Documente Academic
Documente Profesional
Documente Cultură
Lt. Gen. Charlie Croom (Ret.) VP Cyber Security, Lockheed Martin Jeff Brown, CISO/Director IT Infrastructure, Raytheon Eric Guerrino, SVP/CIO, bank of New York/Mellon Financial Pradeep Khosla, Dean Carnegie Mellon School of Computer Sciences Joe Buonomo, President, DCR Bruno Mahlmann, VP Cyber Security, Dell Linda Meeks, VP CISO Boeing Corporation Justin Somaini, CISO Symantec
ISA seeks to integrate advancements in technology with pragmatic business needs and enlightened public policy to create a sustainable system of cyber security.
More Differences
The Internet was created by man tightly organized by man reliant on man made standards practices and technologies Other domains are ruled by government entities, the Internet is primarily governed by the private sector Cyber crime is currently a big business with national security implications
Roach Motel: Bugs Get In Not Out No way to stop determined intruders Stop them from getting back out (w/data) by disrupting attackers command and control back out of our networks Identify web sites and IP addresses used to communicate w/malicious code Cut down on the dwell time in the network Dont stop attacksmake them less useful
ANSI-ISA Program
Outlines an enterprise wide process to attack cyber security broadly and economically CFO strategies HR strategies Legal/compliance strategies Operations/technology strategies Communications strategies Risk Management/insurance strategies
Summary
Internet may not be best analyzed as global commons The private sector will need to be more engaged in cyber defense than ever before demanding a unique partnership Economics will be as important as technology Different questions yield different answers