75
75
Mar 20, 2014
03/14
by
CSPAN2
tv
eye 75
favorite 0
quote 0
in charge of cybersecurity. she talked to us about how she hadn't used e-mail and in fact had and used media for over a decade not because she didn't think it was secure but because she just didn't think it was useful. for this supreme court justice who talked about how they hadn't gotten around to e-mail. that was a quote. they will will eventually but now again in the upcoming year they will decide cases that will lead to everything from net neutrality to the constitutionality of some of the nsa activities but in their own world they just haven't got around to it. this is an just an american problem. we saw the same thing in meetings with officials with china great written france uae. for example the lead civilian official of the cybersecurity czar in australia had never even heard of a critical technology in the space. the point is you have this gap among people with great responsibility. the result is that cybersecurity is an issue that is as crucial at a personal level to areas that you care about from your
in charge of cybersecurity. she talked to us about how she hadn't used e-mail and in fact had and used media for over a decade not because she didn't think it was secure but because she just didn't think it was useful. for this supreme court justice who talked about how they hadn't gotten around to e-mail. that was a quote. they will will eventually but now again in the upcoming year they will decide cases that will lead to everything from net neutrality to the constitutionality of some of the...
87
87
Mar 2, 2014
03/14
by
CSPAN2
tv
eye 87
favorite 0
quote 0
but cybersecurity. manning famously download the massive amount of information onto the cd marked lada gaga. it wasn't because his taste for lada gaga wasn't a protocol that in both cases you have an individual in the wide-ranging access in many ways they shouldn't have had. you have individuals given in some cases password by others and the like and then you have an anomalous amount of information being gathered. and in snowden's case he was doing the web crawler. and these things should pop up as something to look out for not just any military organization that if you are running a bakery giving individual wide-ranging access and then in the course of a job of the person in this role, they typically access these kind of finals and this kind of information why is this person said to me having that amount of times of the activity. maybe it's because they've been given a new assignment or something else is going on. what about and ask them. so, my broader point is that the basic of cybersecurity would ap
but cybersecurity. manning famously download the massive amount of information onto the cd marked lada gaga. it wasn't because his taste for lada gaga wasn't a protocol that in both cases you have an individual in the wide-ranging access in many ways they shouldn't have had. you have individuals given in some cases password by others and the like and then you have an anomalous amount of information being gathered. and in snowden's case he was doing the web crawler. and these things should pop...
121
121
Mar 2, 2014
03/14
by
CSPAN2
tv
eye 121
favorite 0
quote 0
the former secretary of homeland security is in charge of cybersecurity and she talked to us about ho-cybersecurityand so us about how she had used social media for over a decade. not because she didn't think it was secured, but because she just didn't think it was useful. with a supreme court justice who talked about how they had an yetman gotten around to e-mail. in the upcoming years it will decide cases that read from everything to net neutrality to the constitutionality of some of the nsa remedies. things that haven't yet gotten around. this problem is just not an american problem. we saw the same thing with meetings from officials from china, great britain, rants, the uae, the lead civilian official in the cybersecurity czar in ostrow that had never even heard of a critical technology. but if you have an in part of this, you had the gap among people with grave responsibility. and so the result is that cybersecurity is an issue that is as crucial as a personal level two areas that we care about from your bank account to your personal privacy to shaping the personal politics themselves. and in
the former secretary of homeland security is in charge of cybersecurity and she talked to us about ho-cybersecurityand so us about how she had used social media for over a decade. not because she didn't think it was secured, but because she just didn't think it was useful. with a supreme court justice who talked about how they had an yetman gotten around to e-mail. in the upcoming years it will decide cases that read from everything to net neutrality to the constitutionality of some of the nsa...
96
96
Mar 15, 2014
03/14
by
CSPAN2
tv
eye 96
favorite 0
quote 0
it's the same thing many cybersecurity -- in cybersecurity. despite all the of the attempts to complexify this space, to turn the fear factor up, you know, spinal tap volume style to frame it as something where you need a man on cyber horseback to come in and save you whether it's a man in uniform or a man in a cybersecurity company. the reality is that very basic steps of cyber hygiene would go an incredibly long way. for example, one study found that the simple measures, the top ten and top twenty controls would stop up to 94% of all cyber attacks. now, people respond to that and say, well, i'm really special. i'm in the 6%. the first is statistically we can't all be in the 6%. the second is talk to your i.t. department. if they didn't have to spend so much time running down the low level stuff, they could focus in on the high end stuff. finally, the reality is many of the toughest challenges, the most advanced threats still use very basic steps to get in that would be stopped by cyber hygiene. for example, the most important outside foreign
it's the same thing many cybersecurity -- in cybersecurity. despite all the of the attempts to complexify this space, to turn the fear factor up, you know, spinal tap volume style to frame it as something where you need a man on cyber horseback to come in and save you whether it's a man in uniform or a man in a cybersecurity company. the reality is that very basic steps of cyber hygiene would go an incredibly long way. for example, one study found that the simple measures, the top ten and top...
125
125
Mar 20, 2014
03/14
by
CSPAN2
tv
eye 125
favorite 0
quote 0
it's the same thing in cybersecurity. despite all of the attempts to complex of five this space, to turn the fear factor up, spinal tap volume style, to frame it as something we need a man on cyberfor spec to come and save you whether it's a man in uniform or a man and a cybersecurity company. the reality is that very basic steps of cyber hygiene would go an incredibly long way. for example one study found the simple measures that top 20 controls would stop up to 94% of all cyberattacks. people respond to that and sometimes they say i'm really special. i'm in the 6%. statistically we can't all be in the 6% in the second is to talk to your i.t. department. if they didn't have to spend so much time running down the low-level stuff they could focus in on the high-end stuff. finally the reality is many of the toughest challenges, but most dangerous threats use basic steps to get in to be stopped by cyber hygiene. for example the most important outside foreign spy agency penetration classified u.s. military networks happened w
it's the same thing in cybersecurity. despite all of the attempts to complex of five this space, to turn the fear factor up, spinal tap volume style, to frame it as something we need a man on cyberfor spec to come and save you whether it's a man in uniform or a man and a cybersecurity company. the reality is that very basic steps of cyber hygiene would go an incredibly long way. for example one study found the simple measures that top 20 controls would stop up to 94% of all cyberattacks. people...
98
98
Mar 5, 2014
03/14
by
CNBC
tv
eye 98
favorite 0
quote 0
i'm in cybersecurity. i'm in a very narrow niche of the computer business.s is the best time to be in our field in 30 years. >> it almost feels like companies can't keep up with the threats that are appearing. you invest $1 million in cybersecurity and suddenly there's a new threat you have absolutely no defense against. you have to keep on investing, keep on sinking more and more money. >> you do. >> almost like the perfect business model. >> i was joking, i will get in trouble for saying this, i was joking with robert in the green room before the show saying if i ran a cybersecurity business, i would just hire a bunch of eastern european hackers to bother eveçrybody, then i woul be like you need me. >> i think -- >> vertical integration. i'm obviously being sarcastic but can we ever, do you think, solve this problem or is this really going to be an issue forever, it will just evolve? >> we will never solve this problem because the attack vector keeps changing. currently there are about 2.6 billion people on the internet, about four billion i.p. addresses
i'm in cybersecurity. i'm in a very narrow niche of the computer business.s is the best time to be in our field in 30 years. >> it almost feels like companies can't keep up with the threats that are appearing. you invest $1 million in cybersecurity and suddenly there's a new threat you have absolutely no defense against. you have to keep on investing, keep on sinking more and more money. >> you do. >> almost like the perfect business model. >> i was joking, i will get in...
132
132
tv
eye 132
favorite 0
quote 1
maybe people with cybersecurity. speaking of informational lot of economic data coming out today, we just got the fed's latest beige book on economic conditions about our ago, melissa frances brought that to you. this month you can guess what they said, one word in particular made an appearance, 119 times. one word, 119 times. let's bring in peter barnes standing by in d.c.. i can't imagine what that word was. rich: the weather.weather, the weather. lot of comments about the bad weather in this latest beige book but despite the bad weather the beige book reported economic conditions continue to expand from january to early february with eight of 12 fed districts reporting improved levels of economic activity mostly on a modest moderate pace. this is a survey of economic conditions the fed will use at its next policy meeting in two weeks. at that meeting the fed will consider whether to continue to taper its billions in monthly quantitative easing bond purchases. the beige book says, quote, the outlook among most dist
maybe people with cybersecurity. speaking of informational lot of economic data coming out today, we just got the fed's latest beige book on economic conditions about our ago, melissa frances brought that to you. this month you can guess what they said, one word in particular made an appearance, 119 times. one word, 119 times. let's bring in peter barnes standing by in d.c.. i can't imagine what that word was. rich: the weather.weather, the weather. lot of comments about the bad weather in this...
144
144
tv
eye 144
favorite 0
quote 0
that is because cybersecurity is not a destination. its a journey. it is evolution.il: what do the bad guys want to do, michael? >> what theyave been doing, ey steal, exfiltratn of data. they take money. they take, intelctual capital. t only from terrorists this is nation states. these are criminals. so they're stealing things. they're implanting capabilities so they come back in, what they call back doors, trojan horses. things lie in wait until a computerized system until they receive an instruction,now move forward, execute this order. they're also taking information as you type. something known as key logging. you put a malware program on the syst downloads keystrokes, information you' putting out, e-mails. e things that you send to different people. they're snooping, they're stealing and potentially they're manipulating. and it is that last piece that is always the intersection betwn cybersecurity and physical surity. ne: i always worries what happened in the san jose, utility. shutting down our grid, is that the ultimate form of cyber terror? >> i think there i
that is because cybersecurity is not a destination. its a journey. it is evolution.il: what do the bad guys want to do, michael? >> what theyave been doing, ey steal, exfiltratn of data. they take money. they take, intelctual capital. t only from terrorists this is nation states. these are criminals. so they're stealing things. they're implanting capabilities so they come back in, what they call back doors, trojan horses. things lie in wait until a computerized system until they receive...
64
64
Mar 27, 2014
03/14
by
CSPAN2
tv
eye 64
favorite 0
quote 0
the fbi is leading the charge in cybersecurity and counterterrorism. and i certainly wish you the best of luck and if the chairman and ranking member have made clear we really want to work with you because we know the challenge. we want to make sure that you have the tools, the resources and the staffing to ensure that the job is done. following up on this cyberissue cyber criminals including hackers for practicing to be finding vulnerabilities in cybersecurity faster than we can protect against it. i can remember it very in depth briefing i had in new york city with ray kelly's team and it seems to me that every briefing and event happen and they were figuring out how to do it. the cybercriminals were way ahead and they were trying to catch up. they seem to be finding vulnerabilities in cybersecurity faster than we can protect against it. in terms of personnel how has the fbi prioritize the hiring of individuals for cybersecurity backgrounds and how does the fbi compete for the best and the brightest for the financial benefits of the air? >> it's a gr
the fbi is leading the charge in cybersecurity and counterterrorism. and i certainly wish you the best of luck and if the chairman and ranking member have made clear we really want to work with you because we know the challenge. we want to make sure that you have the tools, the resources and the staffing to ensure that the job is done. following up on this cyberissue cyber criminals including hackers for practicing to be finding vulnerabilities in cybersecurity faster than we can protect...
77
77
Mar 27, 2014
03/14
by
CSPAN
tv
eye 77
favorite 0
quote 0
we must change the cybersecurity culture. interprizes large and small, private, need to embrace information security governance as a core responsibility. approach needs to move forward now. without changes to the security osture for most important industries and infrastructure, cybercrimes will continue to and potency.ency the best path forward rests upon public-private ecosystem built upon good security governance, identities, and constant assessment of vulnerabilities. whether we drive adoption incentives or directives, we need to proceed now. i urge you, your colleagues, and the administration not to let 2014 expire without adoption of easures that will better protect our economy and secure pohls euro. thank you for the time this your attention to this important matter of cybersecurity. >> thank you very, very much. because of unusual circumstances, and with of the ranking member, the first question will from our side. >> thank you, i adore you, i the record, i adore both of you. i believe the ultimately the arket is more
we must change the cybersecurity culture. interprizes large and small, private, need to embrace information security governance as a core responsibility. approach needs to move forward now. without changes to the security osture for most important industries and infrastructure, cybercrimes will continue to and potency.ency the best path forward rests upon public-private ecosystem built upon good security governance, identities, and constant assessment of vulnerabilities. whether we drive...
