It was my honor and true pleasure to present one of the keynotes at the 2014 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure. Sponsored by the Center for Trustworthy Scientific Cyberinfrastructure (CTSC) and supported by the National Science Foundation (NSF), attendees included senior technical, cybersecurity staff, NSF program managers, and management of large scientific compute facilities. An absolutely great audience. Lively, vocal, provocative, inquisitive, and passionate about protecting their environments. It makes me feel good such people are responsible for securing key computing infrastructures around the world.
Cybersecurity is difficult. It is a serious endeavor which strives to find a balance in managing the security of computing capabilities to protect the technology which connects and enriches the lives of everyone. Characteristics of cyber risk have matured and expanded on the successes of technology innovation, integration, and adoption. It is no longer a game of tactics, but rather a professional discipline, continuous in nature, where to be effective strategic leadership must establish effective and efficient structures for evolving controls to sustain an optimal level of security. This presentation will discuss the challenges, organizational opportunities, and explore best practices to align investments in security to the risk appetite of an organization.
IT Peer Network: My Previous Posts
My Blog: Information Security Strategy