Items Tagged with "Cyber Security"
March 19, 2012 Added by:Headlines
"The market-wide exercise showed that the banking community is prepared to handle some aspects of a cyber attack, but must shore up other areas. I encourage all managers to think about whether they are have adequate, practical plans in place..."
March 15, 2012 Added by:Headlines
"We share an abiding commitment to keeping cyber-criminals from victimizing our citizens and weakening our trust in networked technology. Owing in part to our close partnership, it is harder than ever before for criminals to operate in cyberspace with impunity..."
March 13, 2012 Added by:Infosec Island Admin
Are you a Cyber Warrior and seeking a new employment opportunity? Don't miss the TECHEXPO Cyber Security hiring event March 20th. Bring resumes and interview for the many opportunities, and learn from our guest speakers William M. Jimenez, Paul de Souza, and Richard Bejtlich...
March 13, 2012 Added by:Headlines
"Less than two-thirds of the Forbes Global 2000 companies surveyed have full-time personnel in key roles responsible for privacy and security in a manner that is consistent with internationally accepted best practices and standards..."
March 11, 2012 Added by:Chris Blask
The LIGHTS program was created as a means of addressing security for the large number of small utilities operations. LIGHTS is a non-profit program run under Energysec that sets a consistent open-source-baseline approach to securing smaller critical industrial control facilities...
March 08, 2012
Cybersecurity is now expanded to address the following: combined power systems, information technology and communication systems in order to maintain the reliability, the physical security of all components, and the reduced impact of coordinated cyber-physical attacks...
February 24, 2012 Added by:J. Oquendo
Common sense dictates that there is a lot of money to be made in "cyberlandia", and someone is going to make it by using any boogeyman available. Cyber is the new Gold Rush, however much of what is being portrayed by the media is blown out of proportion and unrealistic...
February 22, 2012 Added by:Headlines
The Letter of Intent recognizes expanded coordination between the US and the Netherlands, and outlines several areas to further collaborate on cybersecurity including incident management and response activities, control systems security, and cybersecurity exercises...
February 19, 2012 Added by:Rafal Los
This is just a chance to create some new regulatory-agency office, hire a bunch of new auditors, attorneys, experts, and waste more time rather than actually making critical infrastructure more risk-averse...
February 15, 2012 Added by:Richard Stiennon
Every organization has a choice: become a victim of cyber attack and pay the cost of recovery then rely on quick reactions to changes in the threat space to survive the next attack, or predict the escalation in attacks and invest early in the defenses required...
February 14, 2012
The act was designed to provide the government with a clear structure for securing its own networks and those that run critical infrastructure - energy and water delivery systems, financial systems, nuclear and chemical, plants, and transportation networks...
February 13, 2012 Added by:Headlines
The President’s proposal would establish national standards, protect federal networks, and allow DHS to provide enhanced voluntary assistance to our private sector and state, local, tribal, and territorial government partners...
February 13, 2012 Added by:Headlines
FISSEA is responsible for promoting cybersecurity awareness, training and education. The annual meeting is geared toward both new and seasoned security officers, IT managers, information security educators and researchers, cybersecurity trainers and teachers...
February 07, 2012 Added by:Theresa Payton
Many of us use and love Bluetooth technology. It’s easy to set up and convenient to use. But you might want to think twice about what you use it for because that easy connection for you can also be an easy connection for a cybercreep...
February 07, 2012 Added by:Headlines
DoD networks and personnel are being tested to the very limits of their ability to deflect assault. Attackers all over the world are utilizing every conceivable method to gain access to our critical systems and introduce malicious code to exploit or destroy our assets...
February 06, 2012 Added by:Headlines
Among the greatest challenges in cyber security are knowing the perpetrator of a cyber attack in real time and finding capability gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure...