JOIN THE 2015 CYBERSECURITY CAMPAIGN

Size: px
Start display at page:

Download "JOIN THE 2015 CYBERSECURITY CAMPAIGN"

Transcription

1 JOIN THE 2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow

2 Cybersecurity has emerged as a top priority for the U.S. Chamber. In an interconnected world, economic security and national security are linked. Attacks in cyberspace are being carried out by nation-states, hacktivists, and criminal organizations. Bad actors can compromise public safety, classified information, intellectual property, sensitive personal data, and business networks, putting America s security at risk. This year, cybercrime topped the intelligence community s global threat assessment, and former FBI Director Robert Mueller declared that cyberattacks will eventually pose as great a threat to our national security as al-qaeda and could even surpass it. The Chamber has been leading on cybersecurity for years. In 2014, it launched a new comprehensive campaign under the banner Improving Today. Protecting Tomorrow to advance cybersecurity policies and legislation while educating businesses of all sizes about cyber threats and how to protect against them. For a second year in a row, the Chamber is continuing the cybersecurity campaign with four regional roundtables planned in advance of its Fourth Annual Cybersecurity Summit on October 6. The Chamber s work would not be possible without your support. Please review the information in this brochure to learn about the campaign and sponsorship opportunities. For more information, please contact me (abeauchsene@uschamber.com, ); Matthew Eggers (meggers@uschamber.com, ); or Vincent Voci (vvoci@uschamber.com, ). Sincerely, Ann Beauchesne Senior Vice President National Security and Emergency Preparedness Department U.S. Chamber of Commerce 2

3 U.S. Chamber s National Security & Emergency Preparedness Department Established in 2003 to develop and implement the Chamber s homeland and national security policies. The department works through the National Security Task Force, a policy committee composed of roughly 200 Chamber members representing a broad spectrum of the nation s economy. The task force s Cybersecurity Working Group identifies current and emerging issues, crafts policies and positions, and provides analysis and direct advocacy to government and business leaders. The need to address increasingly sophisticated threats against American and global businesses has gone from an IT issue to a top priority for the C-suite and the boardroom. In an interconnected world, economic security and national security are linked. To maintain a strong and resilient economy, we must protect against the threat of cyberattacks. - Chamber President and CEO Thomas J. Donohue Many cybersecurity experts say that there are two types of businesses those that have been hacked and know it, and those that have been hacked and don t know it yet. As large businesses strengthen their cyber protections, small and medium-size ones are increasingly the victims of malicious actors. However, many hurdles stand in the way of meaningful change: Congressional gridlock. Appropriate roles of government entities in private-public partnerships. Lack of information sharing regarding threats between government and industry. Cyberattacks against U.S. businesses owing to a lack of credible deterrence. Misalignment of international cyber regimes. Demand for cybersecurity personnel outstripping supply. 3

4 Background: Cybersecurity framework is an important riskmanagement tool The White House released on February 12, 2014, the first version of the Framework for Improving Critical Infrastructure Cybersecurity (the framework). It was capably developed over the past 12 months by the U.S. Department of Commerce s National Institute of Standards and Technology (NIST) in close collaboration with the U.S. Chamber s National Security Task Force/Cybersecurity Working Group and other private sector organizations. NIST officials led a public-private effort coordinating an environment where standards and security specialists identify existing cybersecurity best practices and guidance throughout industry sectors and promote their implementation. The Chamber has valued NIST s involvement with the framework. NIST has treated the business community as a genuine partner and tackled a tough assignment in ways that should serve as a model for other agencies and departments. What the framework does The framework is largely a process it s designed to help organizations start a cybersecurity program or improve an existing one. The framework features a number of industry-vetted actions that businesses can take to assess and strengthen their state of security over time. It is not meant to be regulatory, which would be troublesome to industry. Additionally, the framework provides organizations including their customers, partners, and suppliers with common language for the following: Understanding their current cybersecurity posture. Setting goals for cybersecurity improvements. Monitoring progress toward their goals. Fostering communications with their internal and external stakeholders. There s a rough consensus among cybersecurity experts that a high percentage of unsophisticated or untargeted malicious activity can be stopped by implementing elements of the framework. Using the framework is tantamount to improving one s cyber fitness. There are built-in assumptions that an organization s cyber capabilities will degrade if it becomes passive, and that continual improvement is necessary for a business to keep pace with threats. 4

