UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. April 1st, 2015

Size: px
Start display at page:

Download "UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. April 1st, 2015"

Transcription

1 UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI April 1st, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security Forum Initiative (CSFI) USA to create better cyber situational awareness (Cyber SA) of the nature and scope of threats and hazards to national security worldwide in the domains of cyberspace and open source intelligence. It is provided to Federal, State, Local, Tribal, Territorial and private sector officials to aid in the identification and development of appropriate actions, priorities, and follow-on measures. This product may contain US person information that has been deemed necessary for the intended recipient to understand, assess, or act on the information provided. It should be handled in accordance with the recipient's intelligence oversight and/or information handling procedures. Some content may be copyrighted. These materials, including copyrighted materials, are intended for "fair use" as permitted under Title 17, Section 107 of the United States Code ("The Copyright Law"). Use of copyrighted material for unauthorized purposes requires permission from the copyright owner. Any feedback regarding this report or requests for changes to the distribution list should be directed to the Open Source Enterprise via unclassified at: CSFI and the INSS would like to thank the Cyber Intelligence Analysts who worked on collecting and summarizing this report. 1

2 ISRAEL New cyber regulation for Israeli Central Bank The supervisor of the Israel Central Bank issued new regulations in regards to Cyber Defense Management for banking corporations and credit card companies. The regulations specify that corporations must place effective management on cyberrelated risks against them and enhance their existing information security capabilities in order to better deal with cyber threats. Each corporation is expected to establish a cyber defense program in accordance with the specific nature of their activities and risk profile. The regulations define principles and frameworks to cyber defense, while providing corporations leeway in how to implement the new framework. According to the Cyber Defense Management, banking corporations need to appoint an adequately qualified senior employee to serve as cyber defense manager. These new regulations in cyber are part of the increased preparedness by the Israeli government occurring in cyber threats, as expressed by the establishment of a national authority for cyber defense and the new cyber command within the Israel Defense Force (IDF). Lockheed Martin and Israeli Ministry of Education cooperate in enriching cyber defense programs The American company Lockheed Martin and the Israeli Ministry of Education will cooperate in enriching the cyber defense programs in the Israeli education system. As part of the project, cyber experts from Lockheed Martin and the University of Maryland will be incorporated into the education system in order to enlarge the number of Israeli teachers in the fields of computer science and cyber defense. The project will be supervised by the national cyber headquarter established in the Prime Minister s Office of Israel. Israeli cyber researchers announce new way to hack computers without internet connection Researchers from the cyber security center at Ben-Gurion University found a new system to hack computers with no hardline or internet connection. The new system, named BitWisper works on heat waves created by the computers. Those heat waves are being converted into linear signals, which create a way to communicate without using any special hardware. The BitWisper system can create a bridge between two computers. The created bridge can be used for communication or for planting malware and viruses. It also can establish a bridge for hacking and stealing information from stand-alone computers and closed networks. This feature can be useful for hacking into top-secret closed-networks, such as intelligence agencies and military. A former system for connecting computers was announced in the past; however, it used a special radio transmitter product, while the BitWisper uses no special hardware only with the computer sensors. Anonymous announced OpIsrael as Electronic Holocaust In their latest video, the hackers group Anonymous announced a new operation against Israel OpIsrael. In the video, the Anonymous masked presenter called for an attack on Israel as a response to operation Protective Edge, which occured last summer. Since that operation, Anonymous is devoted to attack and hit Israel s defenses, such as cyber security systems and the Iron Dome system. The attack is planned for April 7th and has been announced by the group to be an Electric Holocaust. 2

