AWS Verified, episode 4: How Lockheed Martin embeds security
<p>Year < last;a href="http://aws.amazon.com/" target="_blank" rel="noopener noreferrer">Amazon Web Services (AWS)</a> launched a fresh video series, <em><a href="https://aws.amazon.com/security/verified/" focus on="_blank" rel="noopener noreferrer">AWS Verified</a></em>, where we speak to global cybersecurity leaders about important issues, such as for example how the pandemic will be impacting security cloud, how to develop a culture of security, and emerging security trends. Today I’m pleased to share the latest bout of <em><a href="https://youtu.be/b9mC9hSu0l8" rel="noopener noreferrer" focus on="_blank">AWS Verified</a></em>, an interview with Mike Gordon, the Vice Chief and President Information Security Officer for <a href="http://www.lockheedmartin.com" target="_blank" rel="noopener noreferrer">Lockheed Martin Corporation</a>.</p>
Lockheed Martin is really a global aerospace and protection company with about 110,000 workers in over 50 countries.
Even if you know about the Cyber Kill Chain® framework (a model for identification and prevention of cyber intrusion activity) or Lockheed Martin’s military platforms, just like the F-35 fighter jet, the C-130 cargo plane, or the BLACK HAWK helicopter, day you will possibly not remember that they create systems that you almost certainly use every, like satellites for GPS, weather prediction, and communications. They’ve backed every NASA mission to Mars and constructed heat shield for the Perseverance rover that recently landed on Mars. They deliver < also;a href=”https://www.lockheedmartin.com/en-us/capabilities/cyber.html” target=”_blank” rel=”noopener noreferrer”>full-spectrum cyber capabilities and cyber-resilient systems to defense, intelligence, and global security customers round the global world.
Mike is in charge of Lockheed Martin’s overall information security strategy, policy, security engineering, operations, and cyber threat response and detection.
I asked Mike to talk about Lockheed Martin’s method of cyber resiliency and how this informs their cybersecurity strategy. His response: “Cybersecurity is usually embedded in everything we perform. You want to be sure that cyber resiliency isn’t around helping and defending our corporate networks just, but additionally those platforms that people deliver to military and government customers round the global world. To take action, we developed a fresh concept known as the Cyber Resiliency Level Framework (CRL)…the CRL offers us a typical way to gauge the cyber maturity and resiliency of a weapons system. It’s used to aid stakeholders in prioritizing risks and selecting courses of action to greatly help maximize the result against cyberattacks.”
Mike shared insights on Lockheed Martin’s cloud transformation journey also, partnering over the industry to conduct tabletop exercises, and approaching zero rely upon the defense industry supply chain.
View the interview, and go to the AWS Verified webpage to view previous episodes, which includes interviews with security leaders from Netflix, Vodafone, and Comcast. For those who have an basic idea or perhaps a topic you’d like protected in this series, make sure you drop us a comment below.
Need more AWS Security how-to content, news, and show announcements? Stick to us on Twitter.