Monthly Archives: November 2013

Four step Cybersecurity process and more

” We want that education by which character is formed, strength of mind is increased, the intellect is expanded and by which one can stand on one’s own feet.” – Swami Vivekananda

From the Desk of Amitabh B Ghosh

When  organizations were implementing systems, security was an afterthought… now after couple of decades we are talking of implementing the cybersecurity framework in which privacy and civil liberties is kind of after thought as it shows up in an appendix by itself. It could also be that it is so important, that we do not want another  BAH contractor breach a.k.a NSA  .. which could have been avoided if the  cybersecurity Framework were in place.

Four step  Cybersecurity process

Step 1.  Cyber Hygiene  a.k.a awareness – Train and educate your intangible assets – PEOPLE

Step 2. Cyber Process a.k.a Business –   Know and document details of your Business – PROCESSES

Step 3  Cyber Policies a.k.a Regulation ( compliance) – Is you Business in compliance – POLICIES

Step 4  Cyber Products a.k.a Technologies – Using technology to solve business issues – PRODUCTS

At every step, identify the risk and a…

View original post 791 more words

Comments Off on Four step Cybersecurity process and more

Filed under Soft Skills

Four step Cybersecurity process and more

When  organizations were implementing systems, security was an afterthought… now after couple of decades we are talking of implementing the cybersecurity framework in which privacy and civil liberties is kind of after thought as it shows up in an appendix by itself. It could also be that it is so important, that we do not want another  BAH contractor breach a.k.a NSA  .. which could have been avoided if the  cybersecurity Framework were in place.

Four step  Cybersecurity process

Step 1.  Cyber Hygiene  a.k.a awareness – Train and educate your intangible assets – PEOPLE

Step 2. Cyber Process a.k.a Business –   Know and document details of your Business – PROCESSES

Step 3  Cyber Policies a.k.a Regulation ( compliance) – Is you Business in compliance – POLICIES

Step 4  Cyber Products a.k.a Technologies – Using technology to solve business issues – PRODUCTS

At every step, identify the risk and a risk mitigation strategy ….

Today marked the first day of the 5 Cybersecurity Framework  Webcast:

North Carolina State University will host a live webcast of the morning sessions. The webcast will be made available for playback after the event.

Day 1:http://mediasite.online.ncsu.edu/online/Play/ede7317303514ad592950de979bdeba21d

Day 2:http://mediasite.online.ncsu.edu/online/Play/619e8dc7786845fcb12e264b6be046ab1d

Agenda:

Draft Agenda (Nov. 8, 2013)

Related Project(s):

Cybersecurity Framework website:
http://www.nist.gov/itl/cyberframework.cfm

News 10 new results for cyber security
Cybersecurity and Counter-Terrorism Expert Richard Clarke MarketWatch

Richard Clarke – former Cybersecurity Czar and National Coordinator for Security,  and governments on cybersecurity and counterterrorism, Clarke will present 
See all stories on this topic »
Cyber security roundtableThe Advocate

The MHCC cyber security division hosted a roundtable discussion on emergency management on Tuesday as part of its “Cyber Security Speaker Series.”.
See all stories on this topic »
Lockheed Martin—Cybersecurity Is A Cool Career For Girls (STEM)SatNews Publishers

[SatNews] University of Maryland College Park will welcome more than 350 middle school students at the Cool Careers in Cybersecurity for Girls Workshop 
See all stories on this topic »
Cyber security expert Melissa Hathaway warns governments invest ABC Online

A former cyber security advisor to President Barack Obama and George W Bush is warning computer hackers are becoming more sophisticated and pose an 
See all stories on this topic »
Hanover handles UK cybersecurity for MicrosoftPRWeek

LONDON: Hanover is putting together a policy roundtable on cybersecurity for Microsoft after securing all of its UK public affairs business earlier this year.
See all stories on this topic »
Chertoff Says US Disengaging Won’t Ease Cybersecurity RisksBusinessweek

Michael Chertoff, who was Homeland Security secretary under President George W. Bush, provides his outlook for the cybersecurity industry in the Nov. 18 issue 
See all stories on this topic »
Websense Security Labs Reveals Eight Cybersecurity Predictions Broadway World

SAN DIEGO, Nov. 14, 2013 /PRNewswire/ This year, cybersecurity took center stage with nation-state attacks, numerous high-profile data breaches and 
See all stories on this topic »
Cyber security laws hailedPeninsula On-line