3 USA Taiwan seeks to establish strong cyber security connections with the US Taiwan wishes to join a massive cyber security drill known as Cyber Storm as part of seeking ways to create strong cyber connections with the US in order to protect the country from cyber-attacks. Taiwan is being threatened by no country in the world besides China, said Simon Chang, a former director of Asia hardware operations for internet giant Google Inc. in 2013, Taiwan invited the US to participate in a mock cyber drill that it held and wishes now to be invited by the US to participate in the biennial Cyber Storm drill. In East-Asia, Taiwan is the country victimized by cyber-attacks the most, and Chang emphasizes the idea that China s cyber army regularly uses Taiwan as a testing ground for its most advanced attacks. House intel leaders unveil cyber security bill Leaders of the House Intelligence Committee unveiled a bipartisan bill Tuesday that would make it easier for private companies to share cyber- hreat information with the government to thwart attacks by hackers. The bill contains stronger privacy protections than previous legislation, said Chairman Devin Nunes, R-Calif., and Rep. Adam Schiff, D-Calif., who introduced the bill and have scheduled a committee vote for Thursday. We're trying to do everything we can to protect civil liberties while protecting our cyber networks, Nunes said at a press briefing. The Protecting Cyber Networks Act specifically states that it does not authorize the Department of Defense, the National Security Agency, or any other part of the intelligence community to target a person for surveillance. Instead, the bill aims to give government agencies the ability to see how a hack occurred and take action to prevent more attacks. Companies would report cyber threats to civilian agencies rather than to the NSA or the Defense Department. The NSA, which is part of the Defense Department, is viewed with suspicion by privacy advocates because of its mass collection of the phone records of millions of Americans. The bill also makes the federal government liable for violations of privacy and civil liberties and allows citizens who believe their privacy has been violated to seek damages from the government in court. Nunes said the bill could reach the House floor in April. RUSSIA Kaspersky Lab may have relations with Russia's Federal Security Service (FSB) One of the biggest world anti-virus firm, Kaspersky Lab, may go beyond antivirus software, but it is also thought to operate espionage software on behalf of Russian security agencies and have ties to Russia s Federal Security Service (FSB), the successor to the Soviet KGB, according to a report published by Bloomberg. Kaspersky Lab apparently sells security software, including antivirus programs recommended by bigbox stores and other US PC retailers. The Moscow-based company ranks sixth in revenue among security-software suppliers. As Bloomberg reported in February, almost every computer is secured with Kaspersky's software. Kaspersky Lab permanently releases its security updates and reposts on alleged electronic espionage by the US, Israel, and the UK, but it has yet to look at Russia. Eugene Kaspersky, CEO 3

4 of Kaspersky Lab, dismissed these new claims. The Bloomberg report cited six unidentified former and current employees of Russian security agencies working at Kaspersky Labs. ARAB COUNTRIES Iran building cyber threat faster than nuclear threat In the last two years, Iran has invested in building a cyber army capable of taking down global infrastructure. Since President Hassan Rouhani began his term, the cyber security budget grew to almost 20 million dollars. After the American computer worm Stuxnet ruined one-fifth of the country s nuclear ability, Iran shifted its cyber ability. Only 5 months after this attack, Iran trained 1,500 cyber warriors. Cyber security and hacking has become an emerging industry in Iran, which is why many Iranian students are choosing to study computer network defense, exploitation, and warfare in high school and college. During their studies, they are offered internships with notorious Iranian hacker groups, who they then go on to work for after they graduate. ISIS posted information about military personnel 100 military members were notified that the Islamic State (ISIS) posted their names and addresses on the Internet. The group that identified themselves as the Islamic state hacking division encouraged Muslims in the US to kill the military members in their homeland. The Department of Defense released the following statement: The army is coordinating efforts with the Department of Defense as we work to determine the validity of any potential threats. In the meantime, our Criminal Investigative Division is working with the Federal Bureau of Investigation and has provided the information to local units, and, as always, we encourage soldiers to take prudent measures to limit the sharing of personal information online. In the release, ISIS was able to release the military personnel full names, ranks, and personal addresses. CHINA and APAC China reveals its cyberwar cecrets The People s Liberation Army for the first time acknowledged the existence of cyber units capable of launching attacks and not just to protect domestic networks as officials have long maintained. The acknowledgment came in the newest (2013) update to the PLA s The Science of Military Strategy. Beijing has previously denied US accusations of state-sponsored hacking notably last year when the Department of Justice pressed charges against five PLA officials for economic cyberespionage. It appears China dropped the charade. This is the first time we ve seen an explicit acknowledgement of the existence of China s secretive cyber warfare forces from the Chinese side, says Joe McReynolds, who researches the country s network warfare strategy, doctrine, and capabilities at the Center for Intelligence Research and Analysis. It means that the Chinese have discarded their fig leaf of quasi-plausible deniability, McReynolds said. As recently as 2013, official PLA [People s Liberation Army] publications have issued blanket denials such as, The Chinese military has never supported any hacker attack or hacking activities. They cannot make that claim anymore. When asked, the Chinese as recently as a month ago denied they had a cyber command, James Lewis, a senior fellow at the Center for Strategic Studies and a 4

