#50 – BLACKMAIL & BOUNTIES & BITCOIN – OH MY! – Dr. Carolyn Turbyfill

Do you have an old Hotmail account lying around?   What would you do if:

Dr. Carolyn Turbyfill

Dr. Carolyn Turbyfill

  • Someone took control of an account belonging to you – using public information to answer the security questions that allow you to reset a password.
  • Used your compromised account to break into other more sensitive accounts – your business, bank, etc.
  • Then blackmailed you for $20,000 with the threat of selling your identity and accounts to ‘fraudsters’ who ‘would ruin your life’? Continue reading

#41 – THE NEW CYBER WARFARE & ISO 27001 – EDWARD HUMPHREYS

Cyber threats continue to plague governments and businesses around the world. These threats are on the rise as cyber criminals increase their focus and know-how. The problem demands an international solution.  ISO/IEC 27001 provides a management framework for assessing and treating risks, whether cyber-oriented or otherwise, that can damage business, governments, and even the fabric of a country’s national infrastructure. Continue reading

#41 – CYBER SECURITY IS NOW JOB #1 – NIST CYBER SECURITY FRAMEWORK – GREG HUTCHINS

Thirty years ago Ford Motor Company had a tag line in all its advertising:

Quality is Job #1!

Great tagline.  Now we believe that everyone’s new tagline is:

Cyber Security is Job #1!

Greg Hutchins pixThe US National Institute of Standards and Technology (NIST) has just finalized its much expected cyber security risk management framework.

President Obama directed NIST to develop a risk management   framework to secure infrastructure vital to the US and for that matter’s any country’s critical infrastructure such as banking, electrical power grid, water, and transportation. Continue reading

#39 – FUTURE TECHNOLOGIES HERE TODAY – CAPERS JONES

Capers Jones pixThis paper discusses a number of interesting technical advances that are theoretically already possible in 2014, although in fact not currently available.  Hopefully showing the software community what is technically feasible will encourage universities and larger corporations to move more quickly. Continue reading

#38 – CERM RISK INSIGHTS 2014 CYBERSECURITY WEBINAR SERIES

The title of the proposed 2014 cyber series is:  Changing Cyber Landscape

This year is going to be a banner year for cyber security.  Take a look at the following events.  The number of data breaches will increase.  More state actors from China, Russia, and even our allies will attempt to penetrate critical infrastructure.  More revelations on cyber intrusion of Federal facilities.  Further losses of personal identification information.  Heightened cyber warfare.  Significant data breaches growing exponentially.  Increasing cyber crime with material impacts.  Additional NSA revelations.  Increased privacy law breaches.  More regulatory penalties, shareholder lawsuits, and reputational damage.  And, the list goes on. Continue reading