40
40
Sep 16, 2014
09/14
by
CSPAN3
tv
eye 40
favorite 0
quote 0
about medical device cybersecurity. and i'm sure you're familiar with it in that -- and we've been approached about this. what i want do is put a shameless plug in for this opportunity for all of you to participate in a public style forum. it will be come out through the federal register and that's about all i can say right few until this comes out. but the question for all of you is with regard to fostering innovation, what are some of the ways that you can perhaps allow a regulator, like such as myself, to foster that innovation. what are some -- what are some tidbits that you could perhaps offer me. i'm in a unique position in that the companies i regulate are even more weary of sharing their technology. because not only are they worried about my inadvertent sharing it with their competitors, they worry that if they were to share something about a vulnerability to me, i might turn around and say, this is ground for regulatory action. >> clarity. right? that's where it has to start, in what is the outcomes you're tryi
about medical device cybersecurity. and i'm sure you're familiar with it in that -- and we've been approached about this. what i want do is put a shameless plug in for this opportunity for all of you to participate in a public style forum. it will be come out through the federal register and that's about all i can say right few until this comes out. but the question for all of you is with regard to fostering innovation, what are some of the ways that you can perhaps allow a regulator, like such...
61
61
Sep 11, 2014
09/14
by
CSPAN2
tv
eye 61
favorite 0
quote 0
october is national cybersecurity awareness month. we focus on enhancing the resilience of this nation against cyberthreats november's critical infrastructure security and resilience month. all three of these are key mission areas for the department and all require daily collaboration with our stakeholders in the private sector and government at all levels. growing cyber threats are an increasing risk to critical infrastructure, to our economy, and to our national security. dhs uses cybersecurity information to reduce risk, to detect and block cyberattacks on federal civilian agencies, to help critical infrastructure entities improve their own protection and also to use the information that we developed collaboratively to protect their customers. we maintain a trusted environment for the private sector partners to collaborate on cybersecurity threats and trends. this trust is based in large part on our commitment to privacy, civil rights and civil liberties across all information-sharing programs with a particular emphasis on safeguar
october is national cybersecurity awareness month. we focus on enhancing the resilience of this nation against cyberthreats november's critical infrastructure security and resilience month. all three of these are key mission areas for the department and all require daily collaboration with our stakeholders in the private sector and government at all levels. growing cyber threats are an increasing risk to critical infrastructure, to our economy, and to our national security. dhs uses...
63
63
Sep 2, 2014
09/14
by
CSPAN2
tv
eye 63
favorite 0
quote 0
from a cybersecurity standpoint we have been doing a lot of work in the cybersecurity arena for information technology. so the pccf at your desk and the servers that in your server rooms, the cloud, the internet. a lot of effort has been spent, a lot of time spent working on the best procedures and practices and techniques and controls for securing that infrastructure. how good it's going is a whole nother story but it's been a lot of effort in that respect. operational technologies are more of those control systems or systems that manipulate physical things. as i mentioned the lanes of traffic that go back and forth, industrial controls out in refineries and chemical plants, train control systems as i've mentioned. what's unique and different about these systems is that first off the control physical things so if they go awry, or so we were able to control them and set them up in a way that could be detrimental or harmful to personnel, to physical assets, to the environment, these are the things we want to pay attention to. and, unfortunately, there really is very little with respect -- th
from a cybersecurity standpoint we have been doing a lot of work in the cybersecurity arena for information technology. so the pccf at your desk and the servers that in your server rooms, the cloud, the internet. a lot of effort has been spent, a lot of time spent working on the best procedures and practices and techniques and controls for securing that infrastructure. how good it's going is a whole nother story but it's been a lot of effort in that respect. operational technologies are more of...
31
31
Sep 16, 2014
09/14
by
CSPAN2
tv
eye 31
favorite 0
quote 0
and i wrote an op-ed yesterday about cybersecurity legislation. there is bipartisan support right now for cybersecurity legislation. i was pleased the house homeland security committee on a bipartisan basis, led by mike mccall and ben thompson, got a bell through the entire house. there's activity in the senate, homeland security committee, tom carper, tomkoburn, are interested in advancing legislation, the senate intelligence commitee, dianne feinstein, saxby champ bliss, interested in advancing this. so we have opportunity to codify dhs's authority, to codify the private sector's authority in freedom to share information with the government. i'm interested in enhancing my hiring capability, to bring in more cybersecurity talent i can steal a. from finance services sector. and so we have a lot of work to do without doubt. information sharing of best practices is one of the keys to that. >> host: your comment on legislation anticipated my next question. at the time of the financial crisis, the federal reserve and the treasury found they did not ha
and i wrote an op-ed yesterday about cybersecurity legislation. there is bipartisan support right now for cybersecurity legislation. i was pleased the house homeland security committee on a bipartisan basis, led by mike mccall and ben thompson, got a bell through the entire house. there's activity in the senate, homeland security committee, tom carper, tomkoburn, are interested in advancing legislation, the senate intelligence commitee, dianne feinstein, saxby champ bliss, interested in...
140
140
Sep 11, 2014
09/14
by
CSPAN2
tv
eye 140
favorite 0
quote 0
both the house and the senate have made real progress on cybersecurity legislation. i would like to personally thank this committee for all of its hard work that has ensured progress on this front on a bipartisan basis. but we are not over the finish line yet. as secretary johnson wrote today there are areas of legislation was strong consensus codifying the cybersecurity responsibilities of the department of homeland security, making it easier for dhs and the private sector to work together to mitigate cyberrelated former abilities and enhancing the department's ability to recruit and attain that essential cybersecurity workforce. these authorities are vital to ensuring that the department has the tools it needs to carry out its mission on behalf of the nation. what celebrations continue on other elements of cybersecurity legislation we should not wait to pass bipartisan and broadly supported bills. you have come so far and the threat is so great. i urge congress to pass what it can now even as we continue to work hard on remaining provisions. let me close by emphasi
both the house and the senate have made real progress on cybersecurity legislation. i would like to personally thank this committee for all of its hard work that has ensured progress on this front on a bipartisan basis. but we are not over the finish line yet. as secretary johnson wrote today there are areas of legislation was strong consensus codifying the cybersecurity responsibilities of the department of homeland security, making it easier for dhs and the private sector to work together to...
59
59
tv
eye 59
favorite 0
quote 0
where should cybersecurity be on that list?y think it's an important element, and like any investment particularly in the public market, the investor is entitled to understand the risks associated with invest anything that company. whether it's future forecast of sales or manufacturing risks or what have you. and i think cybersecurity is one of those risks that is certainly at the top of the list. and unfortunately, it has not been as transparent to get that information as it should have. liz: how do you find it out then if it's not out there, if it's not in their annual report? >> well, i think really this is an area that should be a focus for investors and also for board members. there needs to be more transparency in the dollars that are invested in security. and it's one thing to say that we built firewalls and we added data centers and all of that stuff. it's another thing to actually disclose the amount of investment dollars that went into security. that will give you a clear cut understanding whether the company is payin
where should cybersecurity be on that list?y think it's an important element, and like any investment particularly in the public market, the investor is entitled to understand the risks associated with invest anything that company. whether it's future forecast of sales or manufacturing risks or what have you. and i think cybersecurity is one of those risks that is certainly at the top of the list. and unfortunately, it has not been as transparent to get that information as it should have. liz:...
61
61
Sep 10, 2014
09/14
by
CSPAN3
tv
eye 61
favorite 0
quote 0
and i'm going to amplify a bit with regard to the threat to cybersecurity.to discuss the actions that we are taking with our critical infrastructure partners to understand and address these threats, both physical and cyber, through information sharing and capability building. first, however, i also want to note as we approach this 13th anniversary of the attacks of 9/11, three efforts that we have under way to heighten public vigilance and public awareness. this month, september is national preparedness month, october is national cybersecurity awareness month, of this nation against cyberthreats, and november is critical infrastructure security and resilience month. all three of these are key mission areas for the department and all require daily collaboration with our stakeholders in the private sector and government at all levels. growing cyberthreats are an increasing risk to critical infrastructure, to our committee and to our national security. dhs uses cybersecurity information to reduce risk, to detect and block cyberattacks on federal civilian agenci
and i'm going to amplify a bit with regard to the threat to cybersecurity.to discuss the actions that we are taking with our critical infrastructure partners to understand and address these threats, both physical and cyber, through information sharing and capability building. first, however, i also want to note as we approach this 13th anniversary of the attacks of 9/11, three efforts that we have under way to heighten public vigilance and public awareness. this month, september is national...
83
83
Sep 2, 2014
09/14
by
CSPAN2
tv
eye 83
favorite 0
quote 0
and the real purpose is not to solve cybersecurity. there are always going to be cyber actors who invest a ton of money and build capabilities, but you really want to begin to narrow the risk profile. when the window may have been opened this wide, some of the efforts need the narrow that, perhaps chase away some of the actors because the task is not as ease acitizen it was -- easy as it was once before. one of the sad realities at this point is the means of intrusion is often powerfully simple. it's sending a phishing e-mail that asks you to click on a link, introduces a virus into your computer, and often these e-mails have indicators that if you spent 15 seconds, you'd see there's something odd about this. i don't want get a communication like this from my boss, i've never gotten an e-mail from my boss saying read this washington post article. this e-mail is close to ours, but it's a little different. and one of the emphasis points we place on our industry, and we've got physical securities that convene monthly and cyber committees
and the real purpose is not to solve cybersecurity. there are always going to be cyber actors who invest a ton of money and build capabilities, but you really want to begin to narrow the risk profile. when the window may have been opened this wide, some of the efforts need the narrow that, perhaps chase away some of the actors because the task is not as ease acitizen it was -- easy as it was once before. one of the sad realities at this point is the means of intrusion is often powerfully...
102
102
Sep 17, 2014
09/14
by
FBC
tv
eye 102
favorite 0
quote 0
the government is ramp up spending on cybersecurity.tment of defense allocating half a billion, 447 million to fight the growing threat. who stand to profit? with three under the radar plays, jeff reeves, investorplace.com editor here in new york. good to see you my friend. first of all i know this is visa and mastercard put out the warnings. i'm surprised american express isn't included there. my impression is they are a lot better at cybersecurity than visa or mastercard. is that a right or wrong impression? into it could be. even if they're better, they're spending a heck of a lot more money and they have a expensive system they put in place. as investor i think opportunity is not just from hacking. remember there is always threats out there that we don't even see. so there is a lot of companies out there really good at this. if we don't see it doesn't mean you can't make money off it. liz: there are a lot of obvious companies and the under the radar names which you have done the digging for us. we want to know why you picked these n
the government is ramp up spending on cybersecurity.tment of defense allocating half a billion, 447 million to fight the growing threat. who stand to profit? with three under the radar plays, jeff reeves, investorplace.com editor here in new york. good to see you my friend. first of all i know this is visa and mastercard put out the warnings. i'm surprised american express isn't included there. my impression is they are a lot better at cybersecurity than visa or mastercard. is that a right or...
114
114
Sep 25, 2014
09/14
by
FOXNEWSW
tv
eye 114
favorite 0
quote 0
>> we hope so but the government recently appointed a cybersecurity czar, which the response walk basst have any sign irsecurity experience but i don't need that to run the job. disagree. we have to have folk that understand security. that's a major threat we face. not having boots on the ground,ñ company -- countries can launch information warfare and we have to defend against that and we're not prepared. >> i want to thank you both very much. we have rick santorum, former presidential candidate, what we're going to hear. he is bidding his friend and confidante goodbye. you argue not a happy run. right? >> i'm very happy to see this day come one. it had come a lot sooner. this is an attorney general who in my mind, has o'hill politicized the office far beyond any previous attorney general, who ignored his obligation to enforce the law, has decided whether he wants to enforce the law or not based on his own political agenda. this has been a very divisive attorney general, not someone who i think will go down as someone who stood by the letter of the law in tough situations. >> senator,
>> we hope so but the government recently appointed a cybersecurity czar, which the response walk basst have any sign irsecurity experience but i don't need that to run the job. disagree. we have to have folk that understand security. that's a major threat we face. not having boots on the ground,ñ company -- countries can launch information warfare and we have to defend against that and we're not prepared. >> i want to thank you both very much. we have rick santorum, former...
169
169
tv
eye 169
favorite 0
quote 0
we will talk to one analyst who will give his take from the cybersecurity perspective.d home depot of the better to prevent this breach and our other companies lagging behind when it comes to cybersecurity? is information save? is business save? patrick peterson will be joining me to talk about that and the latest from jeff flock in the big trucks he is showing in the next hour. melissa: the new aluminum f 150 in addition to the watch. got to make more money to buy this stuff. thank you so much. i want to tell you the apple smart watched 349 they are going to miss the crucial holiday season. that is a big deal. analysts are going to react to that coming of nick stand youtube taking the stage. we will tell you about that partnership. how much was paid for this video? how the gossage site probably had to reach deep into its pockets to get ahold of this controversial footage. they made a business of and a lot of money. more money, more apple coming up. whenwork with equity experts who work with regional experts who work with portfolio management experts that's when experti
we will talk to one analyst who will give his take from the cybersecurity perspective.d home depot of the better to prevent this breach and our other companies lagging behind when it comes to cybersecurity? is information save? is business save? patrick peterson will be joining me to talk about that and the latest from jeff flock in the big trucks he is showing in the next hour. melissa: the new aluminum f 150 in addition to the watch. got to make more money to buy this stuff. thank you so...
48
48
Sep 16, 2014
09/14
by
CSPAN3
tv
eye 48
favorite 0
quote 0
and she is the dhs, deputy assistant secretary for cybersecurity strategy. and what that means is she works to minimize network disruptions in the government, the private sector, so that government, the economy and society can keep on going. and that also means she focuses and spends a lot of time on securing the dot gov domain. then we have barry west a long-term public servant. he is now the chief information officer. and part of that job involves securing some very sensitive business information about pension benefits in the private sector. he's also worked at dhs and he served as a cio at the commerce department and at various other agencies. i should also mention that bobby used to work at disa which is the i.t. wing of the defense department. so with that, i'll let each of you go into your roles more in-depth and talk about the role you play in forward-looking cyber initiatives to tie this back to our topic today as well. would you like to go first? >> sure. >> so there's a long time belief in labs in general, and with me personally, that there really
and she is the dhs, deputy assistant secretary for cybersecurity strategy. and what that means is she works to minimize network disruptions in the government, the private sector, so that government, the economy and society can keep on going. and that also means she focuses and spends a lot of time on securing the dot gov domain. then we have barry west a long-term public servant. he is now the chief information officer. and part of that job involves securing some very sensitive business...
55
55
Sep 5, 2014
09/14
by
BLOOMBERG
tv
eye 55
favorite 0
quote 0
michael riley covers cybersecurity and helped break news about the breach and we have ken, who has done research on the black market. michael, i will start with you, what new information do we have now about the jp morgan hack attack and this network of computers for hire around the world? >> what investigators are doing now trying to retrace the steps of the hackers. this is a complicated process because hackers take a lot of effort to hide their identity. in this case, they took over computers all over the world in brazil and asia, and used that first-level of computers to hide their steps. the way you do this, you extract data and the computers bounce the data to their ultimate destination. what investigators have done to trace those steps and they all lead back to a city in russia, which increases the possibility this is a russian-connected hack. if you get to a subservers back in russia, where will the trail lead after that. that is the next set of questions. >> does it mean that the owners of these computers they didn't know they were being used in a hack attack? is that possible?
michael riley covers cybersecurity and helped break news about the breach and we have ken, who has done research on the black market. michael, i will start with you, what new information do we have now about the jp morgan hack attack and this network of computers for hire around the world? >> what investigators are doing now trying to retrace the steps of the hackers. this is a complicated process because hackers take a lot of effort to hide their identity. in this case, they took over...
55
55
Sep 19, 2014
09/14
by
CSPAN2
tv
eye 55
favorite 0
quote 0
sure organizations are working together effectively and cybersecurity. we both have a role with other regions he is. one of our challenges is to make sure what you refer to doesn't happen because that doesn't do any good for the american people, for a government, for the taxpayers so we have committed to setting the example at the top and still a bad example in the rank-and-file in our leadership. and cybersecurity we get together received late to talk about what is our framework, are we getting it right? are we having any turf battles? so all three of us and i think i speak for our respective organizations and communities are committed to working together. it does depend a lot on the personalities at the top committing to work together. the last thing i will say is your comments about dhs. and the nine months i have been in office, i have seen the advantage of having the components within my department together in one conference. when we were dealing with the situation in the southwest border this summer in the rio grande valley, i could put together my
sure organizations are working together effectively and cybersecurity. we both have a role with other regions he is. one of our challenges is to make sure what you refer to doesn't happen because that doesn't do any good for the american people, for a government, for the taxpayers so we have committed to setting the example at the top and still a bad example in the rank-and-file in our leadership. and cybersecurity we get together received late to talk about what is our framework, are we...
