It’s probably the most critical question ever asked from an infosec point of view. Who are you? Proving the identity of people and systems that connect to your network and access your data is a critical element of your security posture.
Gregory J. Touhill is a retired Brigadier General from the US Air Force and is currently the Deputy Assistant Secretary in the Office of Cybersecurity and Communications for the U.S. Department of Homeland Security.
It would be easy to sit back and think that all the threat actors out there, trying to break into our systems to steal data or cause mayhem, are working in isolation. But the days of the lone wolf sitting in a darkened room, with a hoodie pulled low over their face, are well behind us.
We all suffer multiple personality disorder. Visiting a bank or government agency, or even logging on to social media requires that you identify yourself using some sort of credential.
This article was going to be a report on a session from the recent Technology in Government conference held in Canberra. The title of the session promised a great deal – “The Next Five Years of Security Threats”. And the synopsis suggested we’d hear about what opportunities will disruptive technologies provide hackers, best practice to mitigate emerging threats and whether governments can share data securely?