Cyber Security in East Asia and Policy Cooperation

Size: px
Start display at page:

Download "Cyber Security in East Asia and Policy Cooperation"

Transcription

1 Summary of USJI Seminar on Cyber Security in East Asia and Policy Cooperation between Japan and the United States September 8, 2010 On the Independence Day of the United States in 2009 cyber attacks in a massive scale against major web sites broke out without warning. Soon thereafter, similar attacks began in South Korea and they continued in a wavelike fashion. Experts found that these attacks were conducted by the same group, but could not find who they were. As Japan maintains close relationships with both the United States and South Korea, these attacks made the Japanese government realize seriousness of emerging threats in cyberspace. In this session, experts discussed possible defense methods against cyber attacks, which are expected to increase in number in the near future, and necessary policy cooperation and coordination between Japan and the United States. The four panelists presented on the September 8 th, 2010 seminar are Dr. Motohiro Tsuchiya, Associate Professor of Keio University, as the moderator, Mr. David Hoffman, Director of Security Policy and Global Privacy Officer, Intel Corporation, Dr. Lance J. Hoffman, Distinguished Research Professor, The George Washington University, Mr. Tomohiko Yamakawa, Producer of NTT Corporation, Cyber Security Project, with commentator Mr. Greg Nojeim, Senior Counsel and Director of the Project on Freedom, Security and Technology at the Center for Democracy and Technology. Professor Motohiro Tsuchiya, as a moderator, presented his topic Cyber Security in East Asia. He recalled major security threats happening in the past decade in the region. In 1998, North Korea carried its Taepodong Missile test over the Japanese main island into the Pacific Ocean; North Korean Spy Ship violated the Japanese waters, and was followed by Japanese coast guard, and later sunk by the North Koreans saw a Chinese submarine intruding into the Japanese territorial waters. Also in 2004, a Japanese consul in Shanghai committed suicide, after being blackmailed by secret Chinese agent. China also wanted to break the two island chains, from Japan, Taiwan, the Philippines, with Okinawa at the critical point, as China tried to expand into ocean from a continent. In 2009, massive scale of cyber attacks was recorded in the U.S. and South Korea, including the Department of Defense (DOD), the U.S. Congress, the Treasury, the Department of Homeland Page 1 of 9

2 Security (DHS), Federal Trade Commission (FTC), New York Stock Exchange (NYSE), Washington Post, among others. Servers were slowed down during the attacks. These attacks are known as BOTNET Attacks. Although Japanese networks were not attacked, eight Japanese servers were involved in the attacks. Owners of the servers had no idea that their servers were used to attack other computers. It is very hard to find the real attackers. In 2010 cyber attack broke out between South Korea and Japan over the ice skating title dispute when Japanese girl lost the game. South Korean net users attacked Japan, because Japanese young people were upset and commented on BBS about the ice skating judgment, which angered the South Korean net users. This case showed that non-state groups can start attacks online. Who cares about the cyber security in Japan? They are the National Police Agency, Ministry of Defense, Cabinet Intelligence Research Office (CIRO), and National Information Security Center (NISC). Following these incidents, Mr. Hirano, Chief-Secretary of the Cabinet, said, We cannot deny the possibilities that we could be attacked. Cyber security is an important national security and crisis management issue. Thus, the Japanese government strengthens the National Information Security Center (NISC), which was established in 2005, with officials on loan from several ministries, and thus marking the Japanese policy change. The Japanese government issued Information Security Strategy for Protecting the Nation on May 11, 2010, as it realized that the large-scale cyber attack in the United States and South Korea particularly alerted Japan, and could be a threat to national security. According to Professor Tsuchiya, cyber attacks pose the following threats: Physical Damage to Infrastructures, Utilities, and Premises Financial Damage or Theft Psychological Damage or Demonstration Virtual Damage (Not Recognized, but Serious) Most of the times, it is difficult to identify who the real attackers are, following a massive international cyber attacking event. The Keio University professor then talked about geeks, both in Japanese and the United States societies. Despite their cultural differences between countries and governments, geeks should be brought in to protect us. Page 2 of 9

