1 "Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information
2 Iran Georgia France Estonia Attacks on Nations UK Belgium South Korea Canada United States
3 Allied Irish Banks Attacks on Businesses
4 Why has hacking gotten so bad? Great advances in technology Hacker underground where you can buy malware, point and click hacking programs, tech support Safety and anonymity
5 Who is Involved? Hackers Organized Crime Terrorists Nations
6 Headlines!! Digital Spies: The Alarming Rise of Electronic Espionage Foreign agents are stealing stealth technology, hacking heads of state, and sabotaging American companies. And while many of these attacks are traced to China, electronic espionage is an accelerating scourge that knows no national boundaries. (Adam Piore, Popular Science, Jan. 24, 2012)
7 Headlines!! U.S. Cyber-spying by China and Russia a threat Billions of dollars of trade secrets, technology and intellectual property are being siphoned each year from the computer systems of U.S. government agencies, corporations and research institutions to benefit the economies of China and other countries, the Office of the National Counterintelligence Executive said. (By Ellen Nakashima, Washington Post, Nov. 4, 2011)
8 Headlines!! Hack at Illinois Water Plant Shows Vulnerabilities in Critical Infrastructure Allegedly, hackers based in Russia were able to remotely shut down a water pump at a facility near Springfield. (Sue Marquette Poremba Nov 21, Reuters)
9 Headlines!! CHINA ACCUSED OF RUNNING 10- YEAR RING OF CYBER ESPIONAGE (PYMNTS.COM) A new report from security firm FireEye released yesterday (April 12) accuses the Chinese government of having involvement in a decade-long cyber espionage operation aimed at attacking government agencies, corporations and journalists in India and across Southeast Asia.
10 A Crippling Cyber Attack Would Be an 'Act of War' - Leon Panetta See video here: (
11 Can we categorize the attacks on Nations? Electronic Espionage? Cyber War? Criminal Hacking?
12 So, where do we draw the line? When does a cyber attack cross the line from hacking, cyber crime, or electronic espionage and become an ACT of WAR??
13 Cyber War Act of War/ Use of Force/ Armed Attack LINGO Cyber Attack Electronic Espionage
14 UN Charter Geneva Convention Art. 51 Self-Defense Hague Convention LAW See: Talinin Manual Customary Int l Law Anticipatory Self-Defense
15 Use of Force v. Armed Attack 1. Use of Force: in response a nation may use lesser or equal means as compared to the original use of force (probably would not allow a kinetic response to a cyber attack considered a use of force ) 2. Armed Attack: allows the attacked nation to respond with a proportional response (if cyber attack is considered an armed attack, the attacked nation can likely respond with a kinetic attack)
16 Use of Force v. Armed Attack Issue: When does a cyber-attack equal an armed attack? Theory: Any cyber-attack that may have the same result as a kinetic attack would likely be classified as an armed attack
17 Is this electronic espionage or an act of war? Defacing your adversary s website? (Happened) Blocking their Internet access to the outside world? (Happened) Stealing their military secrets? (Happened)
18 Is this electronic espionage or an act of war? Planting logic bombs in critical infrastructure? What about in defense hardware and software: communication satellites, missile defense, etc.
19 Is this electronic espionage or an act of war? Disrupting an adversary s financial structure? Erasing an adversary s critical data? What about disrupting or even altering GPS? How about challenging our ability to operate freely in the cyber commons?
20 Is this electronic espionage or an act of war? How about disrupting or setting back your adversaries nuclear weapons program, or what they say is just nuclear power??
21 Do We Need a Response? Dubai: The US will face a teeth-breaking response if it continues to carry out cyber attacks against Iran, an Iranian official said Wed. If the Americans futile cyber attacks don t stop, it will face a teeth-breaking response,.... (Iranian Students News Agency)
22 Do We Have a War? If a tree falls in the woods and no one hears it, does it make a sound? If one nation attacks and the other does not respond do we have a war?
23 Critical Piece Do you know who is attacking you? Attribution (can you fire back blindly?) Sum of All Fears In this movie, terrorists made it appear that Russia detonated a nuclear weapon in Baltimore. This deception almost led to the US and Russia launching nuclear attacks on one another. Deception in cyberspace is much easier.
24 What About Precedence? In the 90 s a Russian professor declared that Russia considers information operations (the term used at the time) to be akin to a nuclear attack and retains the right to respond with a nuclear strike.
25 Recap 1. Has a cyber war already occurred? 2. Can we draw a clear line? 3. What factors must inevitably be considered? a. Attribution b. Escalation c. Setting precedence
26 Recap Stuxnet/Code Yellow/Shamoon Act of War/ Use of Force/ Armed Attack??
27 Use of Force v. Armed Attack Use of Force: I would argue that most of what we see in the news that is labeled a cyber-attack or cyber war could be considered a use of force, thus allowing the aggrieved nation to respond in kind. Question: is the use of Stuxnet then considered a use of force? Yes Is it an Armed Attack? This question is yet to be answered!!
