3rd Party Risk Management , Advanced SOC Operations / CSOC , Governance & Risk Management

Data Sharing: Myths vs. Reality

IronNet’s Brett Williams on Why Now, More Than Ever, We Need Collective Defense
Brett Williams, Co-Founder, Product Evangelist, Cyber Strategist, IronNet Cybersecurity

If recent attacks have taught anything, it’s that defenses are insufficient, and no entity can stand alone against the forces of nation-state adversaries. It’s time for enhanced data sharing under the umbrella of collective defense, says Brett Williams, co-founder of IronNet Cybersecurity.

In this video interview with ISMG, Williams discusses:

  • The concept of collective defense;
  • Myths and realities about private and public sector data sharing;
  • How IronNet Cybersecurity is helping build a new ecosystem for proactive data sharing.

Retired Maj. Gen. Brett T. Williams is a co-founder of IronNet Cybersecurity, which delivers the power of collective cybersecurity to defend companies, sectors and nations. He served nearly 33 years in the U.S. Air Force and his last assignment was director of operations, U.S. Cyber Command. In that position, he was responsible for the operations and defense of Department of Defense networks as well as the planning and execution of offensive actions in support of national security objectives. Williams is a highly experienced fighter pilot with more than 100 combat missions in the F-15C. In addition, he held several large operational commands, including commander of the Air Force’s largest combat wing, located in Okinawa, Japan.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.