2017 I/ITSEC - 8250

Cybersecurity Trends: Protecting LVC Networks, Training and Simulation Systems (Room S320C)

Cyber adversaries have a vast array or tools and a keen sense of when to use each one for maximum effect. You may not be able to stop all attacks but, you can minimize risk and impact of threats by constraining adversaries’ operational space. Given LVC’s inherently connected nature and the increasing dependence on commercial technologies, cybersecurity is critical to training and simulation. Network flow data provides a wealth of behavioral information that is useful in understanding normal operation and detecting abnormalities. The ability to collect flow data and contextual information about users, applications and devices enables the network to serve as a powerful security resource. New technology and techniques allow today’s network infrastructure to leverage embedded security capabilities to enable the entire network to serve as an invaluable security resource that can sense abnormalities and threats and automatically enforce security policies in response. Integration and communication between network control and security are absolutely essential.