The expert panel was comprised of William Yurek, Program Director of Cyber Intrusion Investigations at the Defense Criminal Investigative Service; Steven Hernandez, Chief Information Security Officer, Acting Chief Technology Officer and Director of Information Assurance for the Office of the Inspector General at the U.S. Department of Health and Human Services; and Frank Konieczny, Chief Technology Officer at the U.S. Air Force.
The panel discussion started off noting the anniversary of the Office of Personnel Management (OPM) data breach incident. Several perspectives were given on the need to speed up a securitys team’s ability to detect and investigate attacks.
Other topics included analytics, people, process, and technology. The reference to “orchestration” was applied to federal cybersecurity events. One obstacle to coordinating actions is the problem of silos of security and information. Participants expanded on each agency’s ability to handle orchestration across platforms, people, and processes.
In a light moment, the panel opined on the variation between structured data, unstructured data and the newly minted phrase, “mostly” structured data. The discussion made a transition with an expansion on the topic of encryption.
Questions arose about the percentage of traffic on a typical network. Konieczny estimated that the Air Force had 100% encrypted traffic. He noted that the concern was not on the encryption, but the vulnerability inherent in the process of encrypting and decrypting.
The wide ranging discussion also included comments on Next Gen Firewalls and EndPoint Forensics.
John Gilroy, Host of Federal Tech Talk, Federal News Radio
John Gilroy has been a member of the Washington D.C. technology community for over twenty years. In 2007 he began weekly interviews on Federal News Radio called “Federal Tech Talk with John Gilroy.” His 428 interviews provides the basis for profitable referral business. In 2009 he created a successful breakfast club of previous radio guests called The Technology Leadership Roundtable. He has been instrumental in two of his guests forming their own radio shows: Derrick Dortch with “Fed Access” and Aileen Black and Gigi Schumm with “Women in Washington.”
In 2011 he began teaching a course in social media marketing at Georgetown University; in March of 2014, John won the Tropaia Award for Outstanding Faculty. John conducts monthly corporate training for large companies on how to leverage social media to generate revenue.
William Yurek, Program Director of Cyber Intrusion Investigations, Defense Criminal Investigative Service
William A. Yurek is Director of Cyber Intrusion Investigations at the Defense Criminal Investigative Service, and is the DCIS liaison to the National Cyber Investigations Joint Task Force, the International Crime Coordination Center, and other national task forces and centers. Prior to this position, Mr. Yurek was a Senior Counsel in the Computer Crime and Intellectual Property Section (CCIPS), Criminal Division, U.S. Department of Justice in Washington D.C. Prior to working at DOJ, Mr. Yurek was a Senior Counsel in the Enforcement Division of the U.S. Securities and Exchange Commission, where he investigated and prosecuted insider trading, stock manipulation, and other violations of US securities laws. While at the SEC, Mr. Yurek conducted the first investigation and prosecution of an internet stock manipulation scheme in SEC history.
Steven Hernandez, Chief Information Security Officer, Acting Chief Technology Officer and Director of Information Assurance, Office of the Inspector General, U.S. Department of Health and Human Services
Steven Hernandez, MBA, CISSP, CSSLP, SSCP, CAP, CISA, HCISPP is the Chief Information Security Officer, Acting Chief Technology Officer and the Director of Information Assurance for the Office of Inspector General at the US Department of Health and Human Services. Hernandez has over eighteen years of information assurance experience in a variety of fields including international heavy manufacturing, large finance organizations, educational institutions, and Government agencies. Prior to Joining the HHS Inspector General’s office, he held senior information assurance positions at the US Department of Education, the United States Department of Agriculture, and at a National Security Administration Center of Academic Excellence Research Institution. Steven is affiliate faculty at the National Information Assurance Training and Education Center located at Idaho State University and an Honorary Professor at California State University San Bernardino. He lectures and presents on numerous information assurance topics including risk management, information security investment, and the implications of privacy decisions to a broad spectrum of government, industry, graduate and post-graduate audiences. Steven is a member of (ISC)2’s Board of Directors and also volunteers service to (ISC)2’s Government Advisory Board and Executive Writers Bureau. He is the lead author and editor of the Official (ISC)2 Guide to the CISSP CBK, Third Edition in addition to authoring four other major information assurance publications.
Frank Konieczny, Chief Technology Officer, U.S. Air Force
Frank Konieczny, a Senior Level executive, is the Chief Technology Officer, Office of Information Dominance and Chief Information Officer, Office of the Secretary of the Air Force, the Pentagon, Washington, D.C. He has primary responsibility to advance the technology landscape of the Air Force. His current focus areas include the developing the technical target baseline, mobile enterprise solutions, data management, IdAM access/claims management, cyber and technology innovation pathfinders and advancing the Joint Information Environment.
Zulfikar Ramzan, Chief Technology Officer, RSA
Dr. Zulfikar Ramzan serves as the Chief Technology Officer of RSA, the Security Division of EMC. In this role, he is responsible for leading the development of the company’s technology strategy and bringing to market the innovations that help protect RSA customers from the growing number of advanced threats.
Every day, and for over 30 years, RSA's singular mission has been to help our more than 30,000 customers around the world protect their most vaulable digital assets. RSA is driven by its uncompromising belief that organizations should not have to accept getting breached or hacked as an unavoidable consequence of operating in a digital world. In fact, RSA believes that organizations must become aggressive defenders of their right to operate securely and that no other company is in a better position to help them.
RSA's Business Driven Security solutions help organizations reduce the risks of operating in a digital world. Through visibility, analysis, and action, RSA solutions give customers the ability to detect, investigate and respond to advanced threats; confirm and manage identities; and ultimately, prevent IP theft, fraud, cyber-espionage, and cybercrime.
RSA Federal Solutions is the premier provider of intelligence-driven security solutions to the Federal government, serving every cabinet level agency, each military service, and the intelligence community. For more information, please visit federal.rsa.com.