
Sign up to save your podcasts
Or


Today’s discussion brings together two people who have been responsible for managing highly visible networks, a cybersecurity expert from the FBI, and an expert from a technical partner that can bring an overview to the discussion.
Clarice Kent from the U.S. Marine Forces Cyberspace Command begins the discussion with a valid point – you can’t take advantage of leading-edge technology with legacy infrastructure. Rather than a full swoop approach, the Marines are approaching the network upgrade systematically.
After she observes existing technology, she extends her remarks to the security stack.
By FedInsider5
55 ratings
Today’s discussion brings together two people who have been responsible for managing highly visible networks, a cybersecurity expert from the FBI, and an expert from a technical partner that can bring an overview to the discussion.
Clarice Kent from the U.S. Marine Forces Cyberspace Command begins the discussion with a valid point – you can’t take advantage of leading-edge technology with legacy infrastructure. Rather than a full swoop approach, the Marines are approaching the network upgrade systematically.
After she observes existing technology, she extends her remarks to the security stack.