40
40
Sep 18, 2014
09/14
by
CSPAN
tv
eye 40
favorite 0
quote 0
we both have a role in cybersecurity, along with other agencies. and so one of our challenges is to make sure that what you refer to doesn't happen because that doesn't do any good for the american people for our government, for the taxpayers to see us engaged in turf wars. so we have committed to setting the example at the top and instilling that example in the rank and file in our leadership. so on cybersecurity, for example, we get together routinely to talk about what is our framework, are we getting it right, are we having any turf battles? so all three of us i think, and i think i speak for our respective organizations and our respective communities are committed to working together. i think it does depend a lot on the personalities at the top committing to work together. the last thing i'll say is your comment about d.h.s., in the nine months i've been in office, i have seen the advantage of having the components within my department together in one conference table. when we were dealing with the situation in the southwest border this summer
we both have a role in cybersecurity, along with other agencies. and so one of our challenges is to make sure that what you refer to doesn't happen because that doesn't do any good for the american people for our government, for the taxpayers to see us engaged in turf wars. so we have committed to setting the example at the top and instilling that example in the rank and file in our leadership. so on cybersecurity, for example, we get together routinely to talk about what is our framework, are...
71
71
Sep 21, 2014
09/14
by
CSPAN
tv
eye 71
favorite 0
quote 0
we both have a role in cybersecurity. along with other agencies. so one of our challenges is to make sure that what you refer to doesn't happen, because that doesn't do any good for the american people, for our government, for the taxpayers to see you engaged in turf wars. we have committed to setting the example at the top and instilling that example in the rank and file in our leadership. on cybersecurity, for example, we get together routinely to talk about what is our framework. are we getting it right? are we having any turf battles? all three of us, i think, i think i speak for our respective organizations and communities, are committed to working together. i think it does depend a lot on the personalities at the top. committing to work together. the last thing i'll say is your comment about d.h.s. in the nine months i have been in office, i have seen the advantage of having the components within my department together in one conference table. when we were dealing with the situation in the southwest border this summer in rio grande valley, i
we both have a role in cybersecurity. along with other agencies. so one of our challenges is to make sure that what you refer to doesn't happen, because that doesn't do any good for the american people, for our government, for the taxpayers to see you engaged in turf wars. we have committed to setting the example at the top and instilling that example in the rank and file in our leadership. on cybersecurity, for example, we get together routinely to talk about what is our framework. are we...
66
66
Sep 6, 2014
09/14
by
BLOOMBERG
tv
eye 66
favorite 0
quote 0
attack is going to be forgotten the same way the target attack is only discussed i those in the cybersecurity. i suspect this will linger for some time because there is such a salacious element to naked celebrities particularly in our culture. there's nothing like it. >> cory johnson and eric and she has helped google's moon shots. now megan smith is head to washington to become the nation's new chief technology officer. we talk about what she brings to the table next. ♪ >> welcome back to the best of "bloomberg west." i'm emily chang. from google to the white house, president obama has named long time google executive megan smith as the nation's new chief technology officer replacing todd park. they are creating moon shot products like the self driving car and delivery drones. she isn't the only executive heading to washington. alexander mcgilray. their mission, to help the united states stay on top of technological innovations and dealing with free speech issues and for, we are joined by the very first chief technology officer who served from 2009 to 2012. i started by asking him what he th
attack is going to be forgotten the same way the target attack is only discussed i those in the cybersecurity. i suspect this will linger for some time because there is such a salacious element to naked celebrities particularly in our culture. there's nothing like it. >> cory johnson and eric and she has helped google's moon shots. now megan smith is head to washington to become the nation's new chief technology officer. we talk about what she brings to the table next. ♪ >>...
