Live Breaking News & Updates on Configuration Information|Page 1
Stay updated with breaking news from Configuration information. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.
Up next, a discussion on Election Security. This panel looks at preventing Voting Machines from being hacked. And talks about some of the benefits of paper ballots. Georgetown Laws Institute for Technology Law and policy hosted this series. Hi. Welcome. So im matt blaze. Im a professor here at georgetown in both the law school and Computer Science department. I want to welcome you to our afterlunch panel. Thank you for sticking around. On Digital Technologies and voting. We have, on our panel, who i will introduce very briefly, four very distinguished experts at various parts of the digital elections landscape. And and the technology and the ri ....
Captioning performed by vitac through our cloudbased shared service platform, its a fed ramped cloud where we get the sensors out for those small and micro agencies and feed that data rather than into individual dashboards at their sites, feed it up into a fed ramped cloud where each agency has their multitenant dashboard. Thats been a great accomplishment for the program in terms of for the first time were getting near realtime visibility of those smaller micro agencies and helping them get the capabilities they need to protect their Critical Mission systems. One of the early wins for the program, once we were getting automated discovery capabilities out to the network, we were able to see on average across the federal government that there were 75 more assets than what were being reported up manually. So from that measurement we want to continue to build on that. Now we have all of this vulnerability information feeding up to ....
The continuous diagnostics and Mitigation Program and what im going to talk to you today about is the importance of the cdm program continuous diagnostics and mitigation for federal cybersecurity. I want to set the stage in regards to where the cdm program originated around 2012. Many of these types of headlines were occurring and we see those today, as well. They continue to try to perform reconnaissance on our Government Networks, try to get to our Mission Critical and sensitive data. Really the importance of cdm is to help agencies combat that. What we want to do is help agencies and get in front of the adversary, get in front of the threat. And so, what we have done in the federal government, started out at dod with the cybersecurity architecture review there and now dodcar and we have it in the civilian s ....
, my colleague yana brinzeeva, a journalist in the hall, asked a question , the issue was that ms. Slavenka had written her last book, and yana said that it was such a cold shower for her, because there the author described the russian mother of a fallen soldier and the ukrainian mother of a fallen soldier, and actually put they are about one plane, lets listen to this question, i. E. At the extreme point and so and so becomes a mother. Who lost her son, lost her son, but the russian woman and the russian man could not come, could not kill, then do they have a common experience, then or when we are talking about the fact that this experience is shared, are we not blurring the line between good and evil, well, now lets listen to what ms. Slavenka answered, by the way, it is a very common situation when foreigners, and this happens quite often in the russian media, when. You know the search, here it is from ukrainian from the side of the victim, from the russian side of the victim, lets ....