Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom Dell Technologies World Digital Experience 2020 HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

CEO Kevin Mandia: FireEye Has A 90 Percent Success Rate Cracking Corporate Networks

"The only unvarnished truth any Chief Information Security Officer can really get is can someone break into my network from the internet and get to the CEO's email or get to business-critical applications," said FireEye CEO Kevin Mandia.

Back 1 ... 4   5   6   7   8   ... 16 Next
photo

If you were president of the United States, what would you do to solve cyberterrorism?

First thing you have to do, if I were sitting in the White House today, I would tell whoever held the office, the No. 1 thing you've got to make sure of if you are ever reading about a breach is you turn to your intel community and say, ‘Who did it?’ And if they can't answer, we've got a problem, because you can't impose risks or repercussions and proportionately respond to anything unless you know who did it. And that's going to require technical assets. It's going to require human assets, and it's going to require international cooperation. So that would be question No. 1.: You've got to make sure you get attribution right. And, quite frankly, sovereign nations have that figured out.

With the private sector, we don't have the visibility to always know "that attack that shut down a utility was that person." No offense to Ted Koppel—he wrote a book called ‘Lights Out.’ I don't think we're going to have a ‘lights out’ moment, especially in the big cities. And we will see failure before we see success when somebody attacks our utilities. And the good news on that—there is, it turns out, a deterrent outside of cyberspace, if you know who did it. It's called drone strikes. But the bottom line, that's what I'd say, ‘Protect utilities, and you've got to get your attribution right.’

 
 
Back 1 ... 4   5   6   7   8   ... 16 Next

sponsored resources