On February 12th 2013, President Obama signed an executive order to promote the sharing of classified information about threats on the nation’s critical infrastructure. One week later, Mandiant (threat detection company) released a report identifying their near certainty that a unit of the Chinese military was “one of the most prolific cyber espionage groups in terms of the sheer quantity of information stolen.” Continue reading
Category Archives: Cyber@Risk™
#10 – CULTIVATING A RISK PARADIGM SHIFT IN YOUR ORGANIZATION – DR. CAROLYN TURBYFILL
You have nothing to fear from this article.
You think you have done a good job with disaster recovery, security, and risk management. Your employees all fulfill their interactive online training classes on time. You have documented plans for all contingencies. Plans are on the company web site. There are hard copies of key information for everyone. The detailed plans are in folders on your company shared file server with access to sensitive information properly controlled. I am not going to suggest more of the same.
#9 – THE #1 GLOBAL SECURITY THREAT? – DR. CAROLYN TURBYFILL
The Future of Warfare – Greg Hutchins
The future of warfare is being debated in Washington next week.
Next week is ‘Cyber Week.’ Washington is debating four cyber security bills. Lots of noise. Lots of discussion. Lots of differences. Continue reading
Cyber Intelligence Sharing and Protection Act (CISPA) passed in House
From http://www.digitaltrends.com/web/cispa-what-now/:
“What happened in the House
During hours of debate, the House approved 11 amendments to CISPA. You can see the full list here (2 through 12 were approved; 1, 13, and 14 were not). Of these, perhaps the most important amendment is the one proposed by Rep. Bob Goodlatte (R-VA), which limits the way information shared under CISPA to that which is “directly pertaining to” threats, vulnerabilities, or unauthorized access to a system or network. The Goodlatte amendment (pdf) also makes it explicitly clear that information pertaining to the violation of businesses’ Terms of Service do not qualify as “cyber threat intelligence” under CISPA, and thus may not be shared. Continue reading