3 Tsuchiya said that geek is a peculiar or otherwise odd person, but our societies are increasingly dependent on computer geeks. He listed some of the most famous geeks, including Apple s CEO Steve Jobs, Microsoft founder Bill Gates, Google s founders Larry Page and Sergey Brin. Professor Motohiro Tsuchiya reminded the audience that technology affects national security, and our society is dependent on computer networks, and called for cooperation between Japan and the US, and the world on this issue. Professor Lance J. Hoffman, from Cyber Security Policy and Research Institute at the George Washington University in Washington D.C. presented his topic Cyber Security in the U.S.. After a brief introduction of threats and attacks in the telecommunication sector in the past century, Professor Hoffman pointed out that communication security has always been an issue, and in today s Internet Age, national security is a big concern, and therefore, for the first time, the United States issued a presidential statement on cyber-security on May 29, 2009 when President Obama said: We count on computer networks to deliver our oil and gas, our power and our water. We rely on them for public transportation and air traffic control. Yet we know that cyber intruders have probed our electrical grid and that in other countries cyber attacks have plunged entire cities into darkness. In short, America's economic prosperity in the 21st century will depend on cybersecurity. Cyber-security is now prominent on the policy radar screen. Professor Hoffman described the Comprehensive National Cybersecurity Initiative, outlining three Major Goals: (1) To establish a front line of defense against today s immediate threats; (2) To defend against the full spectrum of threats; (3) To strengthen the future cybersecurity environment. Despite increasing studies and research, and accelerated legislation on the matter, there are many issues that need more attention and further actions. Professor Hoffman cited material developed by his colleague Prof. Eva Vincze, that stated: 1. Cyberspace is a complex problem for the following reasons: (1) Cyber security is a collective concern that is comprehensive in scope the Internet has no national boundaries. (2) Security is typically regulated at the government level; (3) Cyber security is at once national, international, public and private in character; (4) It touches many domains business, finance, control systems for power, gas, drinking water and other utilities; airport and air traffic control systems, logistical systems, health care, government services, etc. Page 3 of 9

4 2. Technology alone is insufficient because (1) an interdisciplinary discussion with international stakeholders is necessary; (2) human factors must be considered; (3) laws, mores, and practices vary from country to country. It is imperative that countries develop improved lines of communication based on trust to discuss cyber security both within and among themselves. Professor Hoffman particularly discussed cyber crime, noting that according to the FBI estimates, the average loss for a technology-oriented crime is nearly $500,000, and, further, the added cost to the consumer is $100 to $150 per computer sale. Other estimates indicate that losses related to high-tech crimes in the United States are $10 billion to $15 billion per year. Major organized crime groups are known to be operating in over 30 countries spread across 6 continents. He analyzed the increasing cyber crimes citing the volatile combination of: Technically empowered segments of population With the capacity to conduct sophisticated criminal operation Limited economic opportunities to make an honest living Few policies/laws/investigative/prosecutorial focus on cybercrime. The George Washington professor cited that in the U.S. over 500,000 websites were successfully compromised in 2008; malicious intrusions were up 40%; services like Google Earth were reported to be used for several terrorist attacks; and in the developing world, foreign direct investment as a whole may eventually be affected by the safety and integrity of data networks available to investors in host countries. Professor Hoffman called for countries facing the dual challenge in integrating cyber-security, policy and law to maintain an environment that promotes efficiency, innovation, economic prosperity, and free trade, while also promoting safety, security, civil liberties, and privacy rights. Yet, the world community cannot avoid the dilemmas, because discussion has just begun, with difficulty in defining cyberspace is it a unique domain or part of a whole? Obviously, practice is out-distancing policy. Cyberspace developments happen rapidly and policy/law lag a lot behind. Responsibilities for cyber-security are distributed across a wide array of federal departments and agencies, many with overlapping authorities, none with sufficient decision authority to direct Page 4 of 9

5 actions that deal with often conflicting issues in a consistent way. Total 80% of information infrastructure is owned or managed by the private sector. Secrecy is costly, until fairly recently there has been lack of awareness of the gravity of the problem, and thus only recently has there been sufficient pressure on government to change. Transparency involves intangible costs and information sharing. We know there is a problem, and think it will get worse over time. But we don t know if proposed solutions will be effective. He cautioned the audience that new devices may be more easily hacked if security and privacy not sufficiently considered in their design. Professor Hoffman pointed out the dilemma for governments that wish to carry out surveillance of citizens, residents, and everyone, while maintaining privacy, free speech, and freedom and noted that there are no easy options for governments. He noted Internet monitoring in China, with more than 298M users. He also cited the recent Green Dam fiasco, where China originally proposed that all PCs sold in China would be required to install government-proved monitoring software. It s recently backed off to some extent on this, after widespread protests from many, including manufacturers. The George Washington professor also discussed unresolved legal Issues in cybersecurity that have privacy implications, like, when government is permitted to protect privately owned critical infrastructure; the use of automated attack detection and warning sensors; data sharing with third parties within the Federal government, among others. Mr. Tomohiko Yamakawa, Producer of NTT Corporation, Cyber Security Project, Research and Development Planning Department, delivered a speech titled "Industry Side Views of Cyber Security in Japan". He discussed the following ideas: (1) cyber security as a cost; (2) cyber security as a challenge, along with Computer Security Incident Response Team (CSIRT) activity (NTT-CERT) in Japan. He also discussed his observations on identifying "cyber attack", and called for global collaboration in cyber security. Regarding cyber security as a cost, Mr. Yamakawa said it is a cost for most business enterprises to implement governmental regulatory compliance. As a provider of IT Service and Information Systems, NTT provides service for government, critical Infrastructure (Telco, Finance, Electric Power supply, Gas, etc.), and business enterprises. Page 5 of 9

