
Sign up to save your podcasts
Or
Today’s discussion brings together two people who have been responsible for managing highly visible networks, a cybersecurity expert from the FBI, and an expert from a technical partner that can bring an overview to the discussion.
Clarice Kent from the U.S. Marine Forces Cyberspace Command begins the discussion with a valid point – you can’t take advantage of leading-edge technology with legacy infrastructure. Rather than a full swoop approach, the Marines are approaching the network upgrade systematically.
After she observes existing technology, she extends her remarks to the security stack.
5
55 ratings
Today’s discussion brings together two people who have been responsible for managing highly visible networks, a cybersecurity expert from the FBI, and an expert from a technical partner that can bring an overview to the discussion.
Clarice Kent from the U.S. Marine Forces Cyberspace Command begins the discussion with a valid point – you can’t take advantage of leading-edge technology with legacy infrastructure. Rather than a full swoop approach, the Marines are approaching the network upgrade systematically.
After she observes existing technology, she extends her remarks to the security stack.