5 leading expert on China s cyber capabilities explained. Lewis said the new revelations will not come as earth-shattering to analysts and experts who closely follow statements by Chinese officials because we all assumed they were lying. McReynolds said China has dedicated cyber units operating in both the military and the civilian sphere. The report, published by the Daily Beast, goes on to state that China has specialized military network warfare forces for carrying out both offensive and defensive cyber operations and its organizations such as Ministry of State Security and the Ministry of Public Security are authorized by the military to carry out network warfare operations. The Chinese Army earlier revealed the existence of a 30 member Blue Army. The Blue Army s main target is self-defense. We won t initiate an attack on anyone, a senior PLA official insisted when news of the unit s existence broke. EUROPE France is changing its electronic surveillance legislation in order to improve counter terrorism The French Prime Minister, Manuel Valls, recently introduced a new legislation aiming to increase its electronic surveillance program. This new legislation would allow the French intelligence services to intercept and analyze any French citizen phone, cell phone conversations, and s. During a press conference Prime Minister Manuel Valls hoped this new legislation would be voted on soon, as it is pending a debate in the country s National Assembly. Furthermore, he declared: Legal means of action but no exceptional measures or widespread surveillance of civilians. The new legislation is countering French nationals encouraging jihad and committing terrorist attacks after the occurrence against the satiric French newspaper Charlie Hebdo in January According to the French authorities, around 1,900 French citizens are affiliated to jihadist networks in France or abroad. Furthermore, the Prime Minister added that 770 of them have already fought or are currently fighting alongside jihadist militants in Iraq, Syria, and other Muslim countries. This new surveillance legislation is actually the culmination of a project started before the rise of the communication technologies. With this new legislation, France will follow the United States and their Patriot Act, which has been modified for the same reasons after 9/11. Today with human intelligence, the electronic surveillance is one of the best methods to track jihadists and extremists. Technologies employed by intelligence services such as phone tracking, signal, and cyber intelligence appear to be the best solutions due to the number of jihadist supporters using smartphones and social networks. UK launching national cyber recruitment program The UK government recently announced the launch of a national cyber recruitment program to find new talent. The program, named Cyber First, is designed to find and train the next generation of cyber experts in order to protect UK cyberspace and critical infrastructures. According to the government, Cyber First is a preliminary sponsorship system designed to identify, recruit, and train those having the right skills for cyber security positions. In order to look for new talent, this program has been based on several initiatives such as the Cyber Security Challenge Schools Program and national mathematics competitions. The Cyber First program will offer scholarships to students who want to study subjects like mathematics, science, engineering, and technology at undergraduate level. The UK government declared this experimental 5

6 program is aiming to recruit 20 new talents who will receive 4,000 of funding each. According to the head of the UK intelligence communication agency GCHQ, Robert Hannigan, Cyber First will help UK protect it assets. The world leading young people we support through Cyber First will help protect the UK from the growing tide of cyberattacks and cybercrime. This new program is a great chance for public and private sectors to recruit new cyber experts, since UK government and businesses have claimed difficulties recruiting cyber security experts in recent years. With this new initiative, UK is without a doubt the most advanced country in Europe in terms or cyber security. In recent years, the United Kingdom invested a substantial budget to develop its cyber defense industry. Despite this, the United Kingdom created several cyber security programs in British universities; organized national cyber-attacks simulations and strengthens their international cooperation. 6

