When organizations were implementing systems, security was an afterthought… now after couple of decades we are talking of implementing the cybersecurity framework in which privacy and civil liberties is kind of after thought as it shows up in an appendix by itself. It could also be that it is so important, that we do not want another BAH contractor breach a.k.a NSA .. which could have been avoided if the cybersecurity Framework were in place.
Four step Cybersecurity process
Step 1. Cyber Hygiene a.k.a awareness – Train and educate your intangible assets – PEOPLE
Step 2. Cyber Process a.k.a Business – Know and document details of your Business – PROCESSES
Step 3 Cyber Policies a.k.a Regulation ( compliance) – Is you Business in compliance – POLICIES
Step 4 Cyber Products a.k.a Technologies – Using technology to solve business issues – PRODUCTS
At every step, identify the risk and a risk mitigation strategy ….
Today marked the first day of the 5 Cybersecurity Framework Webcast:
North Carolina State University will host a live webcast of the morning sessions. The webcast will be made available for playback after the event.
Draft Agenda (Nov. 8, 2013)
Cybersecurity Framework website:
|News||10 new results for cyber security|
|Cybersecurity and Counter-Terrorism Expert Richard Clarke …MarketWatch
Richard Clarke – former Cybersecurity Czar and National Coordinator for Security, … and governments on cybersecurity and counterterrorism, Clarke will present …
|Cyber security roundtableThe Advocate
The MHCC cyber security division hosted a roundtable discussion on emergency management on Tuesday as part of its “Cyber Security Speaker Series.”.
|Lockheed Martin—Cybersecurity Is A Cool Career For Girls (STEM)SatNews Publishers
[SatNews] University of Maryland College Park will welcome more than 350 middle school students at the Cool Careers in Cybersecurity for Girls Workshop …
|Cyber security expert Melissa Hathaway warns governments invest …ABC Online
A former cyber security advisor to President Barack Obama and George W Bush is warning computer hackers are becoming more sophisticated and pose an …
|Hanover handles UK cybersecurity for MicrosoftPRWeek
LONDON: Hanover is putting together a policy roundtable on cybersecurity for Microsoft after securing all of its UK public affairs business earlier this year.
|Chertoff Says US Disengaging Won’t Ease Cybersecurity RisksBusinessweek
Michael Chertoff, who was Homeland Security secretary under President George W. Bush, provides his outlook for the cybersecurity industry in the Nov. 18 issue …
|Websense Security Labs Reveals Eight Cybersecurity Predictions …Broadway World
SAN DIEGO, Nov. 14, 2013 /PRNewswire/ This year, cybersecurity took center stage with nation-state attacks, numerous high-profile data breaches and …
|Cyber security laws hailedPeninsula On-line
SINGAPORE: Experts said Singapore’s cyber security laws are robust, especially after amendments to the Computer Misuse Act in 2013. Still, they caution that …
|Tenable Network Security Named a Deloitte 2013 Technology Fast …Fort Mills Times
COLUMBIA, Md. — Tenable Network Security today announced it was named a Deloitte Technology Fast 500™ Award Winner for 2013, and was included on a …
|Experts propose better cybersecurity information-sharing modelsTechTarget
BOSTON — Better cybersecurity information sharing has long been a priority for the security industry, but significant hurdles have always halted the progress of …
|Blogs||9 new results for cyber security|
|Cybersecurity Legislation Gets Renewed Push From Financial Firms …Ryan Tracy
Top financial-industry lobbyists pressed senators to move forward with cybersecurity legislation, part of an effort to re-energize a campaign that has lost steam …
|Bridging the Cyber Security Skills Gap | IBM Curiosity ShopIBM Curiosity Shop
With cyber security threats growing in number, complexity, and scale each year, future IT security and business leaders need a broader range of skills than ever …
|Purdue Cybersecurity Experts Assist In Cyber Attack Drill | News …Network Indiana
A nationwide cyber attack drill is underway, testing how the power grid could be compromised and Purdue Cyber Forensics members are involved.
|Authorities investigating cybersecurity incidents targeting …Dissent
U.S. authorities are investigating a series of cybersecurity incidents targeting the HealthCare.gov website at the center of President Obama’s healthcare law, …
|Steve Daines Questions Cybersecurity Official About Risks in …Jon King
Today, November 13, Montana Congressman Steve Daines questioned Roberta Stempfley, the Assistant Secretary of the Department of.
|Uncertainty over UR cybersecurity | Campus TimesMatt Shinseki
Student life, from loans and job applications to Facebook posts and Amazon purchases, has increasingly moved online. But with the rise of the Internet, a new …
|Summary of Cyber Security Awareness Seminar, Lahore University …DRF_Admin
The second Cyber Security Awareness Seminar was held at LUMS in collaboration with the Cyber Security Task Force and the Pakistan Information Security …
|Webinar series on cyber–security for journalists offered© 2011 SpyGhana.com, All rights reserved.
The webinar series, offered by the National Press Foundation, consists of three courses: “Protecting Information,” “Protecting Whistleblowers and Other Sources” …
|We All Need This: Invincea Launches Small Business Offering To …FedCyberTeam
Lack of access to advanced security technology common to larger enterprises makes … In addition, organized cyber-crime now targets small business financial …