SINGAPORE: Experts said Singapore’s cyber security laws are robust, especially after amendments to the Computer Misuse Act in 2013. Still, they caution that 
See all stories on this topic »
Tenable Network Security Named a Deloitte 2013 Technology Fast Fort Mills Times

COLUMBIA, Md. — Tenable Network Security today announced it was named a Deloitte Technology Fast 500™ Award Winner for 2013, and was included on a 
See all stories on this topic »
Experts propose better cybersecurity information-sharing modelsTechTarget

BOSTON — Better cybersecurity information sharing has long been a priority for the security industry, but significant hurdles have always halted the progress of 
See all stories on this topic »
Blogs 9 new results for cyber security
Cybersecurity Legislation Gets Renewed Push From Financial Firms Ryan Tracy

Top financial-industry lobbyists pressed senators to move forward with cybersecurity legislation, part of an effort to re-energize a campaign that has lost steam 
Washington Wire
Bridging the Cyber Security Skills Gap | IBM Curiosity ShopIBM Curiosity Shop

With cyber security threats growing in number, complexity, and scale each year, future IT security and business leaders need a broader range of skills than ever 
IBM Curiosity Shop
Purdue Cybersecurity Experts Assist In Cyber Attack Drill | News Network Indiana

A nationwide cyber attack drill is underway, testing how the power grid could be compromised and Purdue Cyber Forensics members are involved.
WFIU Local News Podcast
Authorities investigating cybersecurity incidents targeting Dissent

U.S. authorities are investigating a series of cybersecurity incidents targeting the HealthCare.gov website at the center of President Obama’s healthcare law, 
PHIprivacy.net
Steve Daines Questions Cybersecurity Official About Risks in Jon King

Today, November 13, Montana Congressman Steve Daines questioned Roberta Stempfley, the Assistant Secretary of the Department of.
News Talk KGVO Radio
Uncertainty over UR cybersecurity | Campus TimesMatt Shinseki

Student life, from loans and job applications to Facebook posts and Amazon purchases, has increasingly moved online. But with the rise of the Internet, a new 
Campus Times
Summary of Cyber Security Awareness Seminar, Lahore University DRF_Admin

The second Cyber Security Awareness Seminar was held at LUMS in collaboration with the Cyber Security Task Force and the Pakistan Information Security 
Digital Rights Foundation
Webinar series on cybersecurity for journalists offered© 2011 SpyGhana.com, All rights reserved.

The webinar series, offered by the National Press Foundation, consists of three courses: “Protecting Information,” “Protecting Whistleblowers and Other Sources” 
spyghana.com
We All Need This: Invincea Launches Small Business Offering To FedCyberTeam

Lack of access to advanced security technology common to larger enterprises makes  In addition, organized cyber-crime now targets small business financial 
FedCyber.com For the Federal Cyber Security and Cyber Operations Practitioners

1 Comment

Filed under Soft Skills

5th Cybersecurity Framework Workshop

5th Cybersecurity Framework Workshop

Purpose:

Executive Order 13636, Improving Critical Infrastructure Cybersecurity, has directed NIST to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical infrastructure. This cybersecurity framework is being developed in an open manner with input from stakeholders in industry, academia, and government, including a public review and comment process, workshops, and other means of engagement.

The fifth Cybersecurity Framework workshop will be hosted November 14-15, 2013 in Raleigh, NC by the North Carolina State University. At this workshop, NIST will continue discussions on the implementation and future governance of the Cybersecurity Framework.

Target Audience: Critical Infrastructure Owners and Operators and cybersecurity staff. Specifically those who have operational, managerial and policy experience and responsibilities for cybersecurity, technology and/or standards development for Critical Infrastructure companies.

Agenda:

Draft Agenda (Nov. 8, 2013)

Related Project(s):

Cybersecurity Framework website:
http://www.nist.gov/itl/cyberframework.cfm

Details:

Start Date: Thursday, November 14, 2013
End Date: Friday, November 15, 2013
Location: North Carolina State University, Hunt Library, Centennial Campus, 1070 Partners Way, Raleigh, NC 27606
Audience: Industry, Government, Academia
Format: Workshop

Registration:

N.C. State University – Directional & Parking Map

Please follow signs for Special Event Parking and DO NOTget a parking pass

n-line registration is now CLOSED.