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015 UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI June 15th, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security Forum

More information

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. October 1st, 2014

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. October 1st, 2014 UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI October 1st, 2014 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security

More information

the Council of Councils initiative

the Council of Councils initiative Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global

More information

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. January 1st, 2015

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. January 1st, 2015 UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI January 1st, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security

More information

TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5

TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5 January 2015 TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5 Introduction On January 7, 2015 France endured a three day terror attack. In the aftermath, two separate parties

More information

Cybersecurity. Canisius College

Cybersecurity. Canisius College Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

Research Note Engaging in Cyber Warfare

Research Note Engaging in Cyber Warfare Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines

More information

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education Dr. Clay Wilson, CISSP Program Director, Cybersecurity Studies American Public University System Overview About

More information

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace

More information

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations

More information

VIENNA MODEL UNITED NATIONS CLUB

VIENNA MODEL UNITED NATIONS CLUB VIENNA MODEL UNITED NATIONS CLUB STUDY GUIDE APRIL SESSION 2013 CYBER SECURITYAND CYBER WARFARE 1 INTRODUCTION With anever-increasingnumber of technological improvements and the expansion of online services

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

NATO & Cyber Conflict: Background & Challenges

NATO & Cyber Conflict: Background & Challenges NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented

More information

Trends Concerning Cyberspace

Trends Concerning Cyberspace Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President

More information

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private

More information

Corporate Spying An Overview

Corporate Spying An Overview Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential

More information

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. Cyberterror Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. What are terrorists main uses of cyberspace? How does cyberterror

More information

Securing the Connected World. Cyber@BGU

Securing the Connected World. Cyber@BGU Securing the Connected World Cyber@BGU 1 Being Cyber Safe February 2015 Produced by the Department of Publications and Media Relations, BGU Photos: Dani Machlis I Design: www.image2u.co.il We have become

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

James R. Clapper. Director of National Intelligence

James R. Clapper. Director of National Intelligence Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

Offensive capabilities

Offensive capabilities Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary

IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary Copyright Invictis Information Security Ltd. All rights reserved. Invictis Risk Intelligence Service Report Commercial

More information

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee

More information

STATEMENT OF BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ENTITLED

STATEMENT OF BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ENTITLED STATEMENT OF ROBERT ANDERSON, JR. EXECUTIVE ASSISTANT DIRECTOR CRIMINAL, CYBER, RESPONSE, AND SERVICES BRANCH FEDERAL BUREAU OF INVESTIGATION DEPARTMENT OF JUSTICE BEFORE THE COMMITTEE ON HOMELAND SECURITY

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

AND RESPONSE. Continuity Insights Conference Chicago June 18-19, 2013. Unclassified

AND RESPONSE. Continuity Insights Conference Chicago June 18-19, 2013. Unclassified CYBER THREATS AND RESPONSE Continuity Insights Conference Chicago June 18-19, 2013 Unclassified OBJECTIVES Why it is important Threats, players, and response FBI s Next Generation Cyber Government and

More information

NSA Surveillance, National Security and Privacy

NSA Surveillance, National Security and Privacy NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Cybersecurity and United States Policy Issues

Cybersecurity and United States Policy Issues Global Security Studies, Summer 2014, Volume 5, Issue 3 Cybersecurity and United States Policy Issues Cristina Berriz Peace, War and Defense Program University of North Carolina at Chapel Hill Chapel Hill,

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

China s Economic Espionage

China s Economic Espionage China s Economic Espionage Stealing, Not Destroying Reema Hibrawi This paper seeks to examine the economic espionage threat to the national security of the United States from the Chinese government in

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

White Paper: Cyber Hawk or Digital Dove

White Paper: Cyber Hawk or Digital Dove White Paper: Cyber Hawk or Digital Dove Published By: SkillBridge, LLC September 18, 2013 Today s Modern Warfare With the recent debate over whether or not the United States should take military action