82
82
Mar 15, 2014
03/14
by
CSPAN2
tv
eye 82
favorite 0
quote 0
one is the challenge of how do i report on this space on cybersecurity? there is an assumption it is this feels, into one little area, everything from the wall street beat to the china beach, cybersecurity woven into it. you can't tell the story out target is going to be in the next quarter to u.s./china relations without understanding these parts of it and the -- we have to demystify it. the second is by the way, journalists being targeted, being targeted because of what the report on and the information they have inside. famously in the book we examine the case where the new york times was hacked back to a chinese military unit that is right beside a massage parlor and a wine store. the point is they went after the new york times not because it was a traditional intellectual property. and times reporters, doing a story about corruption in the senior levels of chinese government. the second question was methodology. your methodology. your methodology has to involve the versification of sources and so you want -- you will notice for example, different nat
one is the challenge of how do i report on this space on cybersecurity? there is an assumption it is this feels, into one little area, everything from the wall street beat to the china beach, cybersecurity woven into it. you can't tell the story out target is going to be in the next quarter to u.s./china relations without understanding these parts of it and the -- we have to demystify it. the second is by the way, journalists being targeted, being targeted because of what the report on and the...
169
169
Mar 27, 2014
03/14
by
CSPAN2
tv
eye 169
favorite 0
quote 0
thanks for your time this afternoon and for your attention to this important matter of cybersecurity. >> thank you very, very much. because of the unusual circumstances and with the permission of my distinguished ranking member, the first question from our cycle come from senator mccaskill. >> thank you. i adore you. [laughter] i wanted it on the record. both of you. i adore both of you. [inaudible] >> i believe that ultimately the market is more effective at controlling behavior than the government. so let me start with a question that i don't think has fully been answered. mr. mulligan or ms. richey, or can any of you shed light on exactly how much fraud has resulted from this breach? >> are you speaking specifically to our britches because yes. to the target reach. >> i'll start. i can only speak to about 15% of the cards that were taken were target branded product cards. the other 85% are third parties that we don't have visibility. what i can tell you what we have seen, two of the card products, one is a branded debit card, the other is a proprietary card, a card that can only be
thanks for your time this afternoon and for your attention to this important matter of cybersecurity. >> thank you very, very much. because of the unusual circumstances and with the permission of my distinguished ranking member, the first question from our cycle come from senator mccaskill. >> thank you. i adore you. [laughter] i wanted it on the record. both of you. i adore both of you. [inaudible] >> i believe that ultimately the market is more effective at controlling...
181
181
Mar 27, 2014
03/14
by
CSPAN2
tv
eye 181
favorite 0
quote 0
in a private sector you can centralize cybersecurity. you cannot do that at university so we had to find the proper balance between security and access. and that is the challenge for all universities because as you know in the past four months, 50 universities have had major data breaches do not all of them even bother to report it. >> excellent testimony, and i thank you very much. mr. john mulligan as executive vice president and chief financial officer of the target corporation, we welcome you. >> that afternoon, chairman rockefeller, ranking member thune, and members of the committee. nine in the john mulligan and an executive vice president and chief financial officer of targeted it's a pleasure to be here with you today. target expense a data breach resulted from a criminal attack on our systems. let me begin by once again reiterating how deeply sorry we are for the impact this incident has had on our guests, your constituents. our top priority is always taken care of our guests. they should feel confident about shopping at target.
in a private sector you can centralize cybersecurity. you cannot do that at university so we had to find the proper balance between security and access. and that is the challenge for all universities because as you know in the past four months, 50 universities have had major data breaches do not all of them even bother to report it. >> excellent testimony, and i thank you very much. mr. john mulligan as executive vice president and chief financial officer of the target corporation, we...
97
97
Mar 20, 2014
03/14
by
CSPAN2
tv
eye 97
favorite 0
quote 0
singer talks about his recent book "cybersecurity and cyberwar" what everyone needs to know. mr. singer is a member of the state department's advisory committee on international communications and information policy and a contributing editor of popular science magazine. from the stevens institute of technology in hoboken new jersey, this is an hour. [applause] >> thank you. i want to thank the deans of stevens to helping to host this and to john in particular for both organizing it and the kind introduction. so i am old enough that i remember the very first time i ever saw and then used a computer. my dad took me to a science center in north carolina at the age of seven where he learned how to program this amazing device to design a smiley face out of a series of letter m's and then i printed out on one of those old-school principles with the perforated paper on the side that was my first experience with computers. since then the centrality of computers to my life but all our lives is it's almost impossible without them. for example we live in a world where every year over 40 tri
singer talks about his recent book "cybersecurity and cyberwar" what everyone needs to know. mr. singer is a member of the state department's advisory committee on international communications and information policy and a contributing editor of popular science magazine. from the stevens institute of technology in hoboken new jersey, this is an hour. [applause] >> thank you. i want to thank the deans of stevens to helping to host this and to john in particular for both organizing...
89
89
Mar 14, 2014
03/14
by
CSPAN2
tv
eye 89
favorite 0
quote 0
let me shift to the role of the national guard in cybersecurity. the the cybercom, commander general alexander wrigley talked about the national guard as a resource and the role that it could play in expanding our military cyber warfare and defense capabilities. do you agree with him and how has he defined a value of the national guard can bring to this effort? >> yes, sir, i do agree. at the present, the department is is in the process during the initial analysis right now to address that very question. if confirmed i will be a part of that process. i intend to dig deeper into because one of my takeaways after 30 months right now as a naval commander for general alexander in this hibernation set is that in the end this is about how to build an integrated team that harnesses the power and the expertise of every element? while the united states navy does not have a card structure, the reserve structure we use has been very effective for us. i've worked hard to try to plug in my cart role. >> frankly those members of the naval reserve or of the natio
let me shift to the role of the national guard in cybersecurity. the the cybercom, commander general alexander wrigley talked about the national guard as a resource and the role that it could play in expanding our military cyber warfare and defense capabilities. do you agree with him and how has he defined a value of the national guard can bring to this effort? >> yes, sir, i do agree. at the present, the department is is in the process during the initial analysis right now to address...
