April 2017 Digital Edition
March 2017 Digital Edition
Feb. 2017 Digital Edition
Nov/Dec 2016 Digital Edition
Oct 2016 Digital Edition
GSN 2012 Awards announced: White House deputy of homeland security recognized for leadership at annual gala
GSN Awards 2012
Hundreds of the best of the homeland security community’s federal, state and municipal government officials, government contractors, systems integrators, IT vendors and physical security product and solutions providers all came together the night of November 29 in a ballroom of the Washington, D.C. convention center to receive accolades.
The GSN awards dinner, which has become a Washington tradition over the last four years, offered a chance for the excellence and civic-minded spirit of homeland security efforts nationwide to be recognized.
Not only were the best tools and technologies acknowledged , but the people and groups who use them, from local police departments in Florida and Washington state, to the White House, were honored at the event.
During the awards ceremonies, Richard Reed, Deputy Assistant to President Obama for Homeland Security, received the second annual Government Security News/Raytheon Award for Distinguished Leadership and Innovation in Public Safety and Security. Reed was chosen for tireless work in his key role in leading the development of national policy related to resilience, transborder security and community partnerships. He has been described as the president’s eyes and ears during disasters. In crises, such as the Gulf oil spill, H1N1 pandemic, and Haiti earthquake, Reed has sprung into action at the White House, coordinating information and gathering people to cope with these catastrophes.
Reed told Government Security News in an interview after the dinner that gatherings like GSN’s awards ceremony were invaluable in demonstrating that the hard work of creating a resilient, strong response to crises is performed by thousands of individuals, like those in attendance. Gatherings that bring the diverse emergency response and homeland security communities together can broaden perspectives and spur new ideas, he said.
Reed has been a determined, mostly behind-the-scenes, captain of federal emergency response efforts during the Bush and Obama administrations, helping prepare for, and respond to, some of the worst natural disasters the nation has known, from one of the deadliest tornado seasons in history in the Midwest, to historic wild fires in the west, and massive storms in the eastern U.S.
Reed said the key to capable response to such staggering events lies not only in federal hands, but in enabling state, local and even personal responses. Getting resources and training in place before disasters happen goes a long way in an effective response and recovery, he said. “The true first responders are friends, neighbors and co-workers” in the immediate aftermath of a disaster, said Reed. Local police, firefighters and other agencies arrive second, he said. Enabling people with information concerning what resources are available or where they can go for help or supplies empowers them, said Reed.
Government Security News managing partner Adrian Courtenay has made the GSN/Raytheon award an annual tradition. The prize is sponsored by the Raytheon Company, a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world, which is headquartered in Waltham, MA.
Notable 2012 government excellence award winners included the local police departments in Tampa and St. Petersburg, FL, for their ground-breaking work in preparing for the Republican National Convention in Tampa this past summer. The departments put together comprehensive plans to gently defuse potentially volatile political demonstrations at the event. Both departments were also praised for implementing an innovative interoperable communications network during the GOP convention.
The Lawrence Livermore National Laboratory was recognized for its groundbreaking work on a small radiation detector. The Naval Air Systems Command won an award for its work on the Kestrel Wide Area Persistent Surveillance program, which developed an aerostat for long-term surveillance capabilities to protect ground soldiers in Afghanistan.