If you missed the registration deadline, send email toAngela Ellis (NIST Conference Office) for details. Please arrive early for onsite registration which will begin at 7:30am. Please refer to the website for updates prior to the start of the meeting……

Registration Contact:

Accommodations:

Conference rates will be available until October 31, 2013.

Hilton North Raleigh – (Hotel Info.)

Holiday Inn Express Hotel & Suites – (Hotel Info.)

Sheraton Raleigh Hotel – (Hotel Info.)

Note: Transportation from the hotels to NCSU will NOT be provided. There is ample parking available on the campus. Information on parking will be posted to this website within the next week.

Technical Contact:

Comments Off on 5th Cybersecurity Framework Workshop

Filed under Soft Skills

Cybersecurity headline NEWS

News 10 new results for cyber security
Decision makers to explore cyber securityYour Houston News

Learn to combat the latest cyber security threats at the next presentation of University of Houston-Clear Lake’s Cyber Security Institute. “Cyber Security For 
See all stories on this topic »
 
Destroyers like the Zumwalt at BIW present cybersecurity challengesPress Herald

PORTLAND – Combining mechanical and combat systems into an integrated network aboard U.S. warships presents cybersecurity challenges, but there’s no 
See all stories on this topic »
 
Hackers expose weak cyber-defense in AsiaMyBroadband

A rash of website hackings in the Asia-Pacific has exposed weak cyberdefences which must be improved to help the region deal with more sophisticated and 
See all stories on this topic »
Growing cyber attacks pose threat to cloud storage: ExpertsTimes of India

With more businesses storing their crucial data on virtual spaces, security experts have reportedly warned that with lack of security measures, the cloud data is 
See all stories on this topic »
 
The 80-20 rule of cyber securityFutureGov Magazine

80 per cent of cyber attacks are opportunistic threats which can be tackled by cyber hygiene and best practices, according to Arnold Shimo, Chief Technologist, 
See all stories on this topic »
 
Hackers expose Asia’s weak cyber defencesNew Straits Times

Southeast Asia and the wider Asia Pacific region “are growing in significance in terms of cybersecurity issues” as Internet usage becomes more pervasive, said 
See all stories on this topic »
House committee concerned over Obamacare cyber security Examiner.com

13, 2013, in order to thoroughly examine the cyber security deficiencies of President Barack Obama’s healthcare web site, the committee’s chairman, Michael 
See all stories on this topic »
 
Hackers expose Asia’s weak cyber defencesGMA News

Southeast Asia and the wider Asia Pacific region “are growing in significance in terms of cybersecurity issues” as Internet usage becomes more pervasive, said 
See all stories on this topic »
RedSeal Platform DatasheetInformationWeek

Overview: The RedSeal Platform is a cybersecurity intelligence system that is based on proactive end-to-end complex network modeling and analysis.
See all stories on this topic »
 
Can’t think of national security without securing cyber space:Business Standard

Addressing the Indian Academy of Science’s (IASc) annual meeting on the issue of Science andSecurity here today, Menon said there has been intimate 
See all stories on this topic »
 
Blogs 1 new result for cyber security
Microsoft’s Releases New Report Of Cyber Security Risks Of Caroline Vutagwa

viruses. Microsoft released its Security Intelligence Report volume 15, which analyzes threat intelligence from over a billion systems worldwide to provide 
TechMoran
 

Comments Off on Cybersecurity headline NEWS

Filed under Soft Skills

Latest chatter on Cybersecurity

World cybersecurity leaders call for cooperationCBS News

Governments and businesses spend $1 trillion a year for global cybersecurity, but unlike wartime casualties or oil spills, there’s no clear idea what the total 
See all stories on this topic »
Cybersecurity Competition’s Sixth Season Kicks Off To A Larger SatNews Publishers

“CyberPatriot is the nation’s largest and fastest growing youth cybersecurity challenge,” said Bernie Skoch, CyberPatriot Commissioner. “Its unique structure 
See all stories on this topic »
Cyber security company Barracuda’s shares soar in debutReuters

N), a data storage and security company, rose as much as 31 percent in their trading debut, valuing the company at about $1.18 billion. The company raised 
See all stories on this topic »
UPDATE 1-Cyber security company Barracuda’s shares soar in debutReuters

