Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Nine Takeaways From the White House Cyber-security Summit

    By
    Chris Preimesberger
    -
    February 17, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Nine Takeaways From the White House Cyber-security Summit

      1 - Nine Takeaways From the White House Cyber-security Summit

      by Chris Preimesberger

      2Terrorist Threats Rocketing Up Since 2009

      2 - Terrorist Threats Rocketing Up Since 2009

      President Obama said in his remarks Feb. 13 that cyber-security-related terrorist threats to governments and companies have increased fivefold since 2009. He specifically mentioned the Sony Pictures hack of last fall. He also noted that more than 100 million businesses and individuals were hit by online-related fraud or theft in 2014 alone. “No company has ever said they worked too hard to protect their systems and customers,” Obama said.

      3Network of Industry ‘Hubs’ to Share Security Information

      3 - Network of Industry 'Hubs' to Share Security Information

      The president’s executive order of Feb. 13 identifies best practices and standards for what constitutes optimal information-sharing units within vertical industries, and measures the effectiveness of communication. These units, called hubs, are designed to create industry-driven, cyber-security information-sharing networks before breaches happen, so when intruders do hit one of the members, faster reaction and containment can take place. Some of these hubs are already in operation.

      4Institutionalized Information Sharing Will ‘Keep Us in the Game’

      4 - Institutionalized Information Sharing Will 'Keep Us in the Game'

      J. Michael Daniel, cyber-security coordinator at the White House, told eWEEK: “We’re not going to solve all of the really sophisticated actors or defeat all the advanced persistent threats just by increasing information sharing. But we have seen industries that have increased their information sharing—such as in the financial services industry—and that does make a meaningful difference in being able to cut out a lot of the low-level attacks and intrusions. When you do that, then you can focus your humans on the more sophisticated intruders. I see this as a sort of baseline for us just to stay in the game.”

      5Fortinet CEO: Industry is ‘Extremely Short-Handed’

      5 - Fortinet CEO: Industry is 'Extremely Short-Handed'

      Ken Xie, CEO of Fortinet and a summit panelist, told eWEEK: “The biggest obstacle is that our industry is extremely short-handed: It’s estimated we can only fulfill one in every 20 technology positions needed in the cyber-security space. Who will mitigate the threat? Where and who are the cyber-SWAT teams? Who will train the responders? These questions remain unanswered.”

      6Cyber-security: A National Public Safety Issue

      6 - Cyber-security: A National Public Safety Issue

      Phil Smith, Trustwave senior vice president of government solutions and special investigations, said during a panel discussion that “cyber-security is a national security and public safety issue. Sharing threat intelligence across government agencies, law enforcement and the private sector is a critical component of strengthening data protection; however, it will not work without safe harbor protections for companies that participate.” However, Smith said, an executive order can only go so far. “It takes congressional action to mandate information sharing on a national level that includes liability protection,” he said.

      7Privacy, Security and Business Interests All Intersect

      7 - Privacy, Security and Business Interests All Intersect

      Ryan Gillis, vice president of government affairs and policy at Palo Alto Networks and a former White House cyber-security official, told eWEEK: “The way that privacy, security and business interests all interact and mutually reinforce each other—that’s something that’s been missing in the messaging around information sharing in the legislative debates over the last few years. Too often, it’s been [stated] that privacy is at odds with security in business. When you better protect your networks, better protecting me as a consumer and an individual, and as a company that’s better protecting my customers, I have a better relationship because I’m not issuing data breach notifications to them that we’ve lost your Social Security number [to a hacker].”

      8Obama: Cyber-world is the ‘Wild, Wild West’

      8 - Obama: Cyber-world is the 'Wild, Wild West'

      “The cyber-world is sort of the wild, wild West, and to some degree, we’re asked to be the sheriff,” Obama said. “When something like Sony [data breach] happens, people want to know, ‘What can government do about this?’ When information is being shared by terrorists, people want us to find ways of stopping that from happening. By necessity, that means government can use its own significant capabilities in the cyber-world. But then, people plainly ask: ‘What safeguards do we have around government intruding on our own personal privacy?’ It’s hard. Government has to be continuously self-critical, and we need to continue to have an open debate on this.”

      9Feb. 13: Just the Latest Executive Order on Cyber-security

      9 - Feb. 13: Just the Latest Executive Order on Cyber-security

      Previously, the president has signed directives involving improving critical infrastructure cyber-security, critical infrastructure security and resilience, and some federal policies in the cyber-security area, but no president has issued an order directing all sectors to share and share alike when it comes to finding out information about national and international bad actors in cyber-security.

      10Tim Cook Talks Up Apple Pay as Safe Transactioning

      10 - Tim Cook Talks Up Apple Pay as Safe Transactioning

      Apple CEO Tim Cook, speaking before the president, explained that his company “will never sell our customers’ information to anybody.” He said that the new Apple Pay system, which was introduced last fall and enables iPhone users to conduct point-of-sale transactions without involving an exchange of personal information over the Internet, is “a huge improvement over a little plastic card with a magnetic stripe that we currently use.” Apple doesn’t store a user’s credit card number or purchase history, he said, adding that information is between a person and his/her bank.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.