BayPay Forum BayPay Forum

Menu

  • Home
  • Events
    • Past Events
  • News
    • Payments News
    • Crypto News
    • Fintech News
    • Retail News
    • Fraud News
    • Regulation News
    • Security News
    • Markets News
  • Our Podcasts
    • Our Weekly Podcast
    • Our Daily Podcast
  • Join Us
  • Login
BayPay Forum BayPay Forum
  • Home
  • Events
    • Past Events
  • News
    • Payments News
    • Crypto News
    • Fintech News
    • Retail News
    • Fraud News
    • Regulation News
    • Security News
    • Markets News
  • Our Podcasts
    • Our Weekly Podcast
    • Our Daily Podcast
  • Join Us
  • Login

Cybersecurity Commission Includes Former Heads of NSA, NIST

Details
Category: Security News
31 December 1969

Cybersecurity , Risk Management

Obama Also Names MasterCard CEO to Group Working on Strategies Eric Chabrow (GovInfoSecurity) • April 14, 2016     Cybersecurity Commission Includes Former Heads of NSA, NISTEx-NSA Director Keith Alexander, left, joins the Commission on Enhancing National Cybersecurity.

Keith Alexander, former National Security Agency director, and Patrick Gallagher, who once headed the National Institute of Standards and Technology, will join Ajay Banga, chief executive of MasterCard, on the new Commission on Enhancing National Cybersecurity.

See Also: Unlocking Software Innovation with Secure Data as a Service

The commission's members, appointed by President Obama, also include Tom Donilon, the former White House national security adviser, who was previously announced as chairman, and Samuel Palmisano, IBM's former leader, who is vice chairman.

Alexander, who also served as commander of the U.S. Cyber Command, is CEO of IronNet, a cybersecurity consultancy he founded in 2014. Gallagher left NIST in 2014 to become chancellor and chief executive of the University of Pittsburgh.

The commission, which holds its first meeting this week, has a Dec. 1 deadline to produce a report that will advise Obama and the next president on steps the government and private sector can take over the next 10 years to improve cybersecurity.

Other Commission Members

Other members of the commission named April 13 by President Obama include:

Annie Antón, professor and chair of the School of Interactive Computing at the Georgia Institute of Technology; Steven Chabinsky, general counsel and chief risk officer at security provider CrowdStrike and former deputy assistant director of the FBI's cyber division and chief of the FBI's cyber intelligence section; Peter Lee, corporate vice president at Microsoft Research; Herbert Lin, senior research scholar for cyber policy and security at the Center for International Security and Cooperation and a research fellow at the Hoover Institution, both at Stanford University; Heather Murren, private investor and member of the board of trustees of the Johns Hopkins University and the Johns Hopkins University Applied Physics Laboratory; Joe Sullivan, chief security officer at Uber and former CSO at Facebook and assistant U.S. attorney for computer hacking; and Maggie Wilderotter, former CEO and executive chairman at Frontier Communications.

The Republican and Democratic leaders of the House and Senate were invited to recommend one commission member each, according to the executive order establishing the commission. The White House did not disclose which of the 12 commission members, if any, were suggested by lawmakers.

Cybersecurity National Action Plan

The commission is part of the administration's Cybersecurity National Action Plan, which Obama said would require the government and business to collaborate "for the next five years, 10 years, 20 years, so that we can make sure that we get the benefits of the internet and utilization, and not the dangers and threats.

"They're going to be thinking about everything from how do we keep the huge databases that exist in the federal government more secure, to how do we more effectively work with critical sectors of our economy, whether it's the financial sector or our critical infrastructure, like utilities, to make sure their systems are more secure," Obama said.

President Obama discusses the Cybersecurity National Action Plan on Feb. 9.

The Department of Commerce's NIST will provide support to the commission. Commerce Secretary Penny Pritzker says involvement of public- and private-sector leaders would provide the perspectives of business, the tech sector, IT security, national security and law enforcement to address the nation's cybersecurity challenges.