More information

Summary. Russian-Dutch Bilateral Seminar

Summary. Russian-Dutch Bilateral Seminar Summary Russian-Dutch Bilateral Seminar "THE ROLE OF NUCLEAR INDUSTRY IN NUCLEAR SECURITY GOVERNANCE: MOVING TO THE 2014 NUCLEAR SECURITY SUMMIT IN THE HAGUE" On September 3, 2013 PIR Center and the Embassy

More information

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

Surviving the Era of Hack Attacks Cyber Security on a Global Scale Surviving the Era of Hack Attacks Cyber Security on a Global Scale Dr. Adriana Sanford ASU Lincoln Professor of Global Corporate Compliance and Ethics Clinical Associate Professor of Law and Ethics This

More information

United States Cyber Security in the 21st Century

United States Cyber Security in the 21st Century United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015 UTCS CyberSecurity Educating Cyber Professionals Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring Semester, 2015 Slideset 1: 1 From the Headlines U.S. Not Ready for Cyberwar

More information

Information Security. CS526 Topic 1

Information Security. CS526 Topic 1 Information Security CS 526 Topic 1 Overview of the Course 1 Today s Security News Today: 220 million records stolen, 16 arrested in massive South Korean data breach A number of online gaming & movie ticket

More information

Cybersecurity Primer

Cybersecurity Primer Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers

More information

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS

More information

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern

More information

Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17

Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17 Japan's Changing Cybersecurity Landscape By: Nir Kshetri Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17 Made available courtesy of Institute

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

One Hundred Twelfth Congress of the United States of America

One Hundred Twelfth Congress of the United States of America S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

RUSSIA CHINA NEXUS IN CYBER SPACE

RUSSIA CHINA NEXUS IN CYBER SPACE RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest

More information

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic

More information

Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP

Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA, LLP Created as a collaborative effort between government and industry to ensure every American has the resources they need to stay

More information

SPEECH. Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF

SPEECH. Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH BY PERMANENT SECRETARY (DEFENCE) MR CHAN YENG KIT, AT THE CYBER DEFENDERS DISCOVERY CAMP AWARDS CEREMONY

More information

2012 Bit9 Cyber Security Research Report

2012 Bit9 Cyber Security Research Report 2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by

More information

New Battlegrounds: The Future of Cyber Security and Cyber Warfare

New Battlegrounds: The Future of Cyber Security and Cyber Warfare New Battlegrounds: The Future of Cyber Security and Cyber Warfare Information and communications technologies are part of daily life. They are helping to revolutionize health and education, transform the

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 18, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research

More information

A New Obstacle For Cyberinsurance Coverage

A New Obstacle For Cyberinsurance Coverage Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com A New Obstacle For Cyberinsurance Coverage Law360,

More information

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE HOMELAND SECURITY COMMITTEE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE AND SUBCOMITTEE ON

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

Harmful Interference into Satellite Telecommunications by Cyber Attack

Harmful Interference into Satellite Telecommunications by Cyber Attack Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,

More information

ACE European Risk Briefing 2012

ACE European Risk Briefing 2012 #5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs

More information

The threats which were perceivable 20 years ago differ greatly from our ever increasing

The threats which were perceivable 20 years ago differ greatly from our ever increasing 1 Introduction The threats which were perceivable 20 years ago differ greatly from our ever increasing interconnected world of the present. With these new found risks there becomes the need for a different

More information

Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011

Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011 Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011 Notes abstracted from Desmond Ball, China s Cyber Warfare Capabilities, Security Challenges, Vol. 7, No. 2, Winter 2011, pp. 81-103).

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information

Cyber War or Electronic Espionage - Active Defense or Hack Back David Willson Attorney at Law, CISSP Assess & Protect Corporate Information "Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information Iran Georgia France Estonia Attacks on Nations UK Belgium South

More information

cyber Threat Intelligence - A Model for the 21st Century

cyber Threat Intelligence - A Model for the 21st Century HOW DO YOU CREATE A WORLD FINANCIAL COMMUNITY THAT IS RESILIENT IN THE FACE OF CYBER-SECURITY, CYBER-ESPIONAGE, AND HACKING? Biographies of Authors William Abbott Foster, PhD is a Senior Research Associate

More information

Brief on Did GCHQ Spy on You Illegally?

