The panel discussion focused on implementing risk management in volatile times. Panelists provided leadership on assessing risk, mitigating conflicting approaches, defining roles, keeping stakeholders informed, and determining how culture and lack of resources affect risk. Specific topics included goals of leading risk management implementation like searching for and fixing the worst cyber risks in near real time, automating defenses, and engineering security comprehensively. Assessing risk involved inventorying data, establishing worst case impacts, understanding threats and vulnerabilities, and developing risk assessments. Handling conflicts among stakeholders suggested establishing split risk reporting chains and having a flexible, standards-based framework to facilitate discussions.
This document provides a first quarter status update on the Cross-Agency Priority Goal for Cybersecurity. The goal aims to achieve 95% implementation of priority cybersecurity capabilities like strong authentication, Trusted Internet Connections, and continuous monitoring across executive branch agencies by the end of FY2014. The goal is led by J. Michael Daniel and uses the Federal Information Security Management Act reporting structure to measure agency progress. The strategy focuses on accountability from agency leadership and coordination across stakeholders to implement the priority capabilities.
The document discusses technologies for protecting data through encryption and access control. It describes groundbreaking malware resistance that protects clients and data by making devices inherently secure. It also discusses pervasive device encryption to simplify encryption on all device types and modernized access control to securely manage access from any device using strong multi-factor authentication. The goal is to fundamentally strengthen security by protecting against threats, encrypting sensitive data, and controlling access to resources.
The document discusses how the Fourth Amendment protections against unreasonable searches and seizures have been applied to emerging technologies like telephones and email. It outlines how Congress passed laws like the Electronic Communications Privacy Act to update privacy protections as new technologies disrupted older models, but that the law now needs updating again to address cloud computing and location data. A coalition called Digital Due Process is working to update laws to require warrants for government access to stored communications and location data.
This document discusses how human behavior is the biggest security threat and proposes a behavioral design approach to securing users. It notes that traditional security awareness training has not been effective and suggests identifying key problems, investigating why they occur in users, and applying behavioral design approaches like creating triggers and raising ability rather than just awareness. The overall message is that improving human behavior can improve security.
This document discusses how web session intelligence can be used to detect criminals online by analyzing differences in their behavior compared to typical customers. It provides examples of how behavioral analytics of full web session data can reveal suspicious activity like vulnerability probing, password guessing, fraudulent account takeovers, and other cybercrimes. The document also cites a survey finding that 74% of organizations cannot tell if a web session belongs to a legitimate customer or criminal, and over 90% report lost revenue due to abuse of their website's business logic.
This document contains the summary of a presentation on real time forensics. It discusses how real time forensics can uncover the culprit while the evidence is still fresh by finding out what was damaged or stolen, the attack method used, where data was sent, and allowing recovery of compromised systems. It also examines what it would take to implement real time forensics across an entire enterprise system in real time.
This document discusses the need for organizations to implement travel security programs to protect employees and sensitive data when traveling. It recommends encrypting devices and files, using virtual desktops, establishing travel security policies, and maintaining awareness of global threats and high-risk countries through intelligence sources. The document provides guidelines for securing mobile devices, setting employee expectations, and establishing security processes for examining devices before and after international travel.
This document discusses how web session intelligence can be used to detect criminals online by analyzing differences in their behavior compared to typical customers. It provides examples of how behavioral analytics of full web session data can reveal suspicious activity like vulnerability probing, password guessing, fraudulent account takeovers, and other cybercrimes. The document also cites a survey finding that 74% of organizations cannot tell if a web session belongs to a legitimate customer or criminal, and over 90% report lost revenue due to abuse of their website's business logic.
This document contains the summary of a presentation on real time forensics. It discusses how real time forensics can uncover the culprit while the evidence is still fresh by finding out what was damaged or stolen, the attack method used, where data was sent, and allowing recovery of compromised systems. It also examines what it would take to implement real time forensics across an entire enterprise system in real time.
This document discusses the need for organizations to implement travel security programs to protect employees and sensitive data when traveling. It recommends encrypting devices and files, using virtual desktops, establishing travel security policies, and maintaining awareness of global threats and high-risk countries through intelligence sources. The document provides guidelines for securing mobile devices, setting employee expectations, and establishing security processes for examining devices before and after international travel.
This document provides an overview of cyberespionage and international cyber operations as weapons. It defines key terms, gives a brief history of cyberespionage dating back to the 1980s, describes the anatomy of a typical cyberespionage attack, discusses implications for nation-state policy, and outlines what individuals should do to protect themselves. The presenter is Mark Russinovich, author of Zero Day and Trojan Horse, speaking at an intermediate-level conference session.