The complete list of GSN’s 2012 Award winners appears below:
CATEGORY 1 – VENDORS OF IT SECURITY PRODUCTS AND SOLUTIONS
Best Anti-Malware Solution
Best Identity Management Platform
Best Certificate Management Solution
Best Compliance /Vulnerability Assessment Solution
Best Data Security/Loss Management Solution
Best Endpoint Security Solution
Best Forensic Software
Best Intelligence Data Fusion and Collaborative Analysis Solution
Lookingglass Cyber Solutions
Best Intrusion Detection/Prevention Solution
Vanguard Integrity Professionals
Best Network Security/Enterprise Firewall
Best Privileged Access Management Solution
Best Real-Time Dynamic Network Analysis
Best Continuous Monitoring Solution
Best Security Incident/Event Management Solution (SIEM)
CATEGORY 2 – VENDORS OF PHYSICAL SECURITY PRODUCTS & SOLUTIONS
PHYSICAL SECURITY ACCESS CONTROL & INDENTIFICATION
Best Biometric Identification Solution
Best Integrated System for HSPD 12/FIPS 201 Compliance
Best Platform for Physical and Logical Access
Best Interoperable First Responder Communications
Best Mass Notification Systems
Best Regional or National Public Safety Communications Deployment
Best Explosives Detection Solution
Best Long Range Detection Systems
Best Nuclear/Radiation Detection
Lawrence Livermore National Laboratory
Best Intelligent Video Surveillance Solution
Best Thermal/Night Vision/Infrared Cameras
HGH Infrared Systems
Best Network IP Cameras
Best Video Storage/Digital Transmission Systems
Best Perimeter Protection Solution
Best Crash Barriers
Best Physical Security Information Management (PSIM) Solution
Best Disaster Preparedness or Disaster Recovery & Clean-up Service
High-Rise Escape Systems
Best Facility Security/Force Protection Service
Best Homeland Security Training/Higher Education Solutions
Category 3: Government Security News 2012 Government Excellence Awards
Most Notable Airport Security Award
Defense Manpower Agency
Most Notable Maritime/Port Security Program
Ohio Department of Public Safety/Northern Border Initiative
Most Notable Railroad/Mass Transit Security Program
Denver Regional Transportation Authority
Most Notable Critical Infrastructure Program, Project or Initiative
U.S. Veterans Administration Hospital, Tucson, AZ
Most Notable Cyber Security Program, Project or Initiative
U.S. Department of Energy
Most Notable Emergency Response Implementation
U.S. National Guard
Federal Emergency Management Agency (FEMA)
Most Notable Law Enforcement Interdiction, Arrest or Counter-Terrorism Program
Orange County Intelligence Assessment Fusion Center
Most Notable Municipal/County Programs, Projects or Initiatives
Seattle, Washington Police Department
Tampa and St. Petersburg, Florida Police Departments
Naval Air Systems Command (Kestrel Wide Area Persistent Surveillance)
The Government Security News 2012 Homeland Security Awards Program officially opened for entries on May 1, once again featuring 45 Awards in three broad Categories:Best Vendors of IT Security Products and Solutions, Best Vendors of Physical Security Products and Solutions and the 2011 Government Excellence Awards.
Returning as corporate Sponsors of the 2012 Program are BRS Laboratories of Houston, TX -- a leading software development company for video behavioral recognition software that deploys easily and rapidly on large scale video networks and provides actionable information without inundating end users with false alarms -- and Entrust, Inc. , of Dallas, TX, which offers physical/logical access, mobile security, certificate management and other identity-based solutions to governments and large enterprises. Additional sponsors will be announced, and profiles of all 2012 sponsors, will be published in coming weeks. Companies interested in joining the ranks of sponsors of the 2012 Awards Program should contact GSN Publisher and World Business Media President, Edward Tyler, at 212-344-0759, ext. 2001.
The cost to submit an entry in the 2012 program is $295 for vendors of IT security and physical security products and solutions. As in previous years, there is no cost for entries in the 10 categories of awards for federal, state and local government agencies. Vendors of IT and physical security products and solutions may nominate themselves or be nominated by colleagues or government clients, while government agencies or departments may similarly nominate themselves or be nominated by other agencies, colleagues or vendors.
According Adrian Courtenay, managing partner of World Business Media, several new categories created in 2011 to acknowledge successful initiatives of federal, state or local agencies in responding to emergencies, countering terrorism and preventing crime will again be included in 2012. These categories are “Most Notable Emergency Response Implementation – Federal, State or Local”; “Most Notable Law Enforcement Interdiction, Arrest or Counter Terrorism Program – Federal, State or Local”; and “Most Notable Counter Terrorism or Crime Prevention Program”.
In the 2011 contest, the Bastrop Country, TX, Unified Command (including county, state and federal government agencies) was awarded the trophy for “Most Notable Emergency Response Implementation” in battling 2011 Texas wildfires in Bastrop County. The United States Customs and Border Protection, Detroit Sector, was winner in the “Most Notable Law Enforcement Interdiction or Arrest” category for a dramatic arrest on St. Clair River in Detroit, and the Los Angeles Police Department was recognized for having the “Most Notable Law Enforcement Counter Terrorism or Crime Prevention Program.”
