Cyber Resilience 2023 – Day One: How to Survive a Cyber Attack

Ever since the dawn of the internet, its value lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it.

Even hostile nation-states such as North Korea seek U.S. and state agencies’ data because they need the money. For instance, the Department of Treasury, Cybersecurity and Infrastructure Security Agency (CISA) and FBI warned in 2022 that North Korean hackers were launching ransomware attacks against healthcare and public health IT systems. Many cybersecurity professionals are hopeful that artificial intelligence (AI) can play a role in improving system defenses.

Learning Objectives:

  • Identify the most common threats, as well as emerging threats, to government data at all levels – federal, state, local, tribal, and territorial
  • Outline the best cyber hygiene practices followed by CISOs
  • Delineate metrics that can be used to track improvements in data protection
  • Review the current state of AI in cybersecurity and how to use it to detect and prevent threats

Complimentary:    $ 0.00

Leave a Comment

Scroll to Top