Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Stopping Advanced Persistent Threats (APTs)
Tuesday - 6/26/2012, 11:08pm EDT
This generates two questions: What are Advanced Persistent Threats (APT) and what kind of standards are being developed to protect my agency from malicious attack?
On today's program, the CTO of security company nCircle gives an easy to understand definition of APTs and his role in developing guidelines for network security.
One curious aspect of T.K. Keaninni's background is that he dropped out of high school and had to go back to get a GED.
In spite of that limitation, his career has taken him to several companies and now is a regular speaker at conferences on computer security - the next one being sponsored by NIST in October 2012 with a focus on the Security Content Automation Protocol (SCAP).
In addition, he has earned the coveted designation of Certified Information Systems Security Professional (CISSP). Quite an accomplishment for a security expert with a music hobby!