"As the owners and operators of much of the infrastructure and digital networks that represent the backbone of the 21st century economy, the private sector is our indispensable partner in protecting the networks that are so essential to commerce, public safety and national security," Pritzker says.

Original link

Data Security Risk: A CISO's Perspective

Details
Category: Security News
31 December 1969

Cybersecurity , Data Loss , Governance

Data Security Risk: A CISO's Perspective Presented by Informatica     60 Minutes     Data Security Risk: A CISO's PerspectiveProtecting sensitive information is especially difficult for corporations that have data stores scattered in physical, virtual and cloud-based repositories across the globe. Not only do these multinational organizations need to protect their data from countless threat actors, they must contend with exploding data growth and constantly changing, oftentimes contradictory privacy regulations in the countries where they do business. This session will cover key topics for data and security professional in 2016, including: CISO Perspective on Data Security Risk The Intersection of Data Security Risk and Data Management Create a 360-degree view of your data security risks Deliver on-demand intelligence for prioritization, audit and governance Never-ending threats, exploding data growth and privacy regulations challenge IT and security responsible for thousands of data stores scattered across the globe. Therefore, a data security framework is mandatory to protect your data across international regions. But in order to construct this framework, you need visibility into all your data and its attendant risk. This webinar, hosted Bill Burns, CISO at Informatica, and featuring Josh Alpern, vice president, strategic business development, data security at Informatica and David Loshin president of consultancy Knowledge Integrity, will teach you how to gain visibility, control and understanding of your sensitive data and the financial impact of keeping it safe. Register for this webinar and learn the why and how of devising an effective global data risk and security framework. This informative session will also highlight how you can: Understand data proliferation (AKA the "data monster") Create a 360-degree view of your data risks Deliver on-demand intelligence for audit and governance programs Eliminate costly and error-prone manual efforts in securing your data You might also be interested in … Old IT Project Raises New Concerns for 1,400 Organizations Old IT Project Raises New Concerns for 1,400 Organizations
Cybersecurity Commission Includes Former Heads of NSA, NIST
Cybersecurity Commission Includes Former Heads of NSA, NIST
Are Two Bank Breaches Related?
Are Two Bank Breaches Related?
Strategies to Tackle New Age Cybercrime
Strategies to Tackle New Age Cybercrime
Ransomware: Is It Ever OK to Pay?
Ransomware: Is It Ever OK to Pay?
Badlock is Bad - But Could Be Worse
Badlock is Bad - But Could Be Worse
IRS Chief: Agency Faces Loss of Key InfoSec Personnel
IRS Chief: Agency Faces Loss of Key InfoSec Personnel
Proactively Protect Against Healthcare Data Breaches
Proactively Protect Against Healthcare Data Breaches
White House Proposes $3 Billion Fund to Modernize Federal IT
White House Proposes $3 Billion Fund to Modernize Federal IT
Original link

EMV Rolled Out and Liability Shifted: Restaurant Fraud Emerged from the Shadows

Details
Category: Security News
31 December 1969

In Development

Receive Invite When Available

Original link

If Data Has No Value, Its Theft Is Pointless

Details
Category: Security News
31 December 1969

In Development

Receive Invite When Available

Original link

Breach Response Planning: Hammer Out Your Legal, Business and Technology Differences, Before a Breach

Details
Category: Security News
31 December 1969

In Development

Receive Invite When Available

Original link

More Articles …

  1. Why Decryption Legislation Is a Bad Idea
  2. FBI's Zero-Day iPhone Hack: Many Questions
  3. P.F. Chang's Ruling: Is the Tide Shifting?
  4. Drug Fraud Scheme Includes Criminal HIPAA Violations
  • 3408
  • 3409
  • 3410
  • 3411
  • 3412
  • 3413
  • 3414
  • 3415
  • 3416
  • 3417

Page 3413 of 3546