106
106
Sep 17, 2014
09/14
by
CSPAN
tv
eye 106
favorite 0
quote 0
we both have a role in cybersecurity. along with other agencies. so one of our challenges is to make sure that what you refer to doesn't happen, because that doesn't do any good for the american people, for our government, for the taxpayers to see you engaged in turf wars. we have committed to setting the example at the top and instilling that example in the rank and file in our leadership. on cybersecurity, for example, we get together routinely to talk about what is our framework. are we getting it right? are we having any turf battles? all three of us, i think, i think i speak for our respective organizations and communities, are committed to working together. i think it does depend a lot on the personalities at the top. committing to work together. the last thing i'll say is your comment about d.h.s.. in the nine months i have been in office, i have seen the advantage of having the components within my department together in one conference table. when we were dealing with the situation in the southwest border this summer in rio grande valley, i
we both have a role in cybersecurity. along with other agencies. so one of our challenges is to make sure that what you refer to doesn't happen, because that doesn't do any good for the american people, for our government, for the taxpayers to see you engaged in turf wars. we have committed to setting the example at the top and instilling that example in the rank and file in our leadership. on cybersecurity, for example, we get together routinely to talk about what is our framework. are we...
124
124
Sep 9, 2014
09/14
by
CNNW
tv
eye 124
favorite 0
quote 0
chief business correspondent christine romans is here to speak about it, as well as cybersecurity expertt the moment. i have a lot of questions, i know you get riled up about this, christine. what do we know? >> we know it's a lot of people. we know this has been going on since at least april and it was last week that home depot executives realized it was happening. it was law enforcement and a cybersecurity blogger brian krebs who noticed this information was available. if you went to the spring selling sees ton get seed for your lard you may have been giving your information to hackers around the world. the company is still kd
chief business correspondent christine romans is here to speak about it, as well as cybersecurity expertt the moment. i have a lot of questions, i know you get riled up about this, christine. what do we know? >> we know it's a lot of people. we know this has been going on since at least april and it was last week that home depot executives realized it was happening. it was law enforcement and a cybersecurity blogger brian krebs who noticed this information was available. if you went to...
125
125
Sep 24, 2014
09/14
by
FBC
tv
eye 125
favorite 0
quote 0
liz: that was eric schmidt, ran the company for years and talking cybersecurity earlier today on foxusiness with maria bartiromo on the opening bell. one company that is smarting because they couldn't promise the same thing acknowledged this massive cybersecurity breach, home depot. stolen data is described as a wave of fraudulent transactions. you heard many newscasts. what can you do to protect yourself? we put ashley webster on the story. we haven't been getting the right answer. >> pay cash, back to you. no, seriously. [ laughter ] >> home depot says as many as 56 million cards may have been compromised on the payment terminals as far as april. criminals are using that stolen card information to drain victims' bank accounts, in some cases the fraudulent transactions have been tied to specific zip codes. the home depot breach follows other high-profile data thefts including target, neiman marcus, p.f. changs, just to name a few. card holders may have shopped at more than one merchant being attacked and that makes it difficult to figure out which fraudulent transaction is tied to w
liz: that was eric schmidt, ran the company for years and talking cybersecurity earlier today on foxusiness with maria bartiromo on the opening bell. one company that is smarting because they couldn't promise the same thing acknowledged this massive cybersecurity breach, home depot. stolen data is described as a wave of fraudulent transactions. you heard many newscasts. what can you do to protect yourself? we put ashley webster on the story. we haven't been getting the right answer. >>...
158
158
Sep 11, 2014
09/14
by
FBC
tv
eye 158
favorite 0
quote 0
we're joined by two experts on cybersecurity, louis rincon and michael balboni, great to have both of you. michael, start with you, in addition to running homeland security, you ran the cybersecurity agency. what we're hearing tonight, islamic militants are bragging, bragging online it's only a matter of time before they launch some sort of massive attack on our financial system or on our infrastructure. what do you make of this? how successful could they be? >> consistent with their whole global effort to recruit, to spret their message, but they want to increase their footprint. doing that is hard when it comes to tanks and missiles because they don't have the infrastructure. go to the internet, you can get a huge reach. that's what they want to do. especially if they bring down our financial sector, specifically the united states. it's the poor man's weapon at this point in time. gerri: that is so smart. the fellow that hacked the personal gmail of tony blair, the former prime minister. with weapons like that at their disposal, seems like they have a powerful front on the internet
we're joined by two experts on cybersecurity, louis rincon and michael balboni, great to have both of you. michael, start with you, in addition to running homeland security, you ran the cybersecurity agency. what we're hearing tonight, islamic militants are bragging, bragging online it's only a matter of time before they launch some sort of massive attack on our financial system or on our infrastructure. what do you make of this? how successful could they be? >> consistent with their...