226
226
Mar 7, 2014
03/14
by
CNBC
tv
eye 226
favorite 0
quote 0
cybersecurity has never been more important. you know, the market's rewarding us for our success but we think there's a lot more to go and we're excited about the future. >> i mean, obviously viewers will notice that you're down 7% today. you have the announcement coming in to yesterday of a $1.1 billion additional stock placing. who is actually selling out at this stage and why? >> well, there's a couple reasons for it. number one we are raising some more capital, so 40% of this is all primary for our balance sheet. gives us $400 million or $500 million more for the balance sheet to expand it allows us to sell some secondary shares to basically increase the float in the market and get some continuity into our stock from a buying and selling point of view. and essentially create a floor and a base for us to move forward and grow the stock from here as well. >> i mean, do you feel the pressure now? obviously you spent, what was it, a billion dollars in stock and cash to buy mandiant, do uf feel the pressure to move rapidly ahead
cybersecurity has never been more important. you know, the market's rewarding us for our success but we think there's a lot more to go and we're excited about the future. >> i mean, obviously viewers will notice that you're down 7% today. you have the announcement coming in to yesterday of a $1.1 billion additional stock placing. who is actually selling out at this stage and why? >> well, there's a couple reasons for it. number one we are raising some more capital, so 40% of this is...
175
175
Mar 5, 2014
03/14
by
CNBC
tv
eye 175
favorite 0
quote 0
be meeting with the israeli prime minister benjamin netanyahu, the two are going to talk about cybersecuritytive energy and the drought here in california. i'm going to havp that story coming up for you in just a few minutes. back to you. >> josh, thank you very much. that is coming up. plus -- >> coming up, "power pitch." courting a $50 billion industry. this startup is about to walk their idea down the aisle. will our panelists say "i do"? >> are you in or are you out? >> stay tuned to find out. ...return on investment wall isn't a street... isn't the only return i'm looking forward to... for some, every dollar is earned with sweat, sacrifice, courage. which is why usaa is honored to help our members with everything from investing for retirement to saving for college. our commitment to current and former military members and their families is without equal. a short word that's a tall order. up your game. up the ante. and if you stumble, you get back up. up isn't easy, and we ought to know. we're in the business of up. everyday delta flies a quarter of million people while investing billion
be meeting with the israeli prime minister benjamin netanyahu, the two are going to talk about cybersecuritytive energy and the drought here in california. i'm going to havp that story coming up for you in just a few minutes. back to you. >> josh, thank you very much. that is coming up. plus -- >> coming up, "power pitch." courting a $50 billion industry. this startup is about to walk their idea down the aisle. will our panelists say "i do"? >> are you in...
50
50
Mar 30, 2014
03/14
by
CSPAN2
tv
eye 50
favorite 0
quote 0
calm blacks as they is a political aspect of our military, where the real challenge in the same cybersecurity is not a cheater that agility that agility is compromised by a traditional wave this security cycle is worth. if you think about traditional military systems, yours, tanks, various weapons, when are we going to get to a point where providing cyberassistance to countries being attacked by more powerful countries that are not just a physical neighbors adversaries many comments over. >> what should we do? they are trying, organizing to cyberattacks at western targets. are they serious target? is there some digital strategy? i don't know, but that needs to be in the conversation. >> foreign fighters across the globe to fight in the civil war is the area on one side or the other. by the way, a third of those are coming from europe benefit of those from europe and it really is a global problem. what had never seen until series of missions are not coming to fight the physical work. they literally send software engineers to fight on behalf of the army and sometimes physically, sometimes fight
calm blacks as they is a political aspect of our military, where the real challenge in the same cybersecurity is not a cheater that agility that agility is compromised by a traditional wave this security cycle is worth. if you think about traditional military systems, yours, tanks, various weapons, when are we going to get to a point where providing cyberassistance to countries being attacked by more powerful countries that are not just a physical neighbors adversaries many comments over....
61
61
Mar 20, 2014
03/14
by
CSPAN2
tv
eye 61
favorite 0
quote 0
and later, cybersecurity and cyberwar, what everyone needs to know. >> on the next washington "washington journal", our guest was formally within nato national security force to achieve correspondent for yahoo! news joins us to discuss how american presidents have reached out to other world leaders during times of crisis. and we will focus on janet yellen's plans at the federal reserve. with a chief economics correspondent for the "the wall street journal." "washington journal" is live on c-span everyday at 7:00 a.m. eastern. join the conversation on facebook and twitter. >> eric schmidt lays out his vision of the future in which everyone is digitally connected. this event was at the computer history museum in mountain view, california, earlier this month. [applause] >> my good friend and mentor and colleague eric schmidt is here. today we are talking about the new digital age and the future of the world. >> i keep running into lean and within google. >> we are excited. eric was the first person who hired me in silicon valley when many people wouldn't. >> it worked out well for you. you'v
and later, cybersecurity and cyberwar, what everyone needs to know. >> on the next washington "washington journal", our guest was formally within nato national security force to achieve correspondent for yahoo! news joins us to discuss how american presidents have reached out to other world leaders during times of crisis. and we will focus on janet yellen's plans at the federal reserve. with a chief economics correspondent for the "the wall street journal."...
83
83
Mar 10, 2014
03/14
by
CSPAN2
tv
eye 83
favorite 0
quote 0
of the military we have a challenge in the sense that cybersecurity isn't achieved without a agility and agility is compromised by the traditional ways the procurement cycles work. third is if you think about the traditional military assistance, helicopters, tanks, various weapons when are we going to get to the point of providing the cyber assistance to the countries being attacked by the more powerful countries that are not just their visible. >> what should we do about the electronics? >> they try to do the cyber attacks against western targets. is there a military strategy or digital strategy? i don't know but that needs to be in the conversation. in the civil war and interior on one side or the other. by the way a third of those are coming from europe and a third of those it is a global problem. what's interesting and what's new but i've never seen before is the russians are sending the foreign fighters into serious except they aren't coming to fight the war they're sending software engineers to fight on behalf of the electronic army and sometimes they are sending them physicall
of the military we have a challenge in the sense that cybersecurity isn't achieved without a agility and agility is compromised by the traditional ways the procurement cycles work. third is if you think about the traditional military assistance, helicopters, tanks, various weapons when are we going to get to the point of providing the cyber assistance to the countries being attacked by the more powerful countries that are not just their visible. >> what should we do about the electronics?...
