Making Security Automation Real (Overflow)

Posted on in Presentations

In the global fight against network intrusion, the inability to communicate between network defense systems allows attackers the upper hand. Security processes cannot keep up against the onslaught of vulnerabilities and weaknesses available to attackers. Only through standardized posture information collection will defenders be able to automate security and harden the network to attack.

Learning Objectives:
1: Understand network security today and how separating defensive systems hinders network defense.
2: Explore a vision of tomorrow’s network security.
3: Learn how to move from standards to commercially available solutions.

An understanding of challenges facing network security professionals today, including recent high-visibility attacks. A background in information security, compliance reporting or systems administration is a plus.
Jessica Fitzgerald-McKay


Co-Lead, Center for Cybersecurity Standards, National Security Agency

David Waltermire


Security Automation Architect, National Institute of Standards and Technology

standards & frameworks security architecture risk & vulnerability assessment intrusion prevention/detection endpoint security


Share With Your Community