Another category that was new in 2011, “Most Notable Cyber Security Program or Technology – Government or Military”, will also be continued, in recognition of the emergence of Cyber Security as a vitally important component of overall security for any nation. The winner of this award in 2011 was the National Oceanic and Atmospheric Administration.
The 2012 Awards Program will once again culminate with a gala awards dinner in the fall, at a venue to be announced shortly. In the 2011 program, the “GSN/Raytheon Award for Distinguished Leadership and Innovation” was introduced and presented to Admiral Thad Allen (US Coast Guard-ret.), who came out of retirement twice in recent years to serve his country, first in heading up the federal response to Hurricanes Katrina and Rita, and later in managing the response to the Deepwater Horizon oil spill in the Gulf of Mexico.
In remarks for the 2011 Awards Dinner audience, Admiral Allen said the continuing work of technology companies and first responders was key in any disaster. He urged everyone to become a “lifelong rapid learner” to better cope with disasters, both man-made and natural. He also said “reconciling opportunity and competency” when disaster strikes is essential to any effective recovery, and being on top of the latest, most effective technology is a product of being a lifelong rapid learner. He also said clear communications is also a key to effective response and amplified his call for a nationwide interoperable first responder radio network.
Photos of the 2010 awards reception and dinner are available at www.flickr.com/photos/[email protected]/, and video interviews with Admiral Allen, as well as sponsors and winners in the 2011 Awards program, are available at the GSN Video Center at www.gsnmagazine.com/videocenter.
Entry forms and other information about the 2012 Awards Program are available at www.gsnmagazine.com/hsa2012/welcome.
Government Security News has announced that its 2011 Homeland Security Awards Program will officially open for business and start accepting entries in the program’s 45 awards categories on Tuesday, April 26.
The 2011 program contains a number of exciting new categories, reflecting the dynamically changing threat environment, in all three of the overall awards groupings: Best Vendors of IT Security Products and Solutions, Best Vendors of Physical Security Products and Solutions, and the 2011 Government Excellence Awards.
The cost for each entry in the 2011 program is $295 for vendors of IT security and physical security products and solutions. As in previous years, there is no cost for entries in the 10 categories of awards for federal, state and local government agencies.
Vendors of IT and physical security products and solutions may nominate themselves or be nominated by colleagues or government clients, while government agencies or departments may similarly nominate themselves or be nominated by other agencies, colleagues or vendors.
Adrian Courtenay, Managing Partner of GSN’s parent company, World Business Media, LLC, cited two intriguing new categories in the government sector that have been selected to acknowledge solid “boots on the ground” achievements of federal, state or local agencies in responding to emergencies, countering terrorism and stopping crime. These categories are “Most Notable Emergency Response Implementation – Federal, State or Local” and “Most Notable Law Enforcement Interdiction, Arrest or Counter Terrorism Program – Federal, State or Local.”
Acknowledging the increasing importance of cyber security and the threat of cyber war among nation-states, Courtenay also pointed out that the government awards in 2010 have been expanded to include a category titled, “Most Notable Cyber Security Program or Technology – Government or Military.”
Returning for its third year as a sponsor of the GSN Awards Program is founding sponsor ArcSight, now a business unit of Hewlett Packard Software and Solutions, whose enterprise threat and risk platform is an integrated product for collecting, analyzing and assessing security and risk information. ArcSight is also a repeat winner in the GSN awards program for its Security Incident Event Management (SIEM) products for collecting, analyzing and assessing security incident event information.
Also returning as event sponsors are General Dynamics C4, located in Phoenix, AZ, a major developer and integrator of secure communications and information systems and technology; and Mutualink, another GSN award winner, which creates networks of interoperable communities that can instantly share radio, voice, text, video and data files, and telephone communications in a secure environment.
The fourth and final sponsor to date in the 2011 Awards Program is Behavioral Recognition Systems, Inc., of Houston, TX, also known as BRS Labs, whose software uses the fascinating, scientifically developed cognitive reasoning and artificial intelligence of behavioral analytics to leverage a stream of intelligence from millions of surveillance cameras worldwide, in order to provide alerts regarding abnormal or suspicious behavior.
Profiles of each of the 2011 sponsors will be posted on the GSN Web site in the coming weeks.
Additional companies or organizations interested in joining the ranks of 2011 sponsors of the GSN 2011 Homeland Security Awards Program should contact GSN Publisher and World Business Media President, Edward Tyler, at 212-344-0759, ext. 2001.