5 The framework is a good start, but more work ahead No single strategy can prevent advanced and persistent threats, known as APTs in cybersecurity jargon, from breaching an organization s cyber defenses. APTs typically refer to cyberattacks originating from foreign powers or their surrogates. The framework is a good start, but more work is needed. Most small and midsize businesses, after all, don t have the money or human talent required to take on highly sophisticated and nefarious actors, such as organized criminal gangs and groups carrying out state-sponsored attacks. The following are some key activities: Increasing awareness and use of the framework and growing market solutions: The Chamber is planning more cyber roundtables. In 2014, the Chamber organized four roundtable events with state and local chambers across the country prior to the Chamber s Third Annual Cybersecurity Summit on October 28. Leading member sponsors of the cybersecurity campaign were American Express, Dell, and Splunk. Additional roundtable and summit sponsors were the American Gas Association, Boeing, Edison Electric Institute, Exelon, HID Global, Microsoft, Oracle, Pepco Holdings, Inc., and The Wall Street Journal. The Chamber will continue involving NIST, the Department of Homeland Security (DHS), and law enforcement to help early users of the framework and to grow market solutions for curbing cyber threats. Passing information-sharing legislation: Passing information-sharing legislation is the Chamber s No. 1 cyber legislative priority. The framework will be incomplete without the enactment of information-sharing legislation that removes legal and regulatory penalties to quickly exchange data about evolving threats to industry. Engaging law enforcement: The Chamber is in close contact with the FBI and the Secret Service, which are often the first entities to learn of criminals access to company networks. The Chamber engages law enforcement to build trusted public-private relationships, which are essential to confirming a crime and beginning a criminal investigation. FBI and Secret Service officials participated in each of the Chamber s 2014 roundtables. Monitoring independent agencies: The independent agencies ranging from the Federal Communications Commission (FCC) to the Securities and Exchange Commission (SEC) can use the framework to regulate the business community. For example, some policymakers are pushing the SEC to compel businesses to report incidents with increasing specificity, which many in industry find troubling. 5

6 Modernizing cybersecurity regulations: Information-security requirements should not be cumulative. The Chamber believes it is valuable that agencies and departments are urged under the 2013 cybersecurity presidential order to report to the Office of Management and Budget (OMB) any critical infrastructure subject to ineffective, conflicting, or excessively burdensome cybersecurity requirements. Aligning international cybersecurity regimes: Many Chamber members operate globally. We anticipate working with NIST and the Chamber s International Division (Center for Global Regulatory Cooperation) to urge foreign governments to embrace the framework. Efforts to improve the cybersecurity of the public and private sectors should reflect the borderless and interconnected nature of our digital environment. Raising adversaries costs through deterrence: The Chamber is reviewing actions that can be taken by businesses to deter nefarious actors that threaten to empty bank accounts, steal trade secrets, or damage vital infrastructures. The United States needs to thoughtfully shift the costs associated with advanced cyberattacks in ways that are timely, legal, and proportionate relative to the threats. 6

7 2014 Cybersecurity Campaign Summary The Chamber s new cybersecurity campaign Improving Today. Protecting Tomorrow had a very good first year attracting nearly 1,000 government and industry attendees at six events: four regional roundtables, a cyber panel at Americas Small Business Summit, and the Chambers Third Annual Cybersecurity Summit. These events generated significant media coverage. Core strengths of the campaign include promoting members desire to be branded with a positive cyber effort, as well as advancing their commercial cybersecurity solutions to industry and government. The campaign complements the Chamber s efforts to affect meaningful change in policy. In just a few years, the Chamber has become an influential voice on cyber policy and politics. The campaigns 2015 message urges businesses of all sizes to have a cybersecurity risk management plan and update it regularly. Regional Roundtable Events: The Chamber hosted four half-day regional roundtable events in Austin, Chicago, Everett, and Phoenix. Roundtables featured more than 45 government and industry speakers, cybersecurity principals from the White House, DHS, NIST, and local FBI and Secret Service officials. The Chamber and its partners urged businesses to adopt fundamental Internet security practices to reduce network and system weaknesses and make the price of successful hacking increasingly steep. Third Annual Cybersecurity Summit: Washington, D.C. 27 speakers including 9 government speakers One-day event featuring two keynote sessions by White House Cybersecurity Coordinator Michael Daniel and Admiral Michael Rogers, Commander, U.S. Cyber Command and three panel discussions including a Q&A session with Sens. Diane Feinstein (D-CA) and Saxby Chambliss (R-GA). 7

