All About Cyber Security: Ken’s TOP 5 Information Pivot Points of Week 42

OX 5 Since October is officially National Cyber Security Month, it is appropriate to dedicate this week’s TOP 5 Informational Pivot Points to Cyber Security. Read the White House report on Cyber Security, the Director of the FBI’s speech given at the International Conference on Cyber Security 2013, review The Cyber Security & Infrastructure Symposium, meet (ISC)2, and finally, still time to register and learn the latest on Executive Order 13636, Improving Critical Infrastructure Cybersecurity at the SGIP conference.

1. Cyber Security: President Obama has declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America’s economic prosperity in the 21st century will depend on cybersecurity.” As a result, the President directed a top-to-bottom review of the Federal Government’s efforts to defend our information and communications infrastructure, which resulted in a report titled the Cyberspace Policy Review. To implement the results of this review, the President has appointed Howard Schmidt to serve at the U.S. Cybersecurity Coordinator and created the Cybersecurity Office within the National Security Staff, which works closely with the Federal Chief Information Officer Steven VanRoekel, the Federal Chief Technology Officer Todd Park, and the National Economic Council.

2. Speech delivered by Robert S. Mueller, III, Director, Federal Bureau of Investigation, at the International Conference on Cyber Security 2013, Fordham University, New York, NY: The People Behind the Keyboards Remarks prepared for delivery. Thank you, Father McShane, and my thanks to Fordham University for once again co-hosting this conference with the FBI. I am honored to share the stage with my good friends Keith Alexander and John Brennan. Keith and John have already covered much of the key terrain in their remarks. But in closing today, I do want to address three points on the future of cyber security. This, from the perspective of the FBI. First—the absolute necessity of focusing on the individuals behind the keyboards. Second—the continued value of traditional law enforcement capabilities in identifying these persons and stopping them. And finally—the crucial role the private sector must play in this fight and how we can improve government and private sector collaboration.

CyberWarInt3. Cyber Security and Infrastructure Protection Symposium Review: Attacks on the U.S. critical infrastructure computer networks, aimed at significantly disrupting or permanently wiping out the functioning of government and business alike, would produce cascading effects far beyond the targeted sector and physical location of the incident. In response, the President directed a comprehensive review of the Federal Government’s efforts to defend US communications and information technology infrastructure, designed to improve our resilience vs. attacks and to reduce the overall cyber threat. As a consequence, US Federal cyber security funding is poised for dynamic growth, with a cumulative value of over $65 billion over the next five years.

ISC24. Headquartered in the United States and with offices in London, Hong Kong, and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)² is the largest not-for-profit membership body of certified information and software security professionals worldwide, with nearly 90,000 members in more than 135 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSP) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP), Certified Authorization Professional (CAP), and Systems Security Certified Practitioner (SSCP) credentials to qualifying candidates. (ISC)²’s certifications are among the first information technology credentials to meet the stringent requirements of ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers education programs and services based on its CBK®, a compendium of information security topics. More information is available at www.isc2.org.

SGIP 5. SGIP Inaugural Conference November 5-7, 2013, at the PGA Hotel in Palm Beach Gardens, FL. Theme: “Progress Through Collaboration,” will bring together global stakeholders from across the energy ecosystem to discuss and share best practices for harmonizing technical standards that critically impact, enhance and accelerate the deployment of a smarter grid. Don’t miss this opportunity to learn about the latest developments and key benefits of interoperable systems and devices in the Smart Grid industry. Cybersecurity: Throughout the past year, cybersecurity has been a highly-discussed topic, especially as it pertains to the electric grid. Learn the latest on Executive Order 13636 and how to manage cybersecurity-related risk while protecting business confidentiality, individual privacy and civil liberties during Improving Critical Infrastructure Cybersecurity.

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on pinterest
Pinterest

2 Responses

Leave a Reply

Your email address will not be published. Required fields are marked *

BE IN THE KNOW

Join 7,255 other subscribers