According to Courtenay, the 2011 Awards Program will culminate with the annual awards dinner in early November at a venue to be announced shortly. “It’s going to be hard to top last year’s elegant dinner and spectacular after-dinner keynote presentation by four-star General Barry McCaffrey (USA-Ret.). But we’re going to try!”
In 2010, the GSN awards were presented to a sold-out ballroom at the JW Marriott Hotel in Washington, DC, that included many distinguished government and military officials, academics, law enforcement and public safety professionals from across the country, along with the systems integrators, defense contractors and vendors of products and solutions used in homeland security.
Photos of the 2010 awards reception and dinner are available at:
Further information and entry forms for the 2011 Awards Program are available at:
Despite official murmurings a few months ago that the fiscal year 2011 budget request for DHS might decline slightly, the budget package unveiled on February 1 actually shows a three percent increase in “discretionary spending” by DHS in 2011, versus the prior year, and modest growth, at approximately the predicted rate of inflation, in the outer years.
“The total fiscal year 2011 budget request for DHS, including fee funded and mandatory spending, is $56.3 billion, a two percent increase over the fiscal year 2010 enacted level,” said Peggy Sherry, the acting chief financial officer at DHS, in a telephone conference call with journalists on February 1. “The department’s fiscal year 2011 net discretionary or appropriated funding request is $43.6 billion, an increase of three percent over the fiscal year 2010 enacted level.”
In releasing his overall budget request, President Obama proposed a freeze in government spending for a portion of the discretionary domestic spending plan for three years, but he specifically exempted homeland security expenditures from that freeze. “It won’t apply to our national security – including benefits for veterans,” said Obama in remarks he made in the White House on February 1.
Some observers speculated that the slight bump up in DHS spending may have resulted from the nationwide trauma caused by the failed Christmas Day underwear bombing attempt, and the urgent call for stronger screening measures at the country’s airports. However, a DHS official who participated on the conference call with journalists, but requested anonymity, would not attribute the budget increase to that terrorist attack.
“As part of the budget process, we examined different scenarios and options,” explained the official. “Those are discussions that are internal to the Administration and what you see in the budget release today is the end product of all those budget deliberations.”
Among the thousands of individual line-items for specific programs and planned procurements are the following highlights:
Advanced imaging systems – The 2011 budget requests an additional $214.1 million to install about 500 extra advance imaging technology machines at airport checkpoints, above and beyond the 500 systems that had already been planned. These funds will place such whole body scanners in 75 percent of the country’s largest airports, said Sherry.
Explosive detection – Beyond body scanners, DHS will seek an additional $85 million to bolster international flight coverage by federal air marshals, an increase in $60 million for an additional 800 explosive trace detection machines and a $71 million bump up to pay for an additional 275 K-9 teams at airport check points.
Border Patrol – The new budget envisions a decrease of 180 personnel in the ranks of the Border Patrol, which will be achieved largely through attrition. A DHS official suggested that the overall operating effectiveness of the Border Patrol will not be affected by this decline in personnel slots because the Border Patrol has almost doubled in size during the past five years. “A lot of the agent workforce, the substantial portion of it, has only a couple of years experience,” said this DHS official. “As they become more seasoned and more mature in their jobs, their effectiveness will increase, and because we are not doing the extensive hiring of 2,000 to 3,000 new agents a year, we can afford to put less into training improvement.”
Cyber-security – By contrast, DHS is planning a substantial beef-up in its cyber-security efforts. The new budget seeks $379 million to develop the National Cyber Security Division, which will attempt to safeguard the dot.gov and dot.com domains, and limit the nation’s vulnerability to computer attacks. DHS wants to add another $5 million to the $5 million that was in last year’s budget for the National Cyber Security Center, which one DHS official characterized as “still in its infancy.” The budget envisions an increase in the Center’s staffing to 40 people and the enhancement of its expertise, so it can integrate with other cyber-centers throughout the federal government.
Terror trials – Contrary to media reports that a terror trial in Manhattan might require a billion dollars in security measures, the 2011 budget request for DHS includes only $200 million for such security measures, which would be available through the traditional urban area grant programs. “The department took a look at it and we think $200 million is really our best estimate of the costs,” said the DHS official.
