Best listening experience is on Chrome, Firefox or Safari. Subscribe to Fed Tech Talk’s audio interviews on Apple Podcasts or PodcastOne.
Our guest is Mike Ewell, Director at Solutions by Design II. Today’s interview focuses on examining the recent DHD cybersecurity guidelines and improved methods to manage a Secure Operations Center, or a SOC.
The discussion started off with a quick review of the guidelines that include assessing risk and protecting systems. From his experience, Ewell indicated that...
Best listening experience is on Chrome, Firefox or Safari. Subscribe to Fed Tech Talk’s audio interviews on Apple Podcasts or PodcastOne.
Our guest is Mike Ewell, Director at Solutions by Design II. Today’s interview focuses on examining the recent DHD cybersecurity guidelines and improved methods to manage a Secure Operations Center, or a SOC.
Mike Ewell, director, Solutions by Design ll
The discussion started off with a quick review of the guidelines that include assessing risk and protecting systems. From his experience, Ewell indicated that this is because malicious actors can penetrate systems and not make significant changes. They may make minor changes that aren’t noticed.
Ewell expands upon how this seemingly innocuous change can have a drastic impact in the commercial world when it comes to evaluating the value of companies. One way to prevent this attack is with improved SOC management.
Many times, automation is the solution for improving the way SOCs are managed. However, Ewell provided a remarkable statistic – some people claim that 85% of the time people try to automate tasks on SOCS, they fail.
Listing requirements and giving parameters must be balanced with human analysis to be able to effectively automate a Secure Operations Center.
Host John Gilroy of The Oakmont Group speaks the language of federal CISOs, CIOs and CTOs, and gets into the specifics for government IT systems integrators. Follow John on Twitter. Subscribe on Apple Podcasts or Podcast One.