Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Stopping Advanced Persistent Threats (APTs)
Tuesday - 6/26/2012, 11:08pm EDT
This generates two questions: What are Advanced Persistent Threats (APT) and what kind of standards are being developed to protect my agency from malicious attack?
On today's program, the CTO of security company nCircle gives an easy to understand definition of APTs and his role in developing guidelines for network security.
One curious aspect of T.K. Keaninni's background is that he dropped out of high school and had to go back to get a GED.
In spite of that limitation, his career has taken him to several companies and now is a regular speaker at conferences on computer security - the next one being sponsored by NIST in October 2012 with a focus on the Security Content Automation Protocol (SCAP).
In addition, he has earned the coveted designation of Certified Information Systems Security Professional (CISSP). Quite an accomplishment for a security expert with a music hobby!