Federal contracting – In what it calls “re-balancing the workforce,” DHS is planning to rely less on outside vendors and more on internally recruited and trained personnel, particularly in the areas of cyber-security -- where DHS is authorized to hire as many as 1,000 new cyber-specialists – and the intelligence work often referred to as “connecting the dots.” “In our analysis and operations activity, we have a major increase in the number of feds doing intelligence type work,” said Sherry.
Coast Guard – A DHS fact sheet issued by the Office of Management and Budget points out that the budget request includes $538 million for a fifth National Security Cutter and $240 million to produce four new Fast Response Cutters. Even so, the new budget seeks funds for 1,100 fewer active duty Coast Guard personnel. “We are looking to reorganize and restructure certain elements of the Coast Guard to create greater efficiency,” explained a DHS official, “and there are obviously tradeoffs made as part of that to ensure we could continue to recapitalize the Coast Guard.”
President Obama’s budget request was delivered to Capitol Hill and will now undergo months of scrutiny by lawmakers. Fiscal year 2011 begins officially on October 1, 2010.
Global ransomware damage costs predicted to exceed $11.5 billion annually by 2019:Ransomware will attack a business every 14 seconds by end of 2019
MENLO PARK, Calif., Nov. 15, 2017 -- Ransomware — a malware that infects computers (and mobile devices) and restricts their access to files, often threatening permanent data destruction unless a ransom is paid — has reached epidemic proportions globally.
Cybersecurity Ventures predicts there will be a ransomware attack on businesses every 14 seconds by the end of 2019. This does not include attacks on individuals, which occurs even more frequently than businesses.
"Since September 2013 when CryptoLocker, the first weapons-grade ransomware strain appeared, this type of malware has metastasized into a multi-billion dollar criminal business model that is only in its early phases and will continue to increase in sophistication," says Stu Sjouwerman, founder and CEO at KnowBe4, a company that specializes in training employees on how to detect and respond to ransomware attacks.
The big myth around ransomware damages is the costs are limited to ransom payouts. However, the percentage of businesses and individuals who are paying bitcoin to reclaim access to their data and systems in response to ransom demands — is declining (even if the total payout figures are rising due to the sheer volume of new attacks).
"Ransomware costs include damage and destruction (or loss) of data, downtime, lost productivity, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hostage data and systems, reputational harm, and employee training in direct response to the ransomware attacks," says Steve Morgan, founder and Editor-In-Chief at Cybersecurity Ventures.
CIOs, CISOs (Chief Information Security Officers), and IT security teams need to heighten their awareness and response plans around the ransomware threat. Cyber defense needs to cross boundaries so that every IT worker understands exactly what ransomware is, how it infects organizations, and how to combat it.
Cybersecurity Ventures predicts cybercrime will cost the world in excess of $6 trillion annually by 2021, up from $3 trillion in 2015. Ransomware is expected to worsen and make up a proportionately larger share of total cybercrime by 2021.
Cybersecurity Ventures is the world's leading researcher and publisher covering the global cyber economy, and a trusted source for cybersecurity facts, figures, and statistics.
SOURCE Cybersecurity Ventures
SOURCE Cybersecurity Ventures
enSilo, the company that protects endpoints pre- and post-infection to stop data breaches and data disruption in real time, today announced that it has been included in Gartner's Market Guide for Endpoint Detection and Response Solutions (G00321729). A complimentary copy of this Market Guide is available for download here.
According to Gartner, "The EDR market is rapidly converging with the endpoint protection platform market; however, both areas will continue to coexist for the next three years. Security and risk management leaders need platform-based solutions that provide all aspects of adaptive security architecture."
With costly, high-profile data breaches, ransomware disruptions and other attacks increasingly beginning at the endpoint, capabilities for safeguarding organizations' devices and empowering users are essential, including detecting sophisticated attacks, containing the reach of threats by defeating the execution of malware and other intrusions and rapidly remediating endpoints to a pre-infected state. enSilo delivers these features and other advantages in its proven endpoint security platform combining automated, blocking-enabled Endpoint Detection and Response (EDR) capabilities with Threat Hunting, Incident Response, and Virtual Patching features. This integrated approach to protecting devices and employees offers dramatic security advantages and avoids burdening end users and security staff with layered, piecemeal endpoint protection tools.
