English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

NSAccess Control Lists

Roel
Kaspersky Lab Expert
Posted August 13, 20:31  GMT
Tags: Conferences, DDoS, Cyber weapon, Cyber espionage
0
 

Last week, I attended the International Conference on Cyber Security at Fordham University in NYC. This event brought together participants from government, the private sector and academia. The closing session was a panel featuring the directors of the CIA, FBI and NSA which drew a lot of attention.

FBI Director Robert Mueller speaking at the closing panel

Throughout the conference, there was a strong push for more cooperation internationally and between different sectors. While cooperation has come a long way, we still have a long way to go.

The topic of cyber-espionage didn't come up as much as I've been used to in recent times. Instead, there was more talk on cyber-sabotage with several presentations talking about this problem.

Some talks centered on disruptive attacks - i.e. DDoS. However both General Alexander and Sean Kanuck, National Intelligence Officer for Cyber Issues, also touched on destructive attacks. Their main concern was around data-wiping/altering malware such as Shamoon. We've been vocal about the potential of this type of attack and I'm glad this is being recognized by government.

General Alexander also announced that 90% of his network admins will be replaced by automation of some sort. It's a move that makes a lot of sense. However, the more important part of the announcement is getting improved access controls to classified information to better prevent data leakage.

Data integrity and access controls are on the minds of the US government. It should be on yours too.


1 comments

yotis

2013 Sep 09, 14:21
0
 

Interesting

"General Alexander also announced that 90% of his network admins will be replaced by automation of some sort."
And who will control those automated tasks?
There will always be a leak point if you break the chain of trust.
Speaking of trust, I fully agree that international cooperation goes a long way, but again it's based on trust. In the light of current released documents, this trust is at very low levels.

Reply    
If you would like to comment on this article you must first
login


Bookmark and Share
Share

Analysis

Blog