Cyber Security Summit Blog

In remarks delivered earlier today at the American Enterprise Institute in Washington, D.C., FCC Chairman Tom Wheeler outlined his organization's philosophy on cyber security. Stressing the importance of network security, Wheeler noted that today information networks don't just support the economy, they essentially are the economy. "As such, information networks aren’t ancillary; they are integral," he said. "And their security is vital." Wheeler said that given the dynamic nature of the threats we face today, the new security paradigm must be based on private sector innovation and the alignment both public and private interests. “Companies must have the capacity to assure themselves, their ...
Following a year of continued Congressional division, sequestration, a government shutdown and the troubled rollout of Healthcare.gov, IT industry association TechAmerica last week released its annual survey of federal government CIOs. TechAmerica surveys federal government CIOs each year to gauge their ongoing priorities and concerns. In this year's 24th annual report, that group was expanded slightly to include CISOs. The No. 1 priority identified this year was again cyber security/IT security, which sixty-three percent of respondents identified as one of their top three priorities (more than twice as much as any other priority mentioned). In addition, two-thirds of respondents said threats to ...
White House Cybersecurity Coordinator Michael Daniel shared his thoughts on existing cyber security regulations earlier today on the White House blog. In his post, he highlights Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” which among other things directs Executive Branch departments and agencies that regulate the security of private-sector critical infrastructure to assess whether, based on the Cybersecurity Framework, existing regulatory authority is sufficient to address cyber risks. Reports were produced by the Environmental Protection Agency, Department of Health and Human Services and the Department of Homeland Security. The degree to which they regulate for cyber security ranges from high-level requirements to voluntary guidance; however, ...
Earlier today, we learned details of the latest cyber attack to affect a major online retailer when eBay reported that a database containing encrypted passwords and other non-financial data had been compromised. The company is asking its users — all 128 million of them — to change their passwords as a precautionary measure, joining others who have recently been required to issue large-scale password resets including Yahoo, AOL and Evernote. EBay says extensive network tests have so far found no evidence of any unauthorized activity for users or unauthorized access to financial or credit card information (which is stored separately). As ...
TeleCommunication Systems, which specializes in secure mobile communication technology, today reported it has entered into a contract with E-volve Technology Systems to provide training services to the U.S. Air Force for its Cyber Operations Training Program. The subcontract includes a base award term of five months and two one-year option terms for a total possible value of $3.3 million. The Air Force is funding the Cyber Operations Formal Training Support contract awarded to E-volve Technology Systems, and TeleCommunication Systems will provide training services including course planning, design and development; training, instruction and administration; technical analysis and courseware maintenance. Additionally, TeleCommunication Systems will provide ...
Post-resession, partnering with third-party vendors and outsourcing tasks that were once handled in-house has become a common cost-saving strategy. Unfortunately, many organizations aren't prepared to address the information technology and security risks that can emerge from outsourcing, according to a new survey by the Shared Assessments Program and consulting firm Protiviti. The survey, which asked companies about their current vendor risk management programs, found a general lack of mature vendor risk management practices as well as insufficient resources and staff to meet current best practice standards. "Managing the risks associated with outsourced services and vendor relationships is one of the many challenges facing ...
Retailers were among the hardest hit and most talked about victims of cyber crime in 2013. Now they are doing their best to fight back. Just yesterday, the Retail Industry Leaders Association and key retailers from around the country launched the Retail Cyber Intelligence Sharing Center, otherwise known as R-CISC. The center is an independent organization whose key feature is a "Retail Information Sharing and Analysis Center," which is designed to do exactly what its name suggests. According to RILA, the center will allow retailers to share cyber threat information both among themselves and with others, including the U.S. Department ...
At a presentation at the University of Minnesota this morning, National Institute of Standards and Technology Fellow Ron Ross announced the publication of a new set of systems security engineering guidelines designed to help improve information security. NIST Special Publication 800-160 was released in draft form and is now available for public comment. You can download the publication here: "Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems." Ross said the announcement was made at the university to highlight where the skills needed to combat tomorrow's cyber security challenges will come from. He said the University of Minnesota's Technological Leadership Institute represents a model ...
Ron Ross, a fellow at the National Institute of Standards and Technology and leader of the Federal Information Security Management Act Implementation Project, will announce new draft cyber security guidelines at the University of Minnesota on Tuesday. The guidelines are contained within "Special Publication 800-160, Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems." They were written to help both private- and public-sector officials build more resilient IT infrastructures. Ross is the principal architect of the NIST Risk Management Framework and leads the Joint Task Force Transformation Initiative Working Group, an effort to develop a unified information security framework for the federal ...
Following recent high profile data breaches, many companies are wondering what terms and conditions should be in vendor contracts. That is great question to ask. Many companies – big and small – sign vendor contracts without considering the data security issues. Often times, a contract that is “small potatoes” from a dollar standpoint has the potential to create a disproportionate level of risk. (Consider, for example, a company hired to empty your company’s shredder bin.)  Such contracts often get signed without careful review, putting companies at risk. While each company should get individualized legal advice, here are six things that ...