View allAll Photos Tagged Cybersecurity
Doreen Bogdan-Martin, Secretary-General, International Telecommunication Union (ITU), Geneva
Sadie Creese, Professor of Cybersecurity, University of Oxford, United Kingdom
Chuck Robbins, Chair and Chief Executive Officer, Cisco, USA
Brad Smith, Vice-Chair and President, Microsoft, USA
Jeremy Jurgens, Managing Director, World Economic Forum
Karen Tso, Co-Anchor and Journalist, CNBC International (Europe), United Kingdom, speaking in the Protecting Cyberspace amid Exponential Change at the World Economic Forum Annual Meeting 2023 in Davos-Klosters, Switzerland, 17 January. Aspen 4. Copyright: World Economic Forum/Walter Duerst
Raj Verma, Chief Executive Officer, SingleStore, USA speaking in the Start-Ups in Austerity session at the World Economic Forum Annual Meeting 2023 in Davos-Klosters, Switzerland, 20 January. Congress Centre - Aspen 2 Room. Copyright: World Economic Forum/Sikarin Fon Thanachaiary
The lure of the Smart Grid appears irresistible. If Smart Grids can realize their full potential then consumers, utilities, nations, and even the earth itself will benefit. Unfortunately, as with nearly any new technology, the focus has been on getting Smart Grids up and running, often with little consideration for Cyber Security.
LTC Scott Applegate, G33 Current Operations Chief, Defensive Cyberspace Operations, United States Army Cyber Command
CISPA, the Privacy-Invading Cybersecurity Spying Bill, is Back in Congress
February 13, 2013 | By Mark M. Jaycox. Electronic Frontier Foundation.
It's official: The Cyber Intelligence Sharing and Protection Act was reintroduced in the House of Representatives yesterday. CISPA is the contentious bill civil liberties advocates fought last year, which would provide a poorly-defined "cybersecurity" exception to existing privacy law. CISPA offers broad immunities to companies who choose to share data with government agencies (including the private communications of users) in the name of cybersecurity. It also creates avenues for companies to share data with any federal agencies, including military intelligence agencies like the National Security Agency (NSA).
EFF is adamantly opposed to CISPA. Will you join us in calling on Congress to stop this and any other privacy-invasive cybersecurity legislation?
As others have noted, “CISPA is deeply flawed. Under a broad cybersecurity umbrella, it permits companies to share user communications directly with the super secret NSA and permits the NSA to use that information for non-cybersecurity reasons. This risks turning the cybersecurity program into a back door intelligence surveillance program run by a military entity with little transparency or public accountability.”
Last year, CISPA passed the House with a few handful of amendments that tried to fix some of its vague language. But the amendments didn't address many of the significant civil liberties concerns. Those remaining problems were reintroduced in today's version of CISPA. Here's a brief overview of the issues:
Companies have new rights to monitor user actions and share data—including potentially sensitive user data—with the government without a warrant.
First, CISPA would still give businesses1 the power to use "cybersecurity systems" to obtain any "cybersecurity threat information" (CTI)—which could include personal communications—about a percieved threat to their networks or systems. The only limitation is that the company must act for a "cybersecurity purpose," which is vaguely defined to include such things as "safeguarding" networks.
CISPA overrides existing privacy law, and grants broad immunities to participating companies.
At the same time, CISPA would also create a broad immunity from legal liability for monitoring, acquiring, or sharing CTI, so long as the entity acted “in good faith.” Our concern from day one has been that these combined power and immunity provisions would override existing privacy laws like the Wiretap Act and the Stored Communications Act.
Worse, the law provides immunity “for decisions made based on” CTI. A rogue or misguided company could easily make bad "decisions" that would do a lot more harm than good, and should not be immunized.
CISPA also raises major transparency and accountability issues.
Information provided to the federal government under CISPA would be exempt from the Freedom of Information Act (FOIA) and other state laws that could otherwise require disclosure (unless some law other than CISPA already requires its provision to the government).
Users probably won't know if their private data is compromised under CISPA, and will have little recourse.
CISPA's authors argue that the bill contains limitations on how the federal government can use and disclose information by permitting lawsuits against the government. But if a company sends information about a user that is not cyberthreat information, the government agency does not notify the user, only the company.
CISPA is a dangerous bill
These are just a couple of reasons of why CISPA is a dangerous bill and why President Obama threatened to veto the bill last year. CISPA essentially equates greater cybersecurity with greater surveillance and information sharing. But many of our cybersecurity problems arise from software vulnerabilities and human failings, issues CISPA fails to address. For instance, the recent series of hacks suffered by New York Times were suspected to be from spearphishing and victims downloading malicious software masked as email attachments—the types of issues that CISPA doesn't deal with.
We were heartened to hear that President Obama's new Executive Order on cybersecurity will encourage government agencies to more readily share cybersecurity information with companies, and may even reduce unnecessary secrecy around cybersecurity information. Let's use the momentum from the Executive Order to turn a new leaf in the cybersecurity debate, beginning a broader public dialogue about cybersecurity that doesn’t assume that surveillance is the right solution.
Please join EFF in opposing CISPA by contacting Congress today.
29 May 2018 - OECD Forum 2018 – Cybersecurity
Cyrille Lachèvre, Macroeconomics Reporter, L’Opinion, France
Renata Avila, Senior Digital Rights Advisor, World Wide Web Foundation
Shane Curran, Founder, Muon
Casper Klynge, Tech Ambassador, Denmark
David Martinon, Ambassador for Cyberdiplomacy and the Digital Economy, France
Tarah Wheeler, Principal Security Advisor and Cybersecurity Policy Fellow, New America, United States
Photo: OECD/Mariano Bordon
Sacred Heart University's School of Computing hosted the first lecture in the new Cybersecurity Colloquia Series, featuring Irfan Ahmed from the University of New Orleans who presented his talk, âModern Critical Infrastructure at the Risk of Cyberattacksâ on October 12, 2017, at the Ryan Matura Libraryâs Cyber Lab. Photo by Mark F. Conrad
The Cybersecurity Colloquia Series presented “Can Blockchain Put an End to Identity Theft?” on October 25, 2018, at Sacred Heart University’s West Campus. The guest speaker was Eli Yaacoby, co-founder and CTO of Wymsical, LLC. Photo by Tracy Deer-Mirek 10/25/18
Staying proactive with your security goals can start right now through penetration testing. It’s a service that is typically performed remotely, so why not use this time to engage in pen testing? The right pen test will support your other compliance efforts, but also validate the security measures put in place for WFH environments so that you don’t fall victim to avoidable breaches. Using this time to invest in pen testing will not only benefit your security posture now, but will also help you achieve security goals in the future. Our team of expert penetration testers is ready to serve your organization. Let’s start planning your pen test today!
Learn more at: kirkpatrickprice.com/remote-services/penetration-testing/
www.stvincent.edu | Saint Vincent College invited local high-school students to attend cybersecurity day, a seminar for students who are interested in the field of study.
Sophia is a cybersecurity software tool that helps protect energy sector networks and control systems. INL developed it as an easy, elegant way to help network operators detect intruders and other anomalies. Developers demonstrate its capabilities in the Computer-Assisted Virtual Environment (CAVE) within the Center for Advanced Energy Studies at INL.
Alex Halderman, Professor of Electrical Engineering and Computer Science, greets Jocelyn Benson, Secretary of State for the State of Michigan, at MichiganÕs new Election Security Commission inaugural meeting in the Bob and Betty Beyster Building on North Campus of the University of Michigan in Ann Arbor, MI on April 16, 2019.
Photo: Joseph Xu/Michigan Engineering, Communications & Marketing