45
45
Mar 26, 2014
03/14
by
KCSM
tv
eye 45
favorite 0
quote 0
this invitation was in the summit's decide if we talk about this so it seems the resolution of cybersecurity issues secondly covers the issue of nonproliferation of nuclear materials for the year the burden of proof in the room with them though families that nuclear control should be strengthened in all directions. ever since position is simple and clear iaea should strengthen the monitoring including control of nuclear waste at the same time the aim was to actively use the persuasive measures are the two countries compliance with all the rules and adopted conventions as experts predict that the ukrainian issue was discussed at the summit alongside the anti nuclear topics numerous bilateral negotiations which are held in the fourth out of the rivalry the two days included discussion of the situation in ukraine the kazakh leader devices comics to cool down and then a lofty rhetoric and seek peaceful ways of resolving the situation was much too mature for her. rumors of a book to show things that happened happened and is concerned spring as well as the state to cool down and then the lofty rhe
this invitation was in the summit's decide if we talk about this so it seems the resolution of cybersecurity issues secondly covers the issue of nonproliferation of nuclear materials for the year the burden of proof in the room with them though families that nuclear control should be strengthened in all directions. ever since position is simple and clear iaea should strengthen the monitoring including control of nuclear waste at the same time the aim was to actively use the persuasive measures...
94
94
Mar 11, 2014
03/14
by
KCSM
tv
eye 94
favorite 0
quote 0
agreement to foster more cooperation between israel and california in addition to working together and cybersecurity the two agreed to focus on alternative energy and water conservation and agriculture train between israel and california topped four million dollars in two thousand and thirteen. yet not busy busy in the agreement with california's governor will help ensure that the money to any ideas keep flowing quincy mass dance for j and wine lausanne to last the hundreds of city and tilted up in any and all is to connect party and in refugee camps across let them a lot of vaccination complaint would be supported by a number of incidents light and space and the lebanese health ministry medical experts they are always in the party i thought a risk which was eradicated in syria in valentino into fallen recently reappeared instead too many children across the country. keystone eighteen countries participate in serious civil war been accused of taking the deceased to the war torn country. serious health care system that in one corner was up to see new sculptures of scum that can separate store to sell
agreement to foster more cooperation between israel and california in addition to working together and cybersecurity the two agreed to focus on alternative energy and water conservation and agriculture train between israel and california topped four million dollars in two thousand and thirteen. yet not busy busy in the agreement with california's governor will help ensure that the money to any ideas keep flowing quincy mass dance for j and wine lausanne to last the hundreds of city and tilted...
51
51
Mar 27, 2014
03/14
by
CSPAN2
tv
eye 51
favorite 0
quote 0
yearly security conferences and a grid exercise which tests and prepares industry on physical and cybersecurity event. yet former ferc chairman willinghoff was quoted in the washington journal calling the incident the most significant incident involving domestic terrorism involving a grid that has ever occurred. mr. president, in my view comments such as these are sensational. depending on the topic they can be reckless. although the topic of security warrants discussion and debate, we have to be prudent about information for the public's fear. many government leaders are privy to confidential and sensitive information that if not treated carefully could provide a road map to terrorists about our vulnerabilities. at a minimum, at a minimum government officials have a duty to safeguard information that they learn in their official capacity. a story that appeared in the "wall street journal" on march 13 was, i believe, shocking because it included sensitive information about the nation's energy infrastructure that the newspaper said came from documents that were created at ferc. and although the
yearly security conferences and a grid exercise which tests and prepares industry on physical and cybersecurity event. yet former ferc chairman willinghoff was quoted in the washington journal calling the incident the most significant incident involving domestic terrorism involving a grid that has ever occurred. mr. president, in my view comments such as these are sensational. depending on the topic they can be reckless. although the topic of security warrants discussion and debate, we have to...
166
166
Mar 4, 2014
03/14
by
CSPAN
tv
eye 166
favorite 0
quote 0
-israel collaboration on cybersecurity, expand u.s.-israel energy cooperation and reaffirm our commitment to israeli missile defense programs which have saved many innocent lives such as the iron dome. so i urge my colleagues to support h.r. 938 and i reserve the balance of my time. the speaker pro tempore: the gentleman reserves the balance of his time. the gentleman from california is recognized. mr. royce: thank you, mr. speaker. i yield three minutes to the gentlelady from florida, ms. ros-lehtinen, the chairman emeritus and middle east subcommittee chair of the committee on foreign affairs and of course the author of this bill. the speaker pro tempore: the gentlelady from florida voiced for three minutes. ms. ros-lehtinen: thank you so much, mr. chairman. mr. speaker, congressman ted deutch and introduced the united states-israel strategic partnership act because we're committed to the security of our friend and ally in an increasingly volatile middle east. chairman royce and ranking member engel have been instrumental in getting
-israel collaboration on cybersecurity, expand u.s.-israel energy cooperation and reaffirm our commitment to israeli missile defense programs which have saved many innocent lives such as the iron dome. so i urge my colleagues to support h.r. 938 and i reserve the balance of my time. the speaker pro tempore: the gentleman reserves the balance of his time. the gentleman from california is recognized. mr. royce: thank you, mr. speaker. i yield three minutes to the gentlelady from florida, ms....
85
85
Mar 20, 2014
03/14
by
CSPAN2
tv
eye 85
favorite 0
quote 0
is we talk about the military-industrial complex and we have a real challenge in the sense that cybersecurity is not achieved without agility. what are we going to get to a point when providing cyberassistance to countries that are being attacked by countries that are not just a physical neighbors but advocates, this is critical. >> so what should we do about upcoming? >> they are trying to organize against western targets. is there a military strategy there, i don't know, but that needs to be in the conversation. >> is interesting is what the russians you have this one fighter problem and 15,000 that are coming in the civil war in syria in one side or the other. in the third upcoming from this as well. so it really is a global problem and they are sending this and sending software engineers to come fight on behalf of ovitz. electronic army. sometimes they are fighting from this as well. >> presumably from iran? >> just. >> so kudos to the economy. one of the things that happens with the advent of this technology and efficiency is a real crisis over the world particularly for the youth. and w
is we talk about the military-industrial complex and we have a real challenge in the sense that cybersecurity is not achieved without agility. what are we going to get to a point when providing cyberassistance to countries that are being attacked by countries that are not just a physical neighbors but advocates, this is critical. >> so what should we do about upcoming? >> they are trying to organize against western targets. is there a military strategy there, i don't know, but that...
