if there would be vulnerabilities that they can kind of foreshadow before the design actually happens.

Shape

Mobile Security Engineering and Emerging Technologies

We’re looking at the information that we can obtain from using all sorts of devices and what we can learn about individuals and environments based on those … So it’s going to be on both the consumers who are using them [and] the organizations that are creating the devices to really think that through … and be able to figure that out before the information gets in the hands of people who might do something wrong with it.

Shape

Recruitment

Exposing them to the joy that can be derived from solving some of the hardest problems … we have to start as young as we possibly can. I think we need to reach them as soon as possible. And then we need to make sure that we’re out there serving as role models.

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

Related Stories

    Getty Images/Elisank79U.S. Capitol

    Senate passes Social Security bill to repeal WEP and GPO

    Read more

    Some final thoughts from one of the leading reformers of Congress

    Read more
    Courtesy of: https://www.mfan.org/

    How children of military service members are at war

    Read more
Panel of experts
  • Dr. Stacey Dixon

    Deputy Director, Intelligence Advanced Research Projects Activity

  • Jean Schaffer

    CISO and Chief of Cyber and Enterprise Operations, Defense Intelligence Agency

  • Debbie Bucci

    Lead IT Architect, Office of the National Coordinator for Health IT, Department of Health and Human Services

  • Naomi Escoffery

    Chief, Business Operations Division for the Deputy Assistant Director for Information Operations, Defense Health Agency

  • Trish Goforth

    Executive Vice President, Booz Allen Hamilton

  • Gigi Schumm

    Host of Women of Washington, Federal News Radio