ICIT - Institute for Critical Infrastructure Technology
|
|
|
- Tabitha Oliver
- 10 years ago
- Views:
Transcription
1 April 16, 2015 The Institute for Critical Infrastructure Technology (ICIT) is a nonprofit (status pending), non-partisan group of the world s most innovative experts and companies that provide technologies and solutions to support and protect our Nation s critical infrastructures. Although the U.S. has faced cyber attacks on its critical infrastructure network since the earliest days of the Internet, the recent high profile attacks on Sony, Anthem Blue Cross-Blue Shield, Target, and others have finally made the American public aware of the cyber threat. Somewhat surprisingly, the United States continues to lack a comprehensive strategy to combat cyber attacks. One of the primary hurdles to the development of such a strategy is the lack of threat-information (TI) sharing between the private sector and government. Given that the majority of US infrastructure is controlled by the private sector, establishing a safe way to share information is crucial. The concept of a TI sharing portal has risen to prominence among lawmakers on Capitol Hill as well as President Obama. As Congress continues to wrestle with myriad complexities stemming from this idea, ICIT believes the following analysis will add value to your efforts. Industry concerns involving information sharing Privacy and legal concerns continue to represent a significant roadblock to robust sharing. For instance, there is concern involving the Freedom of Information Act (FOIA) and the security of the data stored by the TI-sharing forums. The threat of a FOIA request by a public interest group or competitor that would compel a company to reveal or compromise proprietary information acts as a disincentive to open sharing. Any information sharing portals must also take into account the amount of sensitive data being shared with government during the RFP process. Companies will be reticent to engage any process that hinders its ability to successfully compete in the highly competitive RFP system, as well as partner with other companies. Furthermore, industry faces challenges in vetting sources and dedicating sufficient resources to digest and act on shared data. This allocation of financial resources can prove difficult to allocate and account for through corporate accounting techniques. Moreover, many CIOs of publically traded companies will find spending shareholder revenue on compliance 1
2 toward information sharing practices that may be seen in a negative light by the public, to be highly problematic. The format in which companies are asked to report can also be a concern. Companies, as well as government agencies, produce reports in myriad styles and formats. Undoubtedly, there will be problems with standardization of formats, with some reporting companies failing to meet new formatting requirements, either by choice or because of a lack of capability. In contrast, industry partners, in a well-meaning effort to be thorough and/or to avoid liability, might overwhelm government officials with massive data-dumps. Technology infrastructure companies simply do not have the analytic and investigative capabilities of a government-run intelligence agency. Strong liability protection must also be included in any new information-sharing regime. Currently there are multiple initiatives emanating from the House of Representatives. Regardless of whether one of these bills rise to the top or a combination of many efforts proves to win the day, clear language that ensures sharing of cyber information will not be used against a non-federal entity. Is a single government-controlled portal the best solution? A key concern involves relative magnitude. If Congress creates a government-controlled information-sharing portal it should account for the respective budgets and profit margins being pursued by a wide variety of organizations. While large technology organizations can usually absorb new costs associated with mandatory information-sharing requirements, the associated costs can be prohibitive for smaller and medium-sized IT firms. Currently some of our Nation s Information Security and Analysis Centers (ISAC) share information through a program called Soltra Edge, which operates on the machine-readable language Structured Threat Information expression (STIX) and transmitted via the Trusted Automated exchange of Indicator Information (TAXII) protocol for transporting the information. Moreover, the Financial Services Information Security and Analysis Center (FS-ISAC) has a Security Automation Working Group that lead to the creation of Project Avalanche, a collaborative effort between DTCC & FS- 2