206
206
Mar 13, 2014
03/14
by
FOXNEWSW
tv
eye 206
favorite 0
quote 0
and now computers have been add on it to, so now not only the physical threat but the cybersecurity threat the industry is concerned about. >> note to self, boy a generator. nice to see you. >> more or the malaysian air flight. we're getting new information and the response to claims that some passengers' cell phones were still ringing days after the plane vanished. a chinese text messaging service says they're phones are active. it's been nearly a week and nothing of the jet. details ahead. so i can reach ally bank 24/7, but there are no branches? 24/7. i'm sorry, i'm just really reluctant to try new things. really? what's wrong with trying new things? look! mommy's new vacuum! (cat screech) you feel that in your muscles? i do... drink water. it's a long story. well, not having branches let's us give you great rates and service. i'd like that. a new way to bank. a better way to save. ally bank. your money needs an ally. >> israel conducting air strikes on the gaza, part of the heaviest fighting between the israeli and militants for a year. fighters launched more rockets toward the south o
and now computers have been add on it to, so now not only the physical threat but the cybersecurity threat the industry is concerned about. >> note to self, boy a generator. nice to see you. >> more or the malaysian air flight. we're getting new information and the response to claims that some passengers' cell phones were still ringing days after the plane vanished. a chinese text messaging service says they're phones are active. it's been nearly a week and nothing of the jet....
227
227
Mar 5, 2014
03/14
by
KTVU
tv
eye 227
favorite 0
quote 0
they include water conservation, alternative energy, cybersecurity, education and agricultural technology. >> there are more engineers per capita than there are in the u.s. and japan. how does that work? it's not a surprise there are a lot of dotcom s and pharmaceutical companies that come out. new app companies that google just bought? i think it's a sharing of the minds between israel and the state of california and clearly governor brown thought why not really capitalize on this relationship? >> reporter: after meeting with brown, the prime minister plans to stop at apple and have a meeting with the what's app founder who recently sold his company to facebook for $19 billion. today's meeting will begin at 10:30 a.m. peaceful activists are expected to protest the agreement with brown. they call the prime minister a where criminal because of his policies regarding palestine and they are upset that california is doing business with israel. we've not seen any signs of protesters out here yet. that could change in the next hour. we'll be out here to update you on the situation. janine de la
they include water conservation, alternative energy, cybersecurity, education and agricultural technology. >> there are more engineers per capita than there are in the u.s. and japan. how does that work? it's not a surprise there are a lot of dotcom s and pharmaceutical companies that come out. new app companies that google just bought? i think it's a sharing of the minds between israel and the state of california and clearly governor brown thought why not really capitalize on this...
187
187
Mar 6, 2014
03/14
by
KTVU
tv
eye 187
favorite 0
quote 0
for sharing research and information on new technologies and issues such as renewable energy, cybersecurity water conservation. the governor's office reports that last year trade between israel and california totalled more than $4 billion. >>> crime prevention and the economy are expected to be central themes tonight in oakland mayor jean quan's fate of the stay address. it will focus on bolstering the police department to ensure public safety. also new initiatives aimed at bringing jobs to neighborhoods with high unemployment rates. she says the economy and public safety go hand in hand. the speech is set for 7:00 tonight at oakland city hall. >>> time is 7:39. hillary clinton talking about the crisis in ukraine using her experience as secretary of state to speculate about the motives of russian president vladimir putin. >> as for president putin, i know we are dealing with a tough guy with a thin skin. i have had a lot of experience, well, not only with him, but people like that. but in particular president putin. and i know that his political vision is of a greater russia. >> now, clinto
for sharing research and information on new technologies and issues such as renewable energy, cybersecurity water conservation. the governor's office reports that last year trade between israel and california totalled more than $4 billion. >>> crime prevention and the economy are expected to be central themes tonight in oakland mayor jean quan's fate of the stay address. it will focus on bolstering the police department to ensure public safety. also new initiatives aimed at bringing...
204
204
Mar 14, 2014
03/14
by
FBC
tv
eye 204
favorite 0
quote 0
from pyramid schemes to bitcoin to breaking down the latest on the gm scandal and cybersecurity, "countdowng bell" covered it all. here's what's worth with repeating. ♪ ♪ >> definition of security that you and i care about based on what you just said is broad. it's devices, it's the day that -- data that you have on the device and your privacy, your identity. the protection of your family, all those other things as we share more of our lives online, we're more at risk. so how do we protect ourselves? in the consumer space, there isn't an easy answer today, and we're going to fix it. >> it's only a currency in name only. when we look at this, this is clearly a virtual commodity. if you think about virtual currencies, they're mined, they're actually processed, they're stored, they're resold on the market and they also actually have great scarcity, and bitcoin itself is hoarded. >> we want to know what was discussed and why it took so long, until february of 2014, before gm finally recalled the car. right now there's a lot of loose ends, and we're not sure how much nhtsa really followed throug
from pyramid schemes to bitcoin to breaking down the latest on the gm scandal and cybersecurity, "countdowng bell" covered it all. here's what's worth with repeating. ♪ ♪ >> definition of security that you and i care about based on what you just said is broad. it's devices, it's the day that -- data that you have on the device and your privacy, your identity. the protection of your family, all those other things as we share more of our lives online, we're more at risk. so...