6 NTT is committed to ensure the secrecy of communication, information assurance, and personal DATA protection, as Japanese constitution guarantees it as basic human rights. The NTT cyber expert also see cyber security/threat as a threat or opportunity based on his observations, as the United States, under Obama administration, has initiated a leadership strategy in cyber security issues. As for Japan, he discussed CSIRT, which means Computer Security Incident Response Team, in response to and cope with vulnerabilities such as incident management, incident response, vulnerability management, and gradually, the idea of Cyber Defense emerged to protect customers from cyber attack, as NTT-CERT, as an incident coordination center for NTT group companies. Mr. Yamakawa said it is difficult to define Cyber attack clearly, as it may come in many different forms at the same time, such as Jack s PC is infected, Betty cannot access this website, Taro s website is not accessible, etc. Furthermore the intention of attacker is not clear whether he/she really intended to have unauthorized attack. The NTT expert reminded people of what happened in cyber attacks, or not, over the last few years, as Estonia in 2007, Georgia in 2008, Korea in 2009, and Google case in Therefore, global collaboration in cyber security is an urgent agenda on many aspects. Most executives, both in government and industry, recognize cyber security as most significant for management, and should be ready paying some money for cyber security, though what cyber security issues they may have are not clear yet; or they should invest in firewalls, virus identifier, certification for their own networks. On the operation level, Mr. Yamakawa called for your best doctor for cyber security at your hand to help identify the disease, give best medicine, and give best support, citing CSIRT as an example. Though policy framework of cyber security may differ in each country, there must be a common culture of cyber security in the world, sharing knowhow and expertise. In his speech, Mr. David Hoffman of Intel Corporation presented his talk titled: The Future of Computing which direction would computing evolution go at Intel. Among all computers in office, at home, or at coffee shop, and on a plane, we now see a great diversity, an ongoing evolution that people may have a device in their car, or in the air, with all data and applications to share information, with security and privacy being protected. Page 6 of 9

7 As commercial aviation became global in the 1940s, and since 1977s and 1980s, cost of commercial aviation has come down, and more people rely more on commercial aviation, but threats could distract aviation, like volcano in Iceland recently, which became a global issue. Similarly, people rely more on remote device for their daily life, in terms of managing their data, therefore providing a challenge and opportunities for Intel and others to protect the security in cyberspace. There are four different kinds of things to our attention: malware, hardware, operational system and application wares. David Hoffman said that last year (2009) over 6 million young participants competed at Intel Science and Education Fair competition. Over 6,000 finalists from 59 countries displayed their products in California to compete for the prize money of four million dollars, and so many of them have products all based on the Internet application and global structure. There was a time at Intel when we had design center in California, Europe, and Japan. Now design centers from around globe to collaborate on new products. The components we design, in decentralized environment, as Prof Hoffman mentioned, affect global supply chains, create global strategy, from India to China. Japanese government is in collaboration with the U.S. and EU for a coordinated policy in this regard. Commentator, Greg Nojeim from Center for Technology and Democracy, invited the panelists to address the three following questions. On the question of good geeks and bad geeks, how do we ensure that we have the best good geeks so they can prevent the bad geeks from harming us? The second question is who is the best doctor for cybersecurity the government or the private sector? It seems that there are three key cybersecurity players: the government, the private sector and consumers. Each plays a different role when it comes to healing a cybersecurity problem. What about the role government and consumers play to secure our cyber networks? Also, as we know the Internet has no national boundaries, all domains depend on the Internet. Securing everyone will be expensive. What kinds of costs should we prepare to bear? Hoffman at GW University: I like the idea of bad vs. good geeks. The Federal government is sponsoring scholars to engage in cyber security studies, and the sponsored scholars are to work for Page 7 of 9