8 Media Coverage: Thirty print publications and television affiliates covered the Chamber s 2014 Cybersecurity Campaign. The 2014 Cybersecurity Summit generated the most media coverage in its history. In a keynote speech at the U.S. Chamber of Commerce s third annual Cybersecurity Summit, White House Cybersecurity Coordinator Michael Daniel discussed the myriad of technological, economic, political and psychological challenges that have made cybersecurity such a hard problem. He pointed to a number of initiatives that the White House has launched in recent years to help address security risks posed to data held by both public- and private-sector entities, including the National Strategy for Trusted Identities in Cyberspace. Allison Grande. White House Wants To 'Kill' Online Passwords, Adviser Says. Law360. October 28, At an Austin cybersecurity conference Thursday, experts cited the Target example as they encouraged Austin businesses large and small to use newly issued guidelines to protect themselves and their customers. Laylan Copelin. Experts: Businesses can't ignore cyber threats. Austin American Statesman. July 10, At Tuesday's event, [Admiral Mike] Rogers said Defense Department officials are continuing to work to update military rules of engagement in cyberspace. Too many foreign nations and individuals apparently think that attacking U.S. networks is a low-risk proposition, Rogers said. That is not in our best interests in the long term as a nation for others to have that perception, Rogers said. We need to change that. Brendan Sasso. NSA Chief Warns Companies Against Revenge Hackings. National Journal. October 28, Almost all Fortune 500 companies have been hacked at some point, Mr. [John] Carlin told the U.S. Chamber of Commerce s annual Cybersecurity Summit. Have you thought ahead to the day when you will have to face your customers, your employees, your board, and your shareholders? he said. If that day was today, could you tell them that you ve done everything in your power to protect your company s future? Phillip Swarts. In cybersecurity battle, government-business cooperation necessary: Justice Official. The Washington Times. October 28,

9 2014 CYBERSECURITY CAMPAIGN SPONSORS SILVER GOLD SILVER 9

10 Sponsorship Options The Chamber s National Security & Emergency Preparedness Department must raise funds to carry out the cybersecurity campaign. Four roundtables, an international event, and the summit are being planned. The Chamber offers organizations several sponsorship opportunities. Value Proposition 10

11 I. Platinum ($100K) Incentive: At this level, only one company may represent a single sector (e.g., communications, energy, financial services, or IT). Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of four regional events in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 11

12 II. Enterprise Partnership Two Large Companies Sponsor Jointly ($150K) Incentive: By jointly sponsoring the campaign, each company pays $75K instead of $100K. Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Four complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of two regional events in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Four complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 12

13 III. Gold ($75K) This is an ideal level for a large company that wants to raise its cybersecurity profile. Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Four complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of two regional events in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Four complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 13

14 IV. Silver ($50K) The Silver-level was popular in This level is perfect for a midsize business that wants to brand itself with a positive effort or market its cybersecurity solutions. Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Two complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of one regional event in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Two complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 14

15 V. Cyber Mentorship One Large Company Plus One Small or Midsize Business ($40K) Incentive: Mentor a business in your supply chain and save $10K. Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Two complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of one regional event in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Two complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 15

16 VI. Association Sponsorship ($20K) Incentive: Association pays $20K total for the four roundtables and the summit. What s not to like! Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of four regional events in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 16

17 VII. Association Partnership Two Associations Sponsor Jointly ($30K) Incentive: Each association pays $15K total for the four roundtables and the summit, instead of $20K. Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of four regional events in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list post event *** U.S. Chamber Contacts Ann Beauchesne (abeauchesne@uschamber.com), Senior Vice President Matthew Eggers (meggers@uschamber.com), Senior Director Vincent Voci (vvoci@uschamber.com), Policy Manager Call

2015 CYBERSECURITY CAMPAIGN. Improving Today. Protecting Tomorrow. Page 1

2015 CYBERSECURITY CAMPAIGN. Improving Today. Protecting Tomorrow. Page 1 2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow Page 1 2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow JOIN THE CYBERSECURITY EDUCATION AND FRAMEWORK AWARENESS CAMPAIGN

More information

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow 2015 Cybersecurity Campaign Improving Today, Protecting Tomorrow THE STATE OF U.S. CYBERSECURITY: OUR NATION S ECONOMIC AND NATIONAL SECURITY ARE AT SIGNIFICANT RISK Hackers have breached the computer

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

Corporate Perspectives On Cybersecurity: A Survey Of Execs

Corporate Perspectives On Cybersecurity: A Survey Of Execs Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Perspectives On Cybersecurity: A Survey

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses

More information

The Dow Chemical Company. statement for the record. David E. Kepler. before

The Dow Chemical Company. statement for the record. David E. Kepler. before The Dow Chemical Company statement for the record of David E. Kepler Chief Sustainability Officer, Chief Information Officer, Business Services and Executive Vice President before The Senate Committee

More information

Cyber Security and the White House

Cyber Security and the White House West Texas Cyber Security Consortium GOVERNMENT IT REPORT White House Tilts Toward Public-Private Cybersecurity Cooperation By John K. Higgins E-Commerce Times Part of the ECT News Network 06/23/14 5:00

More information

Written Testimony of. Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the

Written Testimony of. Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Subcommittee on Research and Technology Committee on Science, Space, and Technology U.S.

