Beruflich Dokumente
Kultur Dokumente
Gen. Charlie Croom (Ret.) VP Cyber Security, Lockheed Martin Jeff Brown, CISO/Director IT Infrastructure, Raytheon Eric Guerrino, SVP/CIO, Bank of New York/Mellon Financial Lawrence Dobranski, Chief Strategic Security, Nortel Pradeep Khosla, Dean, Carnegie Mellon University School of Computer Sciences Joe Buonomo, President, DCR Bruno Mahlmann, VP Cyber Security, Perot Systems Linda Meeks, CISO Information Security, Boeing
Our Partners
Source: http://cm.bell-labs.com/who/ches/map/gallery/index.html
DIB program
DoD agrees to:
Provide classified tips and analysis on threat actors Distribute attributed data from DoD and other industry partners Protect data attributable to specific companies Provide selected forensic support
DoD Action
DOD is currently evaluating information security standards and developing DFARS language (to be released in Summer/Fall) Army Labs Policy Memo directs acquisition executives to engage their Program Executive Offices and Program Managers to take immediate steps to: Ensure that CUI is identified and appropriately protected in DoD acquisition programs Report incidences and exfiltration
GAO Reviews
Congress Investigative Arm 22 Reports on Cyber Issues
Legislative Actions
Senate Bill (S. 773) House Bill (H.R. 2195)
Rockefeller/Snowe S 773
Cybersecurity Act of 2009
NIST standards for federal agencies & private sector NIST responsibility for international cyber standards development and enforcement National licensing & certification for cyber professionals NSF support for R&D & test beds Cyber Clearinghouse for threats & vulnerabilities (including access) Secure Products & Services Acquisition Board (Approval Seal) Presidential Kill-Switch
Presidential Interest
Hacking Obamas Website Its no secret that my presidential campaign harnessed the Internet and technology to transform politics. What isnt widely known is that during the general election hackers managed to penetrate our computer systems. (President Obama, May 29, 2009) Source In Iran Sees Plans for Presidents Chopper (USA Today, Mar. 2, 2009) The U.S. Navy is investigating how an unauthorized user in Iran gained online access to blueprints and other information about a helicopter in President Obamas fleet.
Congressional Testimony
October, 2007
Information Sharing
Problem Clearly needs additional work DIB model results, good, but some problems and not scalable Trust is built on mutual exchange Alternatives: British Consultancy Model Roach Motel Model
Developing SCAP Automated Security & Assurance for VoIP & Converged Networks
September, 2008
1.Descibes available Unified Communications (UC) Technologies 2. Describes Security Risks of Deployment 3. Inventory of Laws to be considered pre deployment 4. Analysis if ECPA creates a legal barrier to deployment 5 Toolkit for lawyers and clients to assist in avoiding exposure from deployment