8 the government for a number of years after completion of their studies. Industry needs their own people now and would benefit from a similar program. Yamakawa: It is sometimes difficult to tell good geeks from bad geeks in cyber space in Japan. Hoffman at Intel: Investment in cyber security is critical, as international collaboration is required, though some of the scholarships are not open to non-us citizens. Israeli government is doing a great job in this regard by sponsoring and recruiting experts in cyber security. Nojeim: Regarding the secrecy of communication, it is a Constitutional right in Japan, while in the U.S., 4 th Amendment also provides similar protection. But in other countries, like India, governments demand free access communications information from private business. For example, India recently demanded that RIM (Research In Motion) locate a server in India so the government there would be better able to gain access to private communications. How do we reconcile privacy issues and government actions in global context? Yamakawa: Different countries have different practice, while Japan, the U.S. and the EU have laws to protect privacy of communication, but in other countries, like in India, governments tend to try to have surveillance on mobile communication, like BlackBerry. Hoffman at Intel: To answer a question from audience regarding security from abroad into the U.S., it is different for the U.S. government toward U.S. citizen vs. non-us citizen, global context is difficult. Nojeim: The US Foreign Intelligence Surveillance Act permits the U.S. government to eavesdrop more readily on the communications of people who are not U.S. citizens or U.S. green card holders. The criminal law, which also permits some eavesdropping, does not draw a distinction between citizens and non-citizens. An international investor on the floor: I want to ask Mr. Yamakawa on privacy issues. Law enforcement uses GPS. For example, police tracks suspects who use an iphone. How is people s privacy protected? Another question for Intel. As chip creator, what is your responsibility and policies to protect your end users, when law enforcement agencies come in for information about the customers, with or without warrant? Yamakawa: Large corporations are likely to cooperate with law enforcement agencies, or jointly work with them on global issues. Hoffman at Intel: Large corporations, like Intel, depend on trust of customers to use our services, as we have a robust policy to guarantee safety of customer information; sometimes there are situations that we want law enforcement agency to help find out the problems facing us. Page 8 of 9

9 Question: In terms of the Internet cyber security, do you think China s firewall is making the security work easier or harder? Hoffman at GWU: It s tough enough at this moment, but will be harder to get all countries to agree to the same rule when it comes to punishment. This is why we need technical management, public policy experts, etc. He cited the George Washington University cyber security scholarship program where percent of the students are from non-technical studies in these areas (but do not graduate until they get enough technical expertise as well). Page 9 of 9

Cyber Security in the U.S.

Cyber Security in the U.S. Cyber Security in the U.S. Prof. Lance J. Hoffman Cyber Security Policy and Research Institute The George Washington University Washington DC 20052 lanceh@gwu.edu (1) 202 994-4955 Panel on Cyber Security

More information

"Industry Side Views of cyber security in Japan"

Industry Side Views of cyber security in Japan "Industry Side Views of cyber security in Japan" Event 2: Cyber Security in East Asia and Policy Cooperation between Japan and the United States USJI-Week, September 7-10, 2010 US-Japan Research Institute

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

National Cyber Threat Information Sharing. System Strengthening Study

National Cyber Threat Information Sharing. System Strengthening Study Contemporary Engineering Sciences, Vol. 7, 2014, no. 32, 1755-1761 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.411235 National Cyber Threat Information Sharing System Strengthening

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

The Department of Homeland Security The Department of Justice

The Department of Homeland Security The Department of Justice The Department of Homeland Security The Department of Justice to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge Cybercrime Bedrohung, Intervention, Abwehr BKA-Herbsttagung vom 12. - 13. November 2013 Cybersecurity strategic-political aspects of this global challenge Full version Michael Daniel Special Assistant

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

Viewpoint: Implementing Japan s New Cyber Security Strategy*

Viewpoint: Implementing Japan s New Cyber Security Strategy* Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity

More information

the Council of Councils initiative

the Council of Councils initiative Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global

More information

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510 TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated

More information

REMARKS BY US PRESIDENT BARACK OBAMA ON SECURING THE NATION'S CYBER INFRASTRUCTURE

REMARKS BY US PRESIDENT BARACK OBAMA ON SECURING THE NATION'S CYBER INFRASTRUCTURE REMARKS BY US PRESIDENT BARACK OBAMA ON SECURING THE NATION'S CYBER INFRASTRUCTURE 29 May 2009 THE PRESIDENT: Everybody, please be seated. We meet today at a transformational moment -- a moment in history

