in

David Fastabend Outlines Views Cyber Info Sharing, Workforce

David Fastabend Outlines Views Cyber Info Sharing, Workforce - top government contractors - best government contracting event
https://executivebiz-media.s3.amazonaws.com/2022/08/19/30/9f/c3/a0/b7/6f/d4/64/Executive-Biz.png
David Fastabend Outlines Views Cyber Info Sharing, Workforce - top government contractors - best government contracting event
David Fastabend

David Fastabend, a vice president at ITT Exelis, has encouraged his former colleagues in the U.S. Army to “Adapt or Die“ when dealing with cybersecurity. 

Sydney J. Freedberg Jr. of AOL Defense interviewed the retired major general following the defeat of a cybersecurity bill in the Senate last week last week.

Fastabend explained that legal liability and obligation of sharing cyber threats are not the only issues that must be tackled.

He said sharing information with other networks would only notify perpetrators their victims are aware of the attack.

He compared the scenario to U.S. forces and roadside bombers in Afghanistan and Iraq, an issue he worked closely with during his time with the army.

The rejected cybersecurity bill may contain suggestions to improve national security standards but the legislation process is just too slow to keep up with the turn-over of technology, he claimed.

The regular legislative process lasts for 36-to-40 months but technology changes every 18 months, Fastabend said.

He also shared that quick adaption to threats and not just rapid reaction should be practiced.

He particularly clarified that when hiring cybersecurity personnel it is important to select people with a high and quick capacity to learn because they encounter new scenarios every day.

Employers should realize that skill level should be measured first rather than the number of people doing the job, he added.

Fastabend also recommends for the adoption of the layered approach in cybersecurity.

The first phase he recommends is ensuring proper cyber hygiene, where suspicious attachments and files must not be opened or downloaded and sketchy areas of the web should be avoided.

Second is securing supplementary protection and contingency plans and Fastabend says those plans should not rest on mere firewalls and passwords for protection.

Fastabend said it is more convenient to conduct and attack than defend a system since current networks instant communication and provides little restriction.

He said the system will favor offenders until the whole system is rebuilt from the root.

ExecutiveBiz Logo

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Cybersecurity News

mm

Written by David J. Barton

Harris to Demo Anti-IED Robot; Bill Gattle Comments - top government contractors - best government contracting event
Harris to Demo Anti-IED Robot; Bill Gattle Comments
Booz Allen to Provide Saudi Navy English Training, C4I Support - top government contractors - best government contracting event
Booz Allen to Provide Saudi Navy English Training, C4I Support