28 What will it Take? No single incident Combination of attacks Rise to level of do or die or economic Armageddon!
29 Cyber Pearl Harbor? Eric Rosenbach, Deputy Assistant Secretary of Defense for Cyber Policy: A catastrophic cyber-war is important to prepare for, but an unlikely scenario. Stealing data important to the nation s economic security, is occurring here and now! (National Defense July 2012)
30 Assuming we are not at war, then this is a Risk Management problem for companies. How do you manage this risk? Develop and implement Rules of Engagement (ROE) for your company. E.g. Do you have a plan?
31 Businesses are on their own Government has its hands full! What can companies do? Active Defense!! (Take the fight to the bad guys)
32 Attacks on businesses? Economic Espionage? Criminal Hacking? Does the breach of a large company impact the national security of the nation where it resides?
33 Cyber Attacks The Cost Time Money We are losing the battle Traditional defenses don t work New defenses and options are needed
34 500 Executives Surveyed One thing is very clear: The cyber security programs of US organizations do not rival the persistence, tactical skills, and technological prowess of their potential cyber adversaries. One sad reality is despite all the warnings, companies and individuals continue to fail to implement basic security practices.
35 Current Options for Business Cleanup Nothing Block Response Remove Hack Back Call LE
36 Hack Back- Active Defense What is it?
37 No Is Hacking Back Self- Defense Legal? C.H. Chuck Chassot of the DoD Command, Control, Communications & Intelligence office: It is the DoD's policy not to take active measures against anybody because of the lack of certainty of getting the right person.
38 Is Hacking Back in Self-Defense Legal? Yes Timothy Mullen, CIO of AnchorIS, Inc.: People should be allowed to neutralize one that is unwittingly spreading destructive Internet worms such as Nimda Jennifer Stisa Grannick, litigation director at the Center for Internet and Society at Stanford Law School: This is a type of defense of property. There is a lot of sympathy for that (kind of action) from law enforcement and vendors because we do have such a big problem with viruses.
39 Deterrents to Hack Back Law Ethics Retribution Illegal to gain unauthorized access to a computer Highly probable that hacking back will affect innocent computers or networks You may awaken the beast!
40 Hack Back- Active Defense Legal Issues Nations Law of War Law of Neutrality Collateral Damage
41 Hack Back- Active Defense Legal Issues Business Domestic Law International Law Can/should businesses rely on their governments to defend them? Can they take matters into their own hands?
42 Law Whoever intentionally accesses a computer without authorization or exceeds authorized access, and thereby does or causes XXX is in violation of XYZ Law.
43 One Theory Embed Code in the Phone Home function of a Bot. When the Bot connects to the IRC server the Code disables it.
44 Legal? Did you have the intent to access the innocent computer or server being used as the IRC server? Did you access that server without authorization? Did you cause harm, alter, or in some way have a negative impact on the innocent computer?
45 Legal?, cont. Does an infected computer impliedly grant you access to their system if their computer is causing damage to or plaguing your computer or network? Wouldn t a traditional scenario of self-defense apply in this situation? Is the only driving factor imminence?
46 Legal?, cont. Does an infected computer whose negligence allows your computer to be attacked, and the attack is ongoing or imminent, give you automatic authority to defend yourself by accessing that infected computer? Can the victim of a bot attack claim that their code was automatic, used common protocols, followed the bot into the infected server (IRCd), and blocked the bot did he exceed authorized access?