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

S. 21 IN THE SENATE OF THE UNITED STATES

S. 21 IN THE SENATE OF THE UNITED STATES II 11TH CONGRESS 1ST SESSION S. 1 To secure the United States against cyber attack, to enhance American competitiveness and create jobs in the information technology industry, and to protect the identities

More information

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President

More information

NSA Surveillance, National Security and Privacy

NSA Surveillance, National Security and Privacy NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM

More information

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17

Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17 Japan's Changing Cybersecurity Landscape By: Nir Kshetri Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17 Made available courtesy of Institute

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

I N T E L L I G E N C E A S S E S S M E N T

I N T E L L I G E N C E A S S E S S M E N T I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document

More information

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the

More information

Information Security. CS526 Topic 1

Information Security. CS526 Topic 1 Information Security CS 526 Topic 1 Overview of the Course 1 Today s Security News Today: 220 million records stolen, 16 arrested in massive South Korean data breach A number of online gaming & movie ticket

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act JULY 17, 2014 2013 Venable LLP 1 Agenda 1. Security Risks affecting the Maritime Transportation System (MTS) 2. The

More information

Cybersecurity and United States Policy Issues

Cybersecurity and United States Policy Issues Global Security Studies, Summer 2014, Volume 5, Issue 3 Cybersecurity and United States Policy Issues Cristina Berriz Peace, War and Defense Program University of North Carolina at Chapel Hill Chapel Hill,

More information

Who s Doing the Hacking?

Who s Doing the Hacking? Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

Corporate Perspectives On Cybersecurity: A Survey Of Execs

Corporate Perspectives On Cybersecurity: A Survey Of Execs Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Perspectives On Cybersecurity: A Survey

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Managing the Unpredictable Human Element of Cybersecurity

Managing the Unpredictable Human Element of Cybersecurity CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151

More information

Security Basics: A Whitepaper

Security Basics: A Whitepaper Security Basics: A Whitepaper Todd Feinman, David Goldman, Ricky Wong and Neil Cooper PricewaterhouseCoopers LLP Resource Protection Services Introduction This paper will provide the reader with an overview

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights

More information

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private

More information

How To Protect Yourself From Cyber Crime

How To Protect Yourself From Cyber Crime Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative

More information

Cybersecurity in the Commonwealth: Setting the Stage

Cybersecurity in the Commonwealth: Setting the Stage Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if

More information

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial

More information

CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR

CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR July 28, 2015 The Senate is expected to consider the Cybersecurity Information Sharing Act (CISA, S. 754 1 ) on the Senate floor soon. The bill was marked

More information

Cybersecurity Primer

Cybersecurity Primer Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

Cyber Security Where Do I Begin?

Cyber Security Where Do I Begin? ISPE Automation Forum Cyber Security Where Do I Begin? Don Dickinson Project Engineer Phoenix Contact ..50% more infected Web pages Click in the on one last and three you months won t of notice 2008 than

More information

How To Protect Your Computer From Attack

How To Protect Your Computer From Attack FREQUENTLY ASKED QUESTIONS on C Y B E R S E C U R I T Y By IEEE USA s Committee on Communications Policy December 2011 This Frequently Asked Questions (FAQs) was prepared by IEEE-USA s Committee on Communications

More information

Trends and Tactics in Cyber- Terrorism

Trends and Tactics in Cyber- Terrorism Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Trends Concerning Cyberspace

Trends Concerning Cyberspace Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming

More information

WRITTEN TESTIMONY BEFORE THE HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM

WRITTEN TESTIMONY BEFORE THE HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON COMMERCE, SCIENCE, & TRANSPORTATION HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM TESTIMONY

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 Bruce.Heiman@klgates.com (202) 661-3935 Why share information? Prevention

More information

THE WHITE HOUSE Office of the Press Secretary

THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly

More information

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term

More information

Cyber Security Research and Development: A Homeland Security Perspective

Cyber Security Research and Development: A Homeland Security Perspective Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders

More information

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Driving Company Security is Challenging. Centralized Management Makes it Simple. Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary

More information

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity. Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

GAO s High-Risk Program

GAO s High-Risk Program GAO s High-Risk Program Mountains and Plains Intergovernmental Audit Forum September 1, 2015 William Reinsberg U.S. Government Accountability Office Outline Why was the High-Risk Program needed and what

More information

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan

More information

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS CYBER SECURITY WITHIN THE GLOBALIZATION PROCESS Milan PODHOREC University of Defence, Faculty of Economics and Management, Brno, Czech Republic The contribution focuses on the issue regarding security

More information