Shares of cybersecurity firms are in high demand because of the scarcity of listed companies in that market and a spike in internet hacking attacks and other 
See all stories on this topic »
The Top Three Cybersecurity Threats You Should be Considering Forbes

Now that National Cybersecurity Awareness Month is officially over I think it’s pertinent to discuss the issues facing IT security and the initiatives needed to 
See all stories on this topic »
National High School Cybersecurity Competition Draws More Than The Herald | HeraldOnline.com

ARLINGTON, Va., Nov. 6, 2013 — /PRNewswire-USNewswire/ — The Air Force Association announced today that CyberPatriot, the National Youth Cyber 
See all stories on this topic »
Cyber security breachHimalayan Times

BRUSSELS: Belgian authorities have opened an investigation into two possible hacking incidents at the office of Prime Minister Elio Di Rupo. The federal 
See all stories on this topic »
Cybersecurity framework and Google beats Northrop!FederalNewsRadio.com

In his latest report:”Cybersecurity Framework Leaves Issues Unresolved: BGOV Insight”, he’ll address what’s lacking and discuss whether the government 
See all stories on this topic »
New Preliminary Cybersecurity Framework Champions Risk The National Law Review

Last week, the National Institute of Standards and Technology officially released an initial draft of thecybersecurity framework and announced a 45-day open 
See all stories on this topic »
Lockheed Martin To Share Cyber Expertise At American Petroleum Wall Street Journal

The Lockheed Martin Commercial Cyber Security team will share their expertise at the eighth annual American Petroleum Institute Cyber Security conference.
See all stories on this topic »
Blogs 10 new results for cyber security
Is the Audit Committee Really the Secret Sauce for Cyber Security Elizabeth Ireland

A recent Federal Computer Week article suggests that in the private sector audit findings are effective at driving action, and that reports from Inspector generals 
The State of Security
CSET 2013 : Workshop on Cybersecurity Experimentation and Test

Overview CSET invites submissions on the science of cyber security evaluation, as well as experimentation, measurement, metrics, data, and simulations as 
WikiCFP
Lockheed Martin Helps Oil Firms Mitigate Cyber Security Risks Offshore Energy Today

Lockheed Martin Helps Oil Firms to Mitigate Cyber Security Risks. Years of experience protecting some of the world’s most sensitive information has led 
Offshore Energy Today
The EU Cybersecurity Directive Will Follow the US Framework | TMT James Stenger

The NIS Directive includes a layer that does not exist in the US Cybersecurity Framework because the EU consists of numerous Member States, each of which 
TMT Perspectives
World cybersecurity leaders call for cooperation | neurope.euacarling

MARTHA MENDOZA, AP National Writer and New Europe STANFORD, California (AP) — Governments and businesses spend $1 trillion a year for global 
Articles
Now’s your chance to influence smart grid cybersecurity standards

Smart Grid – The National Institute of Standards and Technology (NIST) has opened the first revisions of its cybersecurity guidelines for public comment.
SmartGridNews.com
Greatest threat to SG cyber security is FTs working here | The Real therealsingapore

I was a former IT security technician in Singapore. I am aware the purported Anonymous threat, which surfaced last week through a YouTube video. Most people 
The Real Singapore
Vulnerability Management for the Cloud the Focus of Veris Group Rachel Strain

SearchCloudProvider, an online news site for the cybersecurity industry, recently published Veris Group Principal Dave Svec’s and Associate Kyle Snavely’s 
Compliance Services | Cybersecurity Consulting | Veris Group
Invensys CISP Cyber SecurityCyber Security: 11 sure signs you’ve Doug Clifton

CISP Cyber SecurityCyber Security: 11 sure signs you’ve been hackedCISP Cyber Security.
CISP Cyber Security
Report: Chinese Cyber Espionage Operations Expanding | The Anthony M Freed

A draft of a congressional report produced by the U.S.-China Economic and Security Review Commission reveals China has been stepping up their clandestine 
The State of Security
Web 1 new result for cyber security
Cybersecurity framework and Google beats Northrop 

On this week’s Capital Impact show, Bloomberg Government analysts will examine NIST’s preliminarycybersecurity framework, and Google’s lobbying efforts.
www.federalnewsradio.com/…/Cybersecurity-framework-and-…

Comments Off on Latest chatter on Cybersecurity

Filed under Soft Skills