"We feel that Gartner's inclusion of enSilo in this Market Guide validates our team's vision and innovation," said enSilo CEO and co-founder Roy Katmor. "Malicious infiltrations prevail against traditional defenses by exploiting detection gaps and achieving costly dwell time before they uncovered. enSilo's Next Generation AntiVirus (NGAV) serves as a useful first line of defense, complemented and correlated with our unique blocking-enabled EDR that allows to contain in real-time malicious code and behaviors executing on systems and continually helps security teams revert devices back to known, trusted states. This elimination of dwell time between infiltration and detection is key, it's time for the industry to prioritize protection in EDR. 'Detection' and 'Response' offer little value if they are not real-time and automated."
"Stopping breaches is my number one priority and I am a big proponent for endpoint detection and response tools to help with that goal. When we thoroughly tested and evaluated top notable vendors in the market, enSilo stood out above all the rest," said Randy Potts, CISO at financial services firm Real Time Resolutions. "enSilo has a fundamentally different approach to stopping the post-infection impact of malware in an automated manner. This unique capability allows my team to stop breaches and respond to malware impact immediately and more effectively comparing to other EDR tools that introduce dwell time."
According to Gartner, "Endpoint detection and response is essentially a big data and analytics tool that has all the advantages and drawbacks of this emerging field. However, it's foundational for next-generation endpoint protection solutions, based on more-complex behaviors, and it's extensible to additional problems, such as insider threat and account takeover attacks. EDR tools are capable of reducing the time to detect and respond to hacking and malware incidents. They help correlate events into incidents, but require a sophisticated administrator and API integration with other security tools."
"enSilo strives to offer a robust post-infection approach to endpoint security that enables real-time breach containment and response, allowing zero dwell time and the immediate blocking of data exfiltration and data tampering," Katmor added. "Providing EDR tools is important, however in addition to post-infection evidence collection, the breach must be stopped in real-time, ensuring zero dwell time. It's all about stopping the breach."
Read more about Gartner's latest endpoint detection and response recommendations on enSilo's blog and download your complimentary copy of the Market Guide for Endpoint Detection and Response Solutions here.
Source: Gartner, "Market Guide for Endpoint Detection and Response Solutions," Peter Firstbrook, 9 November 2017.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
enSilo comprehensively secures the endpoint pre- and post-infection. enSilo automates and orchestrates detection, prevention and real-time response against advanced malware and ransomware without burdening cybersecurity staff. enSilo's single lightweight agent includes next generation antivirus (NGAV), application communication control, automated endpoint detection and response (EDR) with real-time blocking, threat hunting, incident response and virtual patching capabilities. Coupled with a patented approach that has full system visibility, enSilo's endpoint security solution stops modern malware with a high degree of precision and intuitive user interface. Cybersecurity staff with enSilo can effectively manage malware threats without alert fatigue, excessive dwell time or breach anxiety. enSilo's cloud management platform is flexible and extensible to meet operational needs that stop malware impact. For more information please visit www.ensilo.com.
SEI Seeks Participants for Cyber Intelligence Study Sponsored by Office of the Director of National Intelligence
PITTSBURGH, Nov. 16, 2017 -- The Emerging Technology Center at the Software Engineering Institute at Carnegie Mellon University today issued a call for organizations to participate in a cyber intelligence study sponsored by the Office of the Director of National Intelligence (ODNI).Cyber intelligence—acquiring and analyzing information about cyber capabilities, intentions, and activities to enhance decision making—is a rapidly changing field. The study, which the SEI will conduct over the next 18 months, will provide ODNI with insight into how organizations across the federal government, industry, and academia conduct cyber intelligence activities, identifying common challenges and best practices.
This study is a follow-up to the SEI's Cyber Intelligence Tradecraft Project, a 2013 study that examined 30 organizations and their approaches to cyber intelligence. The 2013 study has been widely cited and now is the basis of some university courses in cyber intelligence. Key findings from the 2013 study can be found at: https://www.sei.cmu.edu/library/assets/whitepapers/citp-summary-key-findings.pdf
"In 2013, we found areas where organizations struggled and where they were doing well," said Jared Ettinger, SEI cyber intelligence researcher and study technical lead. "Organizations were able to take the report and follow best practices, so now we'd like to see what has changed," he said.