47 Common Objections: Retribution and Ethics Issues You will start a war with China! Really?
48 You will impact an innocent bystander! No one in this scenario is innocent. Victim? Yes! Innocent? No!
49 Business Owner, Executive, Leader: What s Your Responsibility Protect the business Assess the risk Implement good security Reduce or eliminate liability Protect reputation Recover quickly
51 Hack Back Scenario
52 Questions? David Willson Attorney at Law, CISSP Assess & Protect Corporate Information Text the number In the message type: titansecurity
Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines
Legal & Ethical Considerations of Offensive Cyber-Operations? David Willson Titan Info Security Group, LLC Ben Tomhave LockPath, Inc. Session ID: STAR-304 Session Classification: General Interest David
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
1 Cyberspace and Security 1 Paper by Deputy Secretary of Defense William J. Lynn, Defending a New Domain: The Pentagon s Cyber Strategy, Foreign Affairs (Sep Oct 2010). In addition, an annual report by
Cyberterror Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. What are terrorists main uses of cyberspace? How does cyberterror
Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information
NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented
Your texte here. Cyber Confrontation: Hackers Convincing Victory Over the Security Industry Ilia Kolochenko, High-Tech Bridge, CEO Regional Cyber Security Summit 20 th of April 2014 From where does the
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global
Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Internet security: Shutting the doors to keep hackers off your network A Paralogic Networks Guide www.scholarisintl.com Introduction Like all revolutionary steps in technological development the Internet
Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online
Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks - 5 month later Date: 19 th October 2007 Written by Dennis Rand email@example.com http://www.csis.dk Table of
Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United
UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI June 15th, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security Forum
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 firstname.lastname@example.org A New Obstacle For Cyberinsurance Coverage Law360,
Secure Data Centers For America A SOLUTION TO A HOMELAND & NATIONAL SECURITY THREAT AGAINST CRITICAL INFRASTRUCTURE AND KEY RESOURCES IN STATE AND LOCAL GOVERNMENTS By Ralph R. Zerbonia and Universe Central
Information Security CS 526 Topic 1 Overview of the Course 1 Today s Security News Today: 220 million records stolen, 16 arrested in massive South Korean data breach A number of online gaming & movie ticket
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 Bruce.Heiman@klgates.com (202) 661-3935 Why share information? Prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and
Cole p01.tex V3-07/28/2009 3:46pm Page 1 Network Security Landscape COPYRIGHTED MATERIAL IN THIS PART Chapter 1 State of Network Security Chapter 2 New Approaches to Cyber Security Chapter 3 Interfacing
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
VIENNA MODEL UNITED NATIONS CLUB STUDY GUIDE APRIL SESSION 2013 CYBER SECURITYAND CYBER WARFARE 1 INTRODUCTION With anever-increasingnumber of technological improvements and the expansion of online services
Global Security Studies, Summer 2014, Volume 5, Issue 3 Cybersecurity and United States Policy Issues Cristina Berriz Peace, War and Defense Program University of North Carolina at Chapel Hill Chapel Hill,
Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Two recent studies National Academies Study: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007 Written by Dennis Rand email@example.com http://www.csis.dk Table of contents Table of contents...
CYBER SECURITY THREAT REPORT Q1 Moving Forward Published by UMC IT Security April 2015 0 U.S. computer networks and databases are under daily cyber-attack by nation states, international crime organizations,
FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.
New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 firstname.lastname@example.org email@example.com 1 Key Topics
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
Cyber Security Initiatives and Issues NARUC Summer Committee Meetings Robert Schreiber, CISSP, CISA Director, Client Services and Security Operations ITS July 19, 2009 Water Utility History of SCADA Yesterday
Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential
THE TRILATERAL COMMISSION 2011 WASHINGTON MEETING SESSION ON CYBERSECURITY Saturday, April 9, 2011 The International Context for Cybersecurity James A. Lewis Center for Strategic and International Studies
What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE
Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security
Appendix 2 Deterrence as a security concept against cyber threats Sico van der Meer Current situation Cyber threats, also referred to as digital threats, are among the greatest threats currently facing
Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked
FREQUENTLY ASKED QUESTIONS on C Y B E R S E C U R I T Y By IEEE USA s Committee on Communications Policy December 2011 This Frequently Asked Questions (FAQs) was prepared by IEEE-USA s Committee on Communications
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic
White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It
Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends
FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Surviving the Ever Changing Threat Landscape Kevin Jordan Cyber Security Specialist Dell GLBA FFIEC NCUA PCI HIPAA NERC CIP FISMA 700+ Percentage of U.S. adults who Federal named online and banking state
CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What
Statement before the House Armed Services Committee, Subcommittee on Terrorism, Unconventional Threats and Capabilities HOLISTIC APPROACHES TO CYBERSECURITY TO ENABLE NETWORK CENTRIC OPERATIONS A Statement
Dear Delegates, My name is Marcos Sebastian Banchik and I will be chairing alongside Assistant Professor Daniel Bubb, for the Disarmament and International Security Committee. I am currently a freshman
Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act JULY 17, 2014 2013 Venable LLP 1 Agenda 1. Security Risks affecting the Maritime Transportation System (MTS) 2. The
New Battlegrounds: The Future of Cyber Security and Cyber Warfare Information and communications technologies are part of daily life. They are helping to revolutionize health and education, transform the
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases
The frequency of new editions of this book is indicative of the rapid and tremendous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
The 7 Most Cricitcal I.T. Security Protections Every Business Must Have in Place Now to Protect Themselves from Cybercrime, Data Breaches, and Hacker Attacks Cybercrime is at an all-time high, and hackers
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
Train Like You Will Fight Reliability First Workshop 1 October 2015 Dr. Joe Adams Disclaimer 2 The content of this presentation is based on personal and professional experience of the speaker. The content
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
SECRETARY OF DEFENSE LEON E. PANETTA DEFENDING THE NATION FROM CYBER ATTACK BUSINESS EXECUTIVES FOR NATIONAL SECURITY NEW YORK, NY THURSDAY, OCTOBER 11, 2012 Let me begin by extending my deepest gratitude