Tracks: Innovation Showcase
Learn how to enable the operator to complete their mission while also assuring identity of access to sensitive devices (yes, even those legacy non-CaC enabled devices). Today’s cyber-warfare and risk mitigation strategies require not only assuring the identity of who is on our network and what they are doing, but making sure we take the next step in analytics. Combining both behavioral analytics and correlation analysis to truly be able to give incident response teams and audit and information assurance operators the ability to know when suspicious activity is happening and react at a moment’s notice.