Elements of the new study will include preliminary interviews with selected organizations to identify common themes and then a quantitative questionnaire to gain greater insight on those identified themes from a large number of respondents. The SEI will issue a report based on the study in early 2019.
Organizations participating in the study will benefit by:
understanding their unique cyber intelligence capabilities and challenges in an environment that safeguards participant anonymity
receiving access to study results prior to public release
identifying technology gaps and challenges to influence potential research/prototyping efforts
For more information about the study, see https://www.sei.cmu.edu/about/organization/etc/citp.cfm. Organizations wishing to participate in the study should contact the SEI at [email protected]
About the Carnegie Mellon University Software Engineering Institute
The Software Engineering Institute (SEI) is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI works with organizations to make measurable improvements in their software engineering and cybersecurity capabilities by providing technical leadership to advance the practice of software engineering and security. For more information, visit the SEI website at http://www.sei.cmu.edu.
SOURCE Carnegie Mellon Software Engineering Institute
PORTLAND, Maine, Nov. 13, 2017 -- The Beacon Group welcomes Major General James "Jim" Madora, as Senior Advisor for Beacon's Aerospace, Defense & Government practice. Major General Madora will work alongside Senior Vice President Matt Keegan and Beacon's President and CEO Cliff Farrah. Major General Jim Madora is a retired Army Major General who has over 10 years' experience in the defense industry.
"I am really looking forward to having Jim on the team. I am certain he will offer sage wisdom and experience. His expertise in air defense, national security, and business will help us provide our clients with top notch strategies," says Senior Vice President and ADG practice leader Matt Keegan.
Major General Madora has had a distinguished career in the United States Army. His last assignment before retirement was as Director of Army Program Analysis and Evaluation, in the office of the Deputy Chief of Staff for Programs and Resources. In this role, he developed Army funding strategy and the 6 year $500B Army Program / Budget Plan. During his career, Major General Madora commanded at platoon, company, battalion, brigade and general officer level. He is a combat veteran and his numerous military awards include the Distinguished Service Medal, Defense Meritorious Service Medal, 6 awards of the Legion of Merit, 3 awards of the Bronze Star and 3 awards of the Army Meritorious Medal.
"Major General Madora's addition to the team is a wonderful way to position the firm for our activities in 2018. As we recently observed Veterans Day, our firm is grateful for the opportunity to work with some of our country's finest and most knowledgeable veterans through our Senior Advisor Program. Major General Madora exemplifies the thought leadership and strategy acumen our clients value so highly," said Cliff Farrah, Beacon's President and CEO.
Originally from Wilmington, Delaware, Jim is a graduate of the United States Military Academy at West Point. He also holds a Master's Degree in Mathematics and a Master's Degree in Operations Research and Statistics from Rensselaer Polytechnic Institute and a Master's Degree in Business Administration from Long Island University. In addition, he received a State Department Fellowship to serve as the Army's representative to the United States State Department Senior Executive Seminar. Major military schools attended include the United States Marine Corps Amphibious Warfare School, Army Command and General Staff College and the National War College.
Media Contact: Natalie Barr, [email protected]
alliantgroup Hosts Former U.S. Secretary of Homeland Security Tom Ridge at its Technology, Economic, Legislative & Policy Summit
HOUSTON, -- Former U.S. Secretary of Homeland Security Tom Ridge and over 100 professionals, including current and former state officials, Congress members, executive officers, U.S. business leaders, CPA partners and business advisors from across the nation gathered for alliantgroup's inaugural Technology, Economic, Legislative & Policy Summit—an exclusive event created for the benefit of the firm's clients and CPA and industry partners.
During the two day conference, attendees were treated to a series of panels covering some of the most critical issues facing U.S. policymakers. Such topics included the impact of technology on the American workforce, the growing importance of cybersecurity, recent tax reform legislation and policy reforms that would foster a more technically skilled labor force and sustainable economic growth.
During the conference's keynote panel, former Secretary Ridge was joined by alliantgroup CEO Dhaval Jadav and the leaders of several technology alliances. With the advancement of new technologies and the Internet of Things making our world more connected, Ridge and the panel stressed how cybersecurity must become a primary focus for both the public and private sectors. The panel emphasized that while these new technologies have improved our overall quality of life and enhanced the efficiency of countless industries, from manufacturing to healthcare services, the growing connectivity of individuals, systems and networks has made the country more susceptible to cyberattacks.
