#10 – WILL CYBER ATTACKS PUSH US OVER THE BRINK? – JOHN MILLICAN


John Millican pixOn February 12th 2013, President Obama signed an executive order to promote the sharing of classified information about threats on the nation’s critical infrastructure.  One week later, Mandiant (threat detection company) released a report identifying their near certainty that a unit of the Chinese military was “one of the most prolific cyber espionage groups in terms of the sheer quantity of information stolen.” Continue reading

#10 – CULTIVATING A RISK PARADIGM SHIFT IN YOUR ORGANIZATION – DR. CAROLYN TURBYFILL

You have nothing to fear from this article.

turbyfillYou think you have done a good job with disaster recovery, security, and risk management.  Your employees all fulfill their interactive online training classes on time.  You have documented plans for all contingencies.  Plans are on the company web site.   There are hard copies of key information for everyone.  The detailed plans are in folders on your company shared file server with access to sensitive information properly controlled.  I am not going to suggest more of the same.

Continue reading

Cyber Intelligence Sharing and Protection Act (CISPA) passed in House

From http://www.digitaltrends.com/web/cispa-what-now/:
“What happened in the House

During hours of debate, the House approved 11 amendments to CISPA. You can see the full list here (2 through 12 were approved; 1, 13, and 14 were not). Of these, perhaps the most important amendment is the one proposed by Rep. Bob Goodlatte (R-VA), which limits the way information shared under CISPA to that which is “directly pertaining to” threats, vulnerabilities, or unauthorized access to a system or network. The Goodlatte amendment (pdf) also makes it explicitly clear that information pertaining to the violation of businesses’ Terms of Service do not qualify as “cyber threat intelligence” under CISPA, and thus may not be shared. Continue reading