More information

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP 2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf

More information

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14 www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

CYBERSECURITY RISK MANAGEMENT

CYBERSECURITY RISK MANAGEMENT CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS

More information

THE WHITE HOUSE Office of the Press Secretary

THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly

More information

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce

Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House

More information

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 It s a pleasure to be with you back home in Boston. I was here just six weeks ago

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

Statement of Edward Amoroso, Ph.D. Senior Vice President & Chief Security Officer AT&T. United States House of Representatives

Statement of Edward Amoroso, Ph.D. Senior Vice President & Chief Security Officer AT&T. United States House of Representatives Statement of Edward Amoroso, Ph.D. Senior Vice President & Chief Security Officer AT&T Hearing: DHS s Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure United States House

More information

Cybersecurity y Managing g the Risks

Cybersecurity y Managing g the Risks Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure. MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message

More information

September 24, 2015. Mr. Hogan and Ms. Newton:

September 24, 2015. Mr. Hogan and Ms. Newton: Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930

More information

Managing cyber risks with insurance

Managing cyber risks with insurance www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive

More information

Developing a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION. Cristin Flynn Goodwin J.

Developing a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION. Cristin Flynn Goodwin J. Developing a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION Cristin Flynn Goodwin J. Paul Nicholas October 2013 Contents Executive Summary... 3 What Is a National

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers

More information

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson jfeigelson@debevoise.com WASHINGTON, D.C. Satish M. Kini smkini@debevoise.com Renee

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents CRS Reports & Analysis Print Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist (rtehan@crs.loc.gov, 7-6739) View Key CRS Policy Staff May

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

PACB One-Day Cybersecurity Workshop

PACB One-Day Cybersecurity Workshop PACB One-Day Cybersecurity Workshop WHAT IS CYBERSECURITY? PRESENTED BY: JON WALDMAN, SBS CISA, CRISC 1 Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies

More information

Answering your cybersecurity questions The need for continued action

Answering your cybersecurity questions The need for continued action www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:

More information

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks July 2014 Cyber Threat Intelligence and Incident Coordination Center: Protecting

More information

(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392)

(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392) (HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392) VISIT: WWW.TTCUS.COM (HTTP://WWW.TTCUS.COM /? HSTC=40060925.4FE4E58F02ECBE9D993453E16A8EB373.1374161815407.1374161815407.1374161815407.1&

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Surviving the Ever Changing Threat Landscape

Surviving the Ever Changing Threat Landscape Surviving the Ever Changing Threat Landscape Kevin Jordan Cyber Security Specialist Dell GLBA FFIEC NCUA PCI HIPAA NERC CIP FISMA 700+ Percentage of U.S. adults who Federal named online and banking state

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber

More information

Corporate Spying An Overview

Corporate Spying An Overview Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool

ICBA Summary of FFIEC Cybersecurity Assessment Tool ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy Jeremy.Dalpiaz@icba.org www.icba.org ICBA Summary

More information

Implementation of the Cybersecurity Executive Order

Implementation of the Cybersecurity Executive Order Implementation of the Cybersecurity Executive Order November 13 th, 2013 Ben Beeson, Partner, Lockton Companies Gerald J. Ferguson, Partner, BakerHostetler Mark Weatherford, Principal, The Chertoff Group

More information

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern

More information

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and

More information

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual

More information

State Governments at Risk: The Data Breach Reality

State Governments at Risk: The Data Breach Reality State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO

More information

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the retail sector of the Fortune 1000.

