Skip to content

customize
GFirst 5th Annual Conference
Home Registration Agenda At-a-Glance Call for Papers Call for Papers Press Hotel & Travel GFirst FAQ Contact Us Expo

Announcing the 5th Annual GFIRST National Conference
at the Omni Hotel at CNN Center in Atlanta, Georgia – August 23-28, 2009


Over 1000 Attendees and more than 30 Vendors expected in Atlanta, Georgia – don’t miss out!

GFIRST5: The Five Pillars of Cyber Security:  Threat - Vulnerability - Attack & Detection - Mitigation - Reflection.   These foundations support the cyber security and incident response community by identifying the core components of incident management. Regardless of what sector you work in, these five pillars provide a framework that must be covered to secure information systems. 
The Five Pillars of Cyber Security
Threat: Collection and analysis of information regarding attacks and/or malware utilized to breach controls in information systems that would otherwise be unavailable to our constituency. Organizations need to understand the threats: who are they, what their intent is, and what capabilities they have. Understanding the threat assists in protecting systems against them and helps organizations prioritize them. 
Vulnerability: Providing identification and aggregation of exploitable weaknesses in information systems from an authoritative source. Understanding the vulnerabilities being exploited by attackers is key to planning the release of information and protecting systems. Once the vulnerabilities are understood, they can be prioritized against other vulnerabilities which will assist in determining those that are most important to protect against and mitigate first (i.e. patching). Prioritization allows organizations to release high quality products with the most important, relevant information.
Attack & Detection: Actions used to identify threat activity that exists in a complex, multi-agency, multiplatform environment.  Attack & Detection is better implemented once an organization understands the threat and the vulnerabilities being exploited. Once this information is understood, organizations can implement the appropriate detection mechanisms on their systems.
Mitigation: Solutions that contain or resolve risks through analysis of threat activity and vulnerability data which provide timely and accurate responses. Mitigation is the way in which organizations prevent attacks, reduce vulnerabilities and fix systems. Mitigation is sometimes difficult to implement as it is time consuming and tedious, but prioritization coupled with understanding the threats and vulnerabilities assists in forming an effective mitigation strategy.
Reflection: Maturing and developing the defense of critical information systems by compelling or influencing changes in law, regulation, policy, or procedure.  Reflection allows organizations to review the threats, vulnerabilities exploited, attacks and overall system posture to implement policy and technology changes that will assist in protecting systems from similar incidents in the future.
Don’t miss your opportunity to hear the latest in cyber security trends and technology plus interact with key industry and government leaders. In an increasingly connected society, building partnerships and strengthening relationships among the incident response and security community are essential to effective response coordination and collaboration – and the 5th Annual GFIRST National Conference is the place to be this summer!
Why should you attend?
Benefits Include
  • Networking with top information security professionals and government officials.
  • Hearing expert speakers discuss the latest in cyber security news and trends as seen by government agencies, law enforcement, private sector and academia.
  • Participating in information-sharing groups on topics such as collaboration methods and incident response practices. 
  • Continuing professional growth with industry peers and keeping abreast of the newest issues, trends, preemptive measures and case studies.
Who Should Attend?
The GFIRST Conference is open to all interested in learning more about cyber security and incident response. GFIRST Conferences are a great place for public and private sector leaders serving in non-technical roles to become familiar with the fundamentals of cyber security and incident response. GFIRST is also an excellent resource for practitioners in incident response and information security from the public and private sectors to include:
  • GFIRST Members
  • Cyber Incident Responders
  • Chief Information Security Officers
  • Chief Technology Officers
  • Information System Security Officer
  • Information System Security Managers
  • Information Technology Directors
  • Information Technology Administrators
  • Network Administrators
  • Cyber Security Experts
  • Law Enforcement Personnel Supporting Cyber Security Issues
  • Emergency Managers
  • Incident Response Directors
  • Academia with Cyber Security Specialties
  • Cyber Security Association Members
  • Computer Forensic Personnel
  • Security Engineers
  • Software Developers & Managers
  • Process Improvement Managers
  • Inspector Generals
  • Critical Information Infrastructure Owners & Operators
  • ISAC Members
What is GFIRST?
GFIRST is a group of technical and tactical practitioners from incident response and security response teams responsible for securing government information technology systems and providing private sector support. GFIRST members work together to understand and handle computer security incidents and to encourage proactive and preventative security practices across government agencies. GFIRST promotes cooperation among the full range of Federal, State and local agencies, including defense, civilian, intelligence, and law enforcement.
What is US-CERT?
US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners.

US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public.

US-CERT also provides a way for citizens, businesses, and other institutions to communicate and coordinate directly with the United States government about cyber security.