IEEE / Honors College Forum on Cybersecurity: Brad Rhodes (Accenture Federal Services)

#Cyber #Cybersecurity #Speaker #Computersociety #CriticalInfrastructure
Share

Part of a weekly cybersecurity forum cohosted by IEEE Ozark Section, IEEE Computer Society Chapter, and UA Honors College.

This week, Brad Rhodes (Accenture Federal Services) will discuss "Malicious Trends: What You Need to Know".



  Date and Time

  Location

  Hosts

  Registration



  • Date: 22 Mar 2023
  • Time: 05:00 PM to 06:00 PM
  • All times are (UTC-05:00) Central Time (US & Canada)
  • Add_To_Calendar_icon Add Event to Calendar
If you are not a robot, please complete the ReCAPTCHA to display virtual attendance info.
  • Contact Event Hosts
  • Co-sponsored by University of Arkansas Honors Forum on Cybersecurity
  • Starts 18 March 2023 01:11 PM
  • Ends 22 March 2023 04:30 PM
  • All times are (UTC-05:00) Central Time (US & Canada)
  • No Admission Charge


  Speakers

Brad Rhodes Brad Rhodes of Accenture Federal Services

Topic:

Cybersecurity Forum: Brad Rhodes (Accenture Federal Services)

Talk Description: Current trends show Malicious Cyber Actors (MCA) are masters at using cheap or free infrastructure to maximize their "profits".  The good news for cyber defenders is that this usage creates observable patterns and behaviors that can potentially be used to interdict MCAs before they impact enterprise environments.  Let's explore and discuss these trends to improve our understanding of MCAs before they do us harm.

Biography:

Brad Rhodes, Senior Manager at Accenture Federal Services in Denver, CO, holds numerous professional certifications and he has 26+ years experience in the military, government, and private sectors. Brad is a Veteran who continues to serve in the US Army Reserve as the G6/Chief Information Officer for the 76th Operational Response Command delivering communications for the Nation’s CBRNE response mission. Brad's major research includes utilizing Open Source capabilities to help organizations close security gaps, characterize their cyber operating environments, and gain visibility to stacks of data.