Hunting for Cyber Threats Targeting Weapon Systems
While traditional cybersecurity defenses focus on prevention, there are many vulnerabilities and potential attacks against weapon systems. While weapon systems are more software dependent and networked than ever before, cybersecurity has not always been prioritized with regards to weapon systems acquisition.
Threat actors have advanced in their sophistication as they are well-resourced and highly skilled, oftentimes gathering detailed knowledge of the systems they want to attack. Ensuring stronger detection methods is imperative, but because these types of threats are very targeted and advanced, agencies need the capability to proactively hunt.
Watch this recorded webinar to see how Fidelis and Carahsoft experts examine:
- How to perform a cybersecurity assessment of weapon systems
- What level of visibility is needed to see vulnerabilities and gaps across your weapon systems environment
- What type of detection methods you should consider
- How to hunt for threats that may bypass preventive and detection techniques
Bob Henry, Engineer – Federal, Fidelis Cybersecurity
Bob brings 22 years of enterprise network and mission systems engineering expertise to the Fidelis Federal Solutions Division. More than twelve years have been dedicated to directly supporting DoD Component and Department requirements. As a network and data security subject matter expert, he has a proven success record in defining security requirements, implementing new technologies securely, providing technical consultation, and articulating technical initiatives to executive leaders.