221
221
Mar 10, 2014
03/14
by
FBC
tv
eye 221
favorite 0
quote 0
he said, that is why the u.s., we're failing in cybersecurity because we're not targeting where we need be targeting. we're doing this mass surveillance of grandma's phone call to her grandson. who cares. that is our problem he is saying. >> right. they brought up the boston bomber, how they had information from the fbi, from russia and they failed on that. instead they're collecting all of this information. on top of collecting the information, it making us more vulnerable because we have all the info and now everybody else wants it. i haven't seen that, we haven't seen those attacks either but it is interesting. cheryl: just saying that the spoke and again we apologize for our viewers for the bad video but that is what everybody got to see. that what we all got. tamara, thank you very much. adam: bill ackman is making a one billion dollar bet that herbalife will fail. now he is taking his fight against the company from wall street to capitol hill. charlie gasparino talks exclusively to secures law expert john coffey next. cheryl: coming up in the west coast minute. facebook brings bac
he said, that is why the u.s., we're failing in cybersecurity because we're not targeting where we need be targeting. we're doing this mass surveillance of grandma's phone call to her grandson. who cares. that is our problem he is saying. >> right. they brought up the boston bomber, how they had information from the fbi, from russia and they failed on that. instead they're collecting all of this information. on top of collecting the information, it making us more vulnerable because we...
71
71
Mar 5, 2014
03/14
by
KNTV
tv
eye 71
favorite 0
quote 0
talk alternative energy, cybersecurity and biotech. agreement continues longstanding tradition of agreements between california and israeli leaders. california agreement will give israeli companies access to california's innovation hubs or ihubs, innovation network includes 16 clusters of tech incubators, research parks, universities and federal laboratories. as you can imagine, security will be tight here computer history museum. mr. netanyahu showed a softer side, asking if he was at the oscars. the prime minister was on hand for the premiere of a documentary that features mr. netanyahu. >> i found it's so important to do this because experience has shown that this can break up israeli tourism and it's brought it up in other countries and i'm sure it will do the sam here. >> reporter: what his schedule looks like for the prime minister in the silicon valley, signing the agreement here at history museum. mr. netanyahu will make a stop at apple headquarters in cupertino, and meet with the co-founder of whatsapp a jewish ukrainian immig
talk alternative energy, cybersecurity and biotech. agreement continues longstanding tradition of agreements between california and israeli leaders. california agreement will give israeli companies access to california's innovation hubs or ihubs, innovation network includes 16 clusters of tech incubators, research parks, universities and federal laboratories. as you can imagine, security will be tight here computer history museum. mr. netanyahu showed a softer side, asking if he was at the...
189
189
Mar 21, 2014
03/14
by
FBC
tv
eye 189
favorite 0
quote 0
here to talk about it, cybersecurity expert, a ethical hacker and charlie gasparino and tom sullivan. what i love about the story is the mock outrage on part of the tech ceos. you have the nsa has a venture fund where they invested in companies to partner, to do this surveillance, to go in, right? >> absolutely. i think it is mostly a charade right now. melissa: on both sides? >> on both sides they have the legalese and wording of the specific justification that gave the nsa access to that data. and from the company's side, i think that they're starting to realize that they might have thought that data was not, you know, very big in terms of privacy violations but, in the context of collecting all that data from different companies, pro providers, nsa can build a really good profile on people. melissa: charlie you have a keen nose for bs. do you have a smell of bs at this meeting. >> these are all his supporters. melissa: that's a great point. >> eric schmidt is great obama supporter. zuckerberg holds fund-raisers in facebook offices for the president. to say we need a big meeting to
here to talk about it, cybersecurity expert, a ethical hacker and charlie gasparino and tom sullivan. what i love about the story is the mock outrage on part of the tech ceos. you have the nsa has a venture fund where they invested in companies to partner, to do this surveillance, to go in, right? >> absolutely. i think it is mostly a charade right now. melissa: on both sides? >> on both sides they have the legalese and wording of the specific justification that gave the nsa access...
163
163
tv
eye 163
favorite 0
quote 0
>> if it is a hacker problem is a question of cybersecurity.t just for bitcoin but all our institutions. we regulate all need to have appropriate safeguards in place to deal with packers. melissa: your deposits are insured so that is why i ask the question do you need some protection? >> insurance may ultimately be a way to go but also just having a regulatory framework, having a regulator on premises who knows what you are doing, what your systems are like. with mount gox is not clear they were wiped out because of a hack and. is a much larger -- mel melissa: the whole thing is not having a regulator involved. it goes against the fundamental idea of having this untraceable currency not controlled by the government. now you think there's a way to have a regulator involved? >> bitcoin was started in a very innovative initial phase where you did see a lack of regulation and real libertarian bent they didn't want regulation but wanted to stay away from the government. we are moving to an era where everyone is realizing if bitcoin is to move to the
>> if it is a hacker problem is a question of cybersecurity.t just for bitcoin but all our institutions. we regulate all need to have appropriate safeguards in place to deal with packers. melissa: your deposits are insured so that is why i ask the question do you need some protection? >> insurance may ultimately be a way to go but also just having a regulatory framework, having a regulator on premises who knows what you are doing, what your systems are like. with mount gox is not...
160
160
Mar 14, 2014
03/14
by
FBC
tv
eye 160
favorite 0
quote 1
about, i have to ask this about everybody that has new technology, are you worried about security, cybersecurity putting full listings out there. full real estate brokers names. is that a concern in a venture like this? even larger companies, zillows and trulia have had problems with attacks. >> well of course, security is always a concern but we make the best efforts we're able to to protect the confidential information but the reality of it is, that data is out there and data is no longer the value proposition for real estate agents. and so it is our mission to make that data available to consumers for the serious homebuyers. zillow and trulia are great for browsing properties and so forth. but if you're a serious homebuyer you want to work with a company like nuhabitat. cheryl: do you think zillow and trulia are distorting prices? do you think they're giving, trying to sell, give me a false sense of what i can get on the market for my property? is that happening? >> actually it is the opposite. what's happening, they use, frequently use tax roll data to create their estimates of value. those
about, i have to ask this about everybody that has new technology, are you worried about security, cybersecurity putting full listings out there. full real estate brokers names. is that a concern in a venture like this? even larger companies, zillows and trulia have had problems with attacks. >> well of course, security is always a concern but we make the best efforts we're able to to protect the confidential information but the reality of it is, that data is out there and data is no...