Brief on Did GCHQ Spy on You Illegally? Brief on Did GCHQ Spy on You Illegally? Privacy International on Monday launched a campaign and platform allowing people to ask the UK s surveillance court, the Investigatory Powers Tribunal, if GCHQ spied

More information

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. . SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

More information

Question of Cyber security Maria Paek (President)

Question of Cyber security Maria Paek (President) Question of Cyber security Maria Paek (President) Introduction The words cyber terrorism and cyber security have been floating around media headlines, recently thrust into heavy attention as large-scale

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Kaspersky Lab. Contents

Kaspersky Lab. Contents KASPERSKY DDOS INTELLIGENCE REPORT Q3 2015 Contents Contents... 1 Q3 events... 2 Attacks on financial organizations... 2 Unusual attack scenario... 2 XOR DDoS bot activity... 2 DDoS availability... 3 Statistics

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Presentation by ACRI Attorney Sharon Abraham-Weiss to the ICJ Eminent Jurists Panel on Terrorism, Counter-Terrorism, and Human Rights

Presentation by ACRI Attorney Sharon Abraham-Weiss to the ICJ Eminent Jurists Panel on Terrorism, Counter-Terrorism, and Human Rights August 2007 Presentation by ACRI Attorney Sharon Abraham-Weiss to the ICJ Eminent Jurists Panel on Terrorism, Counter-Terrorism, and Human Rights The Law of Citizenship and Entry into Israel (Temporary

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 11, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 Report Documentation Page Form Approved

More information

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510 TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated

More information

How To Protect Yourself From Cyber Crime

How To Protect Yourself From Cyber Crime Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative

More information

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:

More information

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM IIA South Event 16 th June 2015 Cyber, Social Media and IT Risks 1 st and 2 nd Line Perspective David Canham (BA) Hons, MIRM Agenda This evening we ll cover the following: Who, why and what? Traditional

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

CYBER WARFARE AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF SELECTED NATION STATES INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE

CYBER WARFARE AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF SELECTED NATION STATES INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE CYBER WARFARE AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF SELECTED NATION STATES INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE November 2004 Revised December 2004 Charles Billo Welton

More information

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK.

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK. DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK. A Brief History of IT Security Once upon a time, IT security was simple. Viruses were written to attack any system they came in contact with. As a result,

More information

The Cyber Security Challenge: What Can be Done?

The Cyber Security Challenge: What Can be Done? The Cyber Security Challenge: What Can be Done? Swiss Business Associa=on Singapore Grand HyaB, 22 October 2015 Presenta)on by Daniel Stauffacher President, ICT4Peace Founda=on www.ict4peace.org Cybersecurity

More information

Linkages Between Terrorist and Organized Crime Groups in Nuclear Smuggling

Linkages Between Terrorist and Organized Crime Groups in Nuclear Smuggling Linkages Between Terrorist and Organized Crime Groups in Nuclear Smuggling A Case Study of Chelyabinsk Oblast PONARS Policy Memo No. 392 Robert Orttung and Louise Shelley American University December 2005

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents CRS Reports & Analysis Print Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist (rtehan@crs.loc.gov, 7-6739) View Key CRS Policy Staff May

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

HOLISTIC APPROACHES TO CYBERSECURITY TO ENABLE NETWORK CENTRIC OPERATIONS

HOLISTIC APPROACHES TO CYBERSECURITY TO ENABLE NETWORK CENTRIC OPERATIONS Statement before the House Armed Services Committee, Subcommittee on Terrorism, Unconventional Threats and Capabilities HOLISTIC APPROACHES TO CYBERSECURITY TO ENABLE NETWORK CENTRIC OPERATIONS A Statement

More information

The White House CVE Summit

The White House CVE Summit The White House CVE Summit February 17-20/2015 Washington DC 1. CVE Roundtable with Vice- President Biden + three American cities (17 th feb.) 2. Meeting with Homeland Security & IA (18 th feb.) Presentation:

More information