"There is a greater threat today in my judgement of a cyberattack causing economic damage and potential personal injury and death than even a physical attack," said Ridge.
During the panel, Ridge and the other technology experts highlighted the importance of maintaining good safety protocols to identify and prevent attacks, from standardized employee procedures to ensuring firewalls and other security systems were up to date. The panel also stressed the importance of employees to maintain these best practices and to exercise good judgement.
"I would like to thank Secretary Ridge and everyone who took the time to attend this event," said Dhaval Jadav, alliantgroup CEO. "Our goal in hosting these conferences is to provide thought leadership to our CPA firms and the businesses they serve. By providing them with the information they need to stay ahead of emerging economic and policy trends, it is our hope that we are offering another avenue to ensure their continued success."
Those in attendance included former U.S. Secretary of Agriculture Mike Johanns, former Alabama Governor Bob Riley, former U.S. Congressman Rick Lazio, former Senior Counsel to the U.S. Senate Finance Committee Dean Zerbe, Private Equity and M&A Advisor Neeraj Mital, former IRS Commissioners Mark W. Everson, Steven Miller and Kathy Petronchak, and alliantgroup CEO Dhaval Jadav.
alliantgroup is a leading tax consultancy and the nation's premier provider of specialty tax services. The firm assists U.S. businesses and their CPA advisors in properly identifying and claiming all federal and state tax incentives that were designed for their benefit. These incentive programs were created to help American businesses grow and remain competitive in an increasingly global economy. To date, alliantgroup has helped 12,000 U.S. businesses claim over $6 billion in tax savings. For more information on alliantgroup, please follow us on LinkedIn, Facebook and Twitter.
In 2016 almost 1.1 billion identities were stolen globally. This number is up dramatically from a reported 563.8 million identities stolen in 2015. In addition, the same Symantec Internet Security Threat Report placed the United States at the top of the list for both the number of breaches by country (1,023) and the number of identities stolen by country.
New York State’s Division of Financial Security and other government entities around the globe have been monitoring this increased cybercriminal threat and determining means to help protect the private information of individuals as well as the information technology systems of regulated organizations.
New York State’s Division of Financial Security released new cybersecurity requirements (23 NYCRR 500), directly affecting the way that financial data is managed going forward. Applicable to financial services companies operating in New York State, these regulations declare that, on an annual basis, financial firms are required to prepare and submit a Certification of Compliance with the NY DFS Cybersecurity Regulations to the superintendent, commencing on February 15, 2018.
The scope of this legislation describes measures related to: cybersecurity programs and policy, personnel, resources and training, penetration testing and assessments, audit trails, access privileges, application security, third parties, NPI (Non Public Information) encryption, data retention, incident response and notification.
Among other requirements, this regulation dictates that companies declare any cyberattack to the superintendent within 72 hours. In the past, many companies chose to not disclose information related to these hacking exposures because much of their cost stems from damage to brand reputation and the necessary steps required to rebuild the trust of their clients post-attack.
Similar to the NY DFS proposal, the Federal Reserve Board (FSD), the Office of the Comptroller of the Currency (OCC), and the FDIC issued an advance notice of proposed rulemaking (ANPR) on enhanced cyber risk management and resilience standards for large banking organizations. Additionally, the states of Vermont and Colorado have released laws pertaining to cybersecurity and the improved protection and monitoring of data.
Two technologies specifically called out in the new NYS DFS Cybersecurity requirements, Multi-factor Authentication (MFA) and Risk Based Authentication (RBA), are key methods of complying with regulation and defending against attacks.
Multi-factor authentication is defined as using at least two factors to authenticate a person, generally a combination of:
- “Something I Have” — this could be a hardware token, a mobile soft token, etc.
- “Something I Know” — like a PIN code, a password, and
- “Something I Am” — such as a fingerprint or face recognition.
With MFA, the two factors are fully independent from each other (i.e. the failure of one factor would not compromise the other one).
Risk based authentication is the capacity to detect anomalies or changes in the normal use patterns of a person as part of the authentication process, require additional verification if an anomaly is detected to avoid any breach.
It is more efficient to avoid hacking and cyber-attacks in the first place by focusing attention on the security of the applications being accessed, both externally and internally. To learn more about these regulations and how similar standards will impact you, visit www.hidglobal.com/iam.