SORT BY Relevancy
Cyber Security is a growing issue around the world. On October 24, the International Cyber Threat Task Force (or ICTTF) will host the Cyber Threat Summit in a massive 24-hour webcast online. On this episode of Xerox Real Business Radio, we have two special guests. The first guest is Paul Dwyer, president of ICTTF and an internationally recognized information security expert with over 20 years of experience. We also have Chuck Brooks, vice president and client executive for the Department of Homeland Security at Xerox, with us. Both Paul and Chuck will discuss the upcoming Cyber Threat Summit, the evolving role of cyber security at the Department of Homeland Security and how public/private partnerships can support government security.
While the internet is a place where learning thrives and our students need to develop technology skills in order to be competitive in the workplace, it is not without its perils especially for our students. Cyber security is a skill that students should be aware of. What can parents, teachers, and school districts do to protect their students? Please join host Ray Pinney as he talks cyber security with representatives from the (ISC)2 Foundation. They will discuss the perils that our students face and a The Safe and Secure Online program that will help our kids be safe. If you want more information on cyber safety please email ISC2 firstname.lastname@example.org
Get the Report Here: http://bit.ly/xreport
Twice a year security professionals pause to read their own report on the trends and risks affecting IT Security. Produced by the IBM X-Force research team, this report investigates the state of cyber security, recent attacks along with improvements seen in vulnerability disclosures. If you are a CIO, CEO, CISO or a line of business executive this must read report outlines the new attack opportunities that social media presents for enterprises along with the impact all those new Apple iPhones and Android mobile devices can have on your business. This live interview will occur right after the report is released with Robert Freeman, X-Force research manager and Caleb Barlow. What will Robert reveal? Well - That despite several high-profile attacks conducted by suspected state-sponsored groups using advanced methods, X-Force believes off-the-shelf tools and techniques used against a broad target base were responsible for the bulk of 2012’s security incidents. They found that high profile attacks using zero-day exploits or designer malware code associated with Advanced Persistent Threats dominated the headlines, but more data was compromised using simple attacks launched against less prominent organizations.
The research from Robert's team also looked across industries. Are you in Healthcare? Energy and Utilities? Financial Services? Get educated on the treat to your business and some of the actions your team can take to address mobile security and even how to plan an emergency response in the event you are attacked.
Join us and we'll share with you what you need to know to stay ahead of the threat!
Oregon Update-- The Obama administration in response to Chinas cyber-attacks has issued and [another] executive order to improve critical infrastructure and expands the “voluntary” enhanced cybersecurty services program, enabling near real time sharing of cyber threat information to assist participating critical infrastructure companies in their cyber protection efforts. [White house press release] The Executive Order directs the National Institute of Standards and Te
His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." Beyond Fear tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. His book, Schneier on Security, offers insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
Regularly quoted in the media -- and subject of an Internet meme -- he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.
Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons f
Our guest today is Peter Gregory. He is a security manager, computer security specialist, and author of over 20 books, including CISSP for Dummies. He has experience in the information technology sector, which spans over thirty-years and began in the 1970s.
He has worked in:
· local government
· wireless telecommunications, and
· financial management Our topic today is about writing books in the security sector
Shodan a cyber search engine developed in late 2009exposes holes in industrial secuirty systems Industrial control computers were built to run behind the safety of brick walls. But such security is rapidly eroded by links to the Internet. Recently, an unknown hacker broke into a water plant south of Houston using a default password he found in a user manual. A Shodan user found and accessed the cyclotron at the Lawrence Berkeley National Laboratory. Yet another user found thousand
Welcome to Security Radio. Your host James Hall with our No. 3 episode - a discussion about mobile phone security.
This evening we have with us the Chief Security Officer of FIXMO a provider of Mobile Risk Management services. Dan has been an information security professional for more than 15 years, and has worked for notable organizations such as XM Radio, Secure Computing, McAfee, Nominum, and Accuvant. He has extensive experience running security programs within the government segment; his most notable role was as Director of Network Security at the Transportation and Security Administration, which was the largest managed service contract within the federal government. Dan joined Fixmo in 2012 to drive security and technology innovation within Fixmo's suite of Mobile Risk Management solutions. In his role at Fixmo, he is directly responsible for global security and information assurance initiatives – researching trends, discovering security vulnerabilities and exploits, building strategic partnerships; and attaining industry certifications - as well as product innovation. Dan holds an M.S. in Information Assurance/Computer Forensics from Capitol College and a D.Sc in Information Assurance from Capitol College with a dissertation focus on enterprise smartphone security.
Security Radio thanks you for listening.
Cyber Security...Where will the next terrorist attack take place? Mass Transit, schools, nuclear stations?
Government Defense, the relations of patterns...What happens when you are on the list of the most powerful US super-computer in the world, the US Government, which claims to have no false positives?
Join us live Saturday Night at 7 PM EST, with expert, Lina Maini, goverment and corporate Private Investigator and cyber securtiy expert. And, undisclosed expert, IT, government defense expert and myself, Christian Swann. As we have a glass of wine and chat. "Conversations Under The Wine Tree".
ICTOA RADIO highlights Melissa Hathaway's cyber security lecture at the University of Delaware's Global Agenda 2012 Speaker Series.
Melissa Hathaway, former acting senior director for cyberspace at the National Security Council, worked on cyber security for Presidents Bush and Obama until August 2009, when she left to establish Hathaway Global Strategies, LLC. She led President Obama's 60-Day Cyberspace Policy Review from February-May 2009. During her time directing the Cyberspace Policy Review at the White House, she assembled a team of experienced government cyber experts and inventoried relevant presidential policy directives, executive orders, national strategies and studies from government advisory boards and private sector entities. Hathaway served as cyber coordination executive and director of the Joint Interagency Cyber Task Force within the Office of the Director of National Intelligence from March 2007 to February 2009 where she developed a cyber security strategy covering unprecedented scope and scale that now facilitates improvements for the United States to secure and defend its critical national infrastructures. She developed and created a unified cross-agency budget submission for FY 2008 and for 2009–2013, assembling disparate funding sources into a coherent, integrated program. One of the single largest intelligence programs of the Bush administration, the Comprehensive National Cybersecurity Initiative, has been carried forward by the Obama administration. Hathaway has a B.A. degree from The American University in Washington, D.C. She has completed graduate studies in international economics and technology transfer policy and is a graduate of the U.S. Armed Forces Staff College, with a special certificate in Information Operations.
Global Agenda is sponsored by UD's Center for Political Communication.
If you’re like most people, you probably only react to cyber security matters when your computer is so infected with malware that it no longer functions. This is what most IT professionals refer to as locking the barn door after the horse has bolted. In today's wired world, what you have to consider is that everything from your PC to your smartphone is subject to attack by hackers who are out to sell your personal information, steal your financial data and do much m