3 ISAC to establish Soltra ( The original funding for this cyber threat intelligence-sharing platform came from a consortium of sixteen banks. This is an example of a successful community that s sharing tactical TI today. The types of data shared are different due to (i) communities of interest, (ii) perspective, (iii) legal concerns, (iv) to whom the data is going, and (v) the perspective that it has on international customers. There is a need to have sharing across industries to ensure threat vectors used in one industry are sufficiently addressed in other industries. For example, attacks against the financial sector may appear in the retail & healthcare industry. It remains to be seen how the ISACs will operate under the new ISAO model created by Executive Order (EO) The Department of Homeland Security (DHS) has tapped Mike Echols, JPMO Director, SECIR, CS&C at DHS as the Implementation Manager for EO Assuming he can improve upon their success thus far, DHS would be well served to see how this new model operates before implementing yet another organizational paradigm shifts. In addition, the question of mandatory versus optional use is an extremely important determination that must be clearly defined in original legislative language. There will clearly be companies that will eagerly cooperate and those that will be apprehensive. Industry must know what penalties, hidden or otherwise, will be brought to bear on companies that choose not to participate, and what incentives will be available to those who opt to engage the new project. All parties, be it government or industry, will clearly need assurances that the data shared is protected. There have been countless examples of high-profile breaches in government and military agencies as well as respected corporations. The best way to ensure trust is to engage industry partners from the beginning of the process rather than waiting until a breach-event to engage. Working with industry and all relevant stakeholders to build in security protocols from the beginning will go a long way toward cultivating a spirit of cooperation. Privacy is also a concern for industry as well as many citizens. For instance, the Cybersecurity Information Sharing Act of 2015 (CISA) is also currently being considered on Capitol Hill. We believe this legislation that would increase the government s authority to analyze threat information without the proper balance of privacy concerns for citizens. Many will wonder 3
4 how government authorities will handle the personal information shared. Current legislation being discussed offers multiple distinct approaches toward this matter. ICIT believes the most robust possible privacy protocols are adopted in any new information sharing legislation. However, the Department of Homeland Security, as opposed to the National Security Agency (NSA), should lead any effort toward government controlled information sharing. This is a necessary but not sufficient step toward assuaging privacy fears among US citizens. In addition, the issue how about federal law enforcement will use data collected through information sharing. In the past, we have seen federal agencies use data in ways not envisioned by Congress. We must be sure that if data will be used across multiple federal agencies, this capability must be made clear in legislative language. There needs to also be additional legislative safeguards focused on civil liberties. Cybersecurity legislation should be designed to increase security by identifying and remediating threats, and not stoke fears of a creep toward a surveillance state that could compromise privacy. The Snowden revelations about generations of NSA-led clandestine data gathering on American citizens has understandably made the Nation s citizenry highly wary of the US Government s ability to 1) protect sensitive data, and 2) avoid overreaching and exceeding their mandate. With so much critical infrastructure data in the hands of the private sector, there is a potential tidal wave sensitive data to be handed to the government. It will take a great deal of assurance to assuage the concern among many that the US is moving inexorably toward a surveillance society. *Expert research contributed by the following ICIT Fellows: William J. Billings (ICIT Fellow - Security Strategist, U.S. Public Sector, HP) Stan Wisseman (ICIT Fellow Security Strategist, Strategic Accounts, HP) Cynthia Cullen (ICIT Fellow - Security Strategist, Northeast, HP) Chris Schumacher (ICIT Fellow - Sr. Technology Consultant, New Light Technologies) Danyetta Fleming (ICIT Fellow President & Founder, Covenant Security Solutions) Daniel Skinner (ICIT Fellow Chief Product Officer, Watchdox) Dan Waddell (ICIT Fellow - Director, Government Affairs, (ISC)2) 4
5 James Scott (ICIT Senior Fellow Institute for Critical Infrastructure Technology) Morgan P. Muchnick (Senior Director of Legislative Affairs Institute for Critical Infrastructure Technology) 5
Preservation of longstanding, roles and missions of civilian and intelligence agencies
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter 1. In what ways do private entities currently share with, and receive from, the government cyber threat information?
Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations
Submitted via [email protected] and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA
Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act
In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
FS-ISAC CHARLES BRETZ
FS-ISAC CHARLES BRETZ Information Sharing To be forewarned is to be fore-armed MISSION: Sharing Timely, Relevant, Actionable Cyber and Physical Security Information & Analysis A nonprofit private sector
Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the
Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
ESG Threat Intelligence Research Project
TM Enterprise Strategy Group Getting to the bigger truth. ESG Threat Intelligence Research Project May 2015 Jon Oltsik, Senior Principal Analyst Project Overview 304 completed online surveys with IT professionals
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity
Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance
Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance Agenda CSA History CloudCERT White House Legislative Announcements How is CSA addressing the issue of information sharing?
Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business
S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business
Department of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 [email protected] (202) 661-3935 Why share information? Prevention
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
TITLE HERE Subtitle here. Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA
TITLE HERE Subtitle here Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA The New England goal and opportunity The Goal: The New England region is committed to be a global
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 Eric A. Fischer Senior Specialist in Science and Technology April 20, 2015 Congressional Research Service 7-5700 www.crs.gov
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Submitted via email: [email protected] April 8, 2013 Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Developing a Framework
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,
Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum
Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION
CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION January 27, 2015 A September 2014 Ponemon study found that 60% of U.S. companies have experienced more than one data breach in the past two
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
working group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
Testimony of John W. Carlson on behalf of the. The Financial Services Information Sharing & Analysis Center (FS-ISAC)
Testimony of John W. Carlson on behalf of the The Financial Services Information Sharing & Analysis Center (FS-ISAC) Before the U.S. House of Representatives Committee on Financial Services June 24, 2015
Secure Data Transmission Solutions for the Management and Control of Big Data
Secure Data Transmission Solutions for the Management and Control of Big Data Get the security and governance capabilities you need to solve Big Data challenges with Axway and CA Technologies. EXECUTIVE
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Critical Infrastructure Cybersecurity Framework Overview and Status Executive Order 13636 Improving Critical Infrastructure Cybersecurity Executive Order: Improving Critical Infrastructure Cybersecurity
NH!ISAC"ADVISORY"201.13" NATIONAL"CRITICAL"INFRASTRUCTURE"RESILIENCE"ANALYSIS"REPORT""
National(Health#ISAC#(NH!ISAC) GlobalInstituteforCybersecurity+Research7GlobalSituationalAwarenessCenter NASA SpaceLifeSciencesLaboratory KennedySpaceCenter,FL NH!ISACADVISORY201.13 NATIONALCRITICALINFRASTRUCTURERESILIENCEANALYSISREPORT
Cybersecurity and Insurance Companies
Cybersecurity and Insurance Companies ACLI Forum 500 CEO Leadership Retreat Timothy J. Nagle Vice President & Chief Privacy Counsel Prudential Financial 1 May 13, 2015 What is cybersecurity? Protecting
NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
Re: Big Data Request for Information
March 31, 2014 Attn: Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue NW Washington, D.C. 20502 Ladies and Gentlemen: Re: Big Data Request
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
LEGAL ISSUES IN SHARING CYBER THREAT INTELLIGENCE: WHAT ARE THE REAL CONCERNS?
LEGAL ISSUES IN SHARING CYBER THREAT INTELLIGENCE: WHAT ARE THE REAL CONCERNS? Kim PereK September 9, 2015 2015 Cybersecurity Innova0on Forum Agenda The Cyber Threat Landscape The Legal JusOficaOon for
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
Patriot Act Impact on Canadian Organizations Using Cloud Services
Patriot Act Impact on Canadian Organizations Using Cloud Services November 8, 2013 By Scott Wright The Streetwise Security Coach http://www.securityperspectives.com 1 PRESENTATION TITLE Why do nation-states
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection
More Intelligent, More Effective Cybersecurity Protection January 2013 Business Roundtable (BRT) is an association of chief executive officers of leading U.S. companies with more than $7.3 trillion in
Re: FINRA Regulatory Notice 13-42: FINRA Requests Comments on a Concept Proposal to Develop the Comprehensive Automated Risk Data System
Ms. Marcia E. Asquith Office of the Corporate Secretary FINRA 1735 K Street, NW Washington, DC 20006 Re: FINRA Regulatory Notice 13-42: FINRA Requests Comments on a Concept Proposal to Develop the Comprehensive
NASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
Cyber Information-Sharing Models: An Overview
PARTNERSHIP Cyber Information-Sharing Models: An Overview October 2012. The MITRE Corporation. All rights reserved. Approved for Public Release. Case Number 11-4486. Distribution Unlimited. Table of Contents
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
S. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.
MAJOR FINANCIAL SERVICES LEADER Top 5 Global Bank Selects Resolution1 for Cyber Incident Response. Automation and remote endpoint remediation reduce incident response (IR) times from 10 days to 5 hours.
1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection
U:\REPT\OMNI\FinalOmni\CPRT--HPRT-RU00-SAHR-AMNT.xml 0 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to () require a State to report data under subsection (a); or () require a non-federal
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Strategic Progress Update July 2014 March 2015
Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida
The Third Rail: New Stakeholders Tackle Security Threats and Solutions
SESSION ID: CXO-R03 The Third Rail: New Stakeholders Tackle Security Threats and Solutions Ted Ross Director, Threat Intelligence HP Security Research @tedross Agenda My brief background An example of
Cybersecurity Primer
Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.
Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee
TSA Advanced Imaging Technology
for TSA Advanced Imaging Technology DHS/TSA/PIA-032(d) December 18, 2015 Contact Point Jill Vaughan Assistant Administrator Office of Security Capabilities [email protected] Reviewing Official
The promise and pitfalls of cyber insurance January 2016
www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson [email protected] WASHINGTON, D.C. Satish M. Kini [email protected] Renee
Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)
Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,