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Detection, analysis, and understanding of threat

More information

INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE

INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE promontory.com INFOCUS JUNE 3, 2015 BY EARL CRANE Five Questions to Guide Cybersecurity Risk Management The quick transformation of cybersecurity risk management from obscure specialty to top-of-thehouse

More information

No. 33 February 19, 2013. The President

No. 33 February 19, 2013. The President Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001

More information

10Minutes. on the stark realities of cybersecurity. The Cyber Savvy CEO. A changed business environment demands a new approach:

10Minutes. on the stark realities of cybersecurity. The Cyber Savvy CEO. A changed business environment demands a new approach: 10Minutes on the stark realities of cybersecurity The Cyber Savvy CEO Highlights Business leaders must recognise the exposure and business impact that comes from operating within an interconnected global

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

How To Protect Your Business From A Cyber Attack

How To Protect Your Business From A Cyber Attack Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It

More information

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 July 10, 2013 Ministry of Information and Communications 18 Nguyen Du Hanoi, Vietnam RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 Dear Sir/Madam: The Information Technology

More information

PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection

PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection More Intelligent, More Effective Cybersecurity Protection January 2013 Business Roundtable (BRT) is an association of chief executive officers of leading U.S. companies with more than $7.3 trillion in

More information

Are your people playing an effective role in your cyber resilience?

Are your people playing an effective role in your cyber resilience? Are your people playing an effective role in your cyber resilience? 01 Cyber attacks are now business as usual for organizations around the world. Organizations have typically trusted in technology to

More information

www.pwc.com Cybersecurity and Privacy Hot Topics 2015

www.pwc.com Cybersecurity and Privacy Hot Topics 2015 www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets

More information

PROMOTION // TECHNOLOGY. The Economics Of Cyber Security

PROMOTION // TECHNOLOGY. The Economics Of Cyber Security PROMOTION // TECHNOLOGY The Economics Of Cyber Security Written by Peter Mills Malicious cyber activity, from hacking and identity fraud to intellectual property theft, is a growing problem within the

More information

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats; GermanoLawLLC provides client- focused counsel and assistance regarding cybersecurity and data privacy concerns. We help companies understand, prepare for and address internal and external cybersecurity

More information

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP

More information

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc. Before the U.S. House of Representatives Committee on Science, Space, and Technology

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! Cybersecurity is all over the news. Target, University of Maryland, Neiman

More information

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman

More information

Gaining the upper hand in today s cyber security battle

Gaining the upper hand in today s cyber security battle IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper

More information

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before a Meeting of CES Government Washington, DC April 16, 2014 Good afternoon. It s a pleasure to finally be here with you. I had very much hoped

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential

More information

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing: Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony

More information

Examining the Evolving Cyber Insurance Marketplace

Examining the Evolving Cyber Insurance Marketplace Prepared Testimony and Statement for the Record of Ola Sage Founder and CEO e-management Hearing on Examining the Evolving Cyber Insurance Marketplace Before the Senate Committee on Commerce, Science,

More information

Delving Into FCC's 'Damn Important' Cybersecurity Report

Delving Into FCC's 'Damn Important' Cybersecurity Report Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Delving Into FCC's 'Damn Important' Cybersecurity

More information

20+ At risk and unready in an interconnected world

20+ At risk and unready in an interconnected world At risk and unready in an interconnected world Key findings from The Global State of Information Security Survey 2015 Cyber attacks against power and utilities organizations have transitioned from theoretical

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

AND RESPONSE. Continuity Insights Conference Chicago June 18-19, 2013. Unclassified

AND RESPONSE. Continuity Insights Conference Chicago June 18-19, 2013. Unclassified CYBER THREATS AND RESPONSE Continuity Insights Conference Chicago June 18-19, 2013 Unclassified OBJECTIVES Why it is important Threats, players, and response FBI s Next Generation Cyber Government and

More information

State Engagement with the Energy Sector to Improve Cyber Security

State Engagement with the Energy Sector to Improve Cyber Security Contact: Allison Cullin Homeland Security and Technology Division 202/624-5311 April 20, 2010 State Engagement with the Energy Sector to Improve Cyber Security Executive Summary The state-owned computer

More information

Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 ) ) ) ) )

Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 ) ) ) ) ) Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 In the Matter of Stakeholder Engagement on Cybersecurity in the Digital Ecosystem Docket

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist (rtehan@crs.loc.gov, 7-6739) April 17, (R43317) Summary Cybersecurity vulnerabilities challenge

More information

Cyber-Security. FAS Annual Conference September 12, 2014

Cyber-Security. FAS Annual Conference September 12, 2014 Cyber-Security FAS Annual Conference September 12, 2014 Maysar Al-Samadi Vice President, Professional Standards IIROC Cyber-Security IIROC Rule 17.16 BCP The regulatory landscape Canadian Government policy

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

S. 21 IN THE SENATE OF THE UNITED STATES

S. 21 IN THE SENATE OF THE UNITED STATES II 11TH CONGRESS 1ST SESSION S. 1 To secure the United States against cyber attack, to enhance American competitiveness and create jobs in the information technology industry, and to protect the identities

More information

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information