108
108
Mar 3, 2014
03/14
by
CSPAN2
tv
eye 108
favorite 0
quote 0
cybersecurity, you're going to hear a lot about cybersecurity. i think the chances of more data breaches this year are 100%. there will be more. there are probably more as we're sitting here this morning. but i think chances of a bill are pretty dim. so, you get that, you get the sense that everywhere you look, the legislative agenda is looking pretty meager. i don't totally rule out a bill that cantor and others are talking about to give tax incentives to companies that hire and train young workers. there could be something like that. but i think that there is not going to be a lot. one final thing i wanted to throw out, just a theme of mine that i have been talking about for the last, i don't know, two or three months. that frankly leaves me puzzled. can't quite figure this one out. here we have economy that grew in the second half by 3.5%, diane? something like that. we had a 3 1/2% gdp rise and it was not all inventory accumulation. we saw real improvement on trade, and many areas looked really good. here we see a budget deficit falling sharp
cybersecurity, you're going to hear a lot about cybersecurity. i think the chances of more data breaches this year are 100%. there will be more. there are probably more as we're sitting here this morning. but i think chances of a bill are pretty dim. so, you get that, you get the sense that everywhere you look, the legislative agenda is looking pretty meager. i don't totally rule out a bill that cantor and others are talking about to give tax incentives to companies that hire and train young...
135
135
Mar 20, 2014
03/14
by
MSNBCW
tv
eye 135
favorite 0
quote 0
i want to put up what nbc -- cybersecurity experts said that was extremely, extremely farfetched, knowing what we know about airplane, it's very unlikely. your thoughts? >> yeah. i think that's pretty much accepted in the industry. boeing came out with a service bullet and a warning to operators that hacking could occur onboard, but it, you know, it would at worst be limited to something like the flight management computer, which ultimately can be overridden by the pilot. if a flight crew sees the plane is doing something completely out of the ordinary, then they would just take over the aircraft. >> right. and it's almost -- when i hear about it, to some degree, the discussion or interest in hacking or one sort of silver bullet explanation go to part of the human psychology of this, which is people want a reason. if there's some simple or external reason, that somehow feels more satisfying than what we have on our hands, which obviously is a pretty complicated mystery still at this point and still has families and many others conc n concerned about it. appreciate it. >>. co-ing up, what
i want to put up what nbc -- cybersecurity experts said that was extremely, extremely farfetched, knowing what we know about airplane, it's very unlikely. your thoughts? >> yeah. i think that's pretty much accepted in the industry. boeing came out with a service bullet and a warning to operators that hacking could occur onboard, but it, you know, it would at worst be limited to something like the flight management computer, which ultimately can be overridden by the pilot. if a flight crew...
66
66
Mar 21, 2014
03/14
by
CSPAN
tv
eye 66
favorite 0
quote 0
stein meyer has proposed a kind after cybersecurity summit or conference or dialogue and i think more than ttip or these far off ideas we need something in the nearer term that really addresses these issues. because young people in europe need reminding of what, of what the transatlantic -- the most successful at liance in human history. what it has achieved, what it means and why it's important in light of what president putin has done today. has done of late. there needs to be finally, i think, some real focus on just helping ukraine out right now. the country is in financial chaos. and there needs, there needs to be a program of assistance and it needs to be coherent. and for that the united states and europe must work together. john kornblum who is sitting right here, reminded me of a breakfast that when the president went to berlin last year he made a speech in which he mentioned the european union not once, not once. and you know, this is noted and so there's a lot of work to be done, not only in redressing the u.s.-eu relationship but this whole sense that the united states und
stein meyer has proposed a kind after cybersecurity summit or conference or dialogue and i think more than ttip or these far off ideas we need something in the nearer term that really addresses these issues. because young people in europe need reminding of what, of what the transatlantic -- the most successful at liance in human history. what it has achieved, what it means and why it's important in light of what president putin has done today. has done of late. there needs to be finally, i...
72
72
Mar 5, 2014
03/14
by
KNTV
tv
eye 72
favorite 0
quote 0
he'll talk alternative energy, cybersecurity, biotech.ement will give israeli companies access to california's innovation hubs or ihubs, innovation network includes 16 clusters of tech encue baiters, research parks, federal laboratories. security will be tight here at computer history museum. while in los angeles, mr. netanyahu spoke yesterday at the premiere of a documentary that features mr. netanyahu. >> i thought it was so important to do this because experience has shown that this can bring up israeli tourism and it's brought it up in other countries and imsure it will do the same here. >> reporter: part of the prime minister's schedule. today in the silicon valley the prime minister will be signing that agreement at the history museum. mr. netanyahu make a stop at apple headquarters in cupertino and meet with the co-founder of whatsapp, sold his company to facebook for $19 billion. security will be tight here at computer history museum. getting past the security will be our own scott budman to bring us the latest tonight at 5:00 and
he'll talk alternative energy, cybersecurity, biotech.ement will give israeli companies access to california's innovation hubs or ihubs, innovation network includes 16 clusters of tech encue baiters, research parks, federal laboratories. security will be tight here at computer history museum. while in los angeles, mr. netanyahu spoke yesterday at the premiere of a documentary that features mr. netanyahu. >> i thought it was so important to do this because experience has shown that this...
111
111
Mar 28, 2014
03/14
by
CNBC
tv
eye 111
favorite 0
quote 0
we really like cybersecurity about five years from now.h huge data breaches in the public eye, for example, target, that kind of weighs on public confidence. we are looking at companies like check point software. government is in land, air, sea and space and the public made it clear they are not afcomfortabl with the government being involved in cyber. that gives room for public companies to move into that space. >> got you. one other sector to talk about quickly, 3d printing. also momentum driven. what's your outlook on 3d, some of the big names in 3d printing? >> definitely. 3d printing has been a huge industry we have seen tons of growth and major momentum stock on cnbc every day, you guys talk about it. going forward, again, i would like to see those earnings catch up. not investing in them right now, but you know, in the future, this is where we want to be. >> got you. >> this is the future with g.e. and all these other companies moving to 3d printing. >> alex, anthony, thank you so much for your views. mandy, scott, this is the futur
we really like cybersecurity about five years from now.h huge data breaches in the public eye, for example, target, that kind of weighs on public confidence. we are looking at companies like check point software. government is in land, air, sea and space and the public made it clear they are not afcomfortabl with the government being involved in cyber. that gives room for public companies to move into that space. >> got you. one other sector to talk about quickly, 3d printing. also...