33
33
Sep 26, 2014
09/14
by
CSPAN2
tv
eye 33
favorite 0
quote 0
my name is anthony and then with a cybersecurity firm's divalent.i have a question particularly for the ambassador and christine bliss. you had mentioned that everyone is an equal participant in the web on the internet. you mentioned the education taking place to realize that the localization laws are actually not beneficial as well as mentioning the different aspects of negotiations that are being put in place to improve information data flow and trade. but i'm wondering what the u.s. is doing to actually improve trust because i think that trust takes much longer to build than it does to be lost. and in the wake of the snowden revelations i think a lot of trust in the u.s. as a quote unquote equal participant on the internet has been lost on wondering if you could speak to that. >> the great closing question. >> i think in terms of the question of what are we doing to restore trust you have to break that down into trust between users of the internet around the world and the american government trust between governments themselves or trust between u
my name is anthony and then with a cybersecurity firm's divalent.i have a question particularly for the ambassador and christine bliss. you had mentioned that everyone is an equal participant in the web on the internet. you mentioned the education taking place to realize that the localization laws are actually not beneficial as well as mentioning the different aspects of negotiations that are being put in place to improve information data flow and trade. but i'm wondering what the u.s. is doing...
124
124
Sep 2, 2014
09/14
by
KPIX
tv
eye 124
favorite 0
quote 0
. >> cybersecurity experts say it's important for users to have strong passwords for all of their online accounts and change them on a regular basis. >>> and coming up at 5, it's a little box that could mean big savings on your power bill. there is a catch. you may have to let pg&e shut off your ac on hot days. what is it? that is coming up at 5. >> and no ac needed, i guess. mother nature is doing her thing today, right? >> roll open the windows and enjoy. >> there we g. >> and there is a nice look outside, folks on, what looks like a nice day. enjoy, we'll see you again tomorrow morning. >> goodbye. ,, ♪watching everybody eating ♪what they want all day ♪brings me nothing but more shame ♪ ♪turning every turn until i find something right♪ ♪and it...takes my breath away [ knock on door ] >> deacon: brooke? brooke? >> brooke: in here. >> deacon: hey. i told you i'd be back. not that i'm trying to pressure you or anything. >> brooke: deacon... >> deacon: look, i-i know. i know that last night you weren't expecting a proposal, which is why you couldn't answer me. but i figured you've had som
. >> cybersecurity experts say it's important for users to have strong passwords for all of their online accounts and change them on a regular basis. >>> and coming up at 5, it's a little box that could mean big savings on your power bill. there is a catch. you may have to let pg&e shut off your ac on hot days. what is it? that is coming up at 5. >> and no ac needed, i guess. mother nature is doing her thing today, right? >> roll open the windows and enjoy....
104
104
tv
eye 104
favorite 0
quote 0
coming up a fox business exclusive with patrick peterson, he's the founder and ceo of a cybersecurity climate. all right. eom, that's what i was trying to say. be right back. ♪ opportunities aren't always obvious. sometimes they just drop in. cme group can help you navigate risks and capture opportunities. we enable you to reach global markets and drive forward with broader possibilities. cme group: how the world advances. so what we're looking for is a way to "plus" our accounting firm's mobile plan. and "minus" our expenses. perfect timing. we're offering our best-ever pricing on mobile plans for business. run the numbers on that. well, unlimited talk and text, and ten gigs of data for the five of you would be... one-seventy-five a month. good calculating kyle. good job kyle. you just made partner. our best-ever pricing on mobile share value plans for business. now with a $100 bill credit for every business line you add. i research. i dig. and dig some (trader more. search. because, for me, the challenge of the search... is almost as exciting as the thrill of the find. (announcer) a
coming up a fox business exclusive with patrick peterson, he's the founder and ceo of a cybersecurity climate. all right. eom, that's what i was trying to say. be right back. ♪ opportunities aren't always obvious. sometimes they just drop in. cme group can help you navigate risks and capture opportunities. we enable you to reach global markets and drive forward with broader possibilities. cme group: how the world advances. so what we're looking for is a way to "plus" our accounting...
132
132
Sep 8, 2014
09/14
by
CNBC
tv
eye 132
favorite 0
quote 0
shares of fireeye popping after a ubs put a buy on the cybersecurity firm. brent hill is the analyst behind that call. brent, great to have you with us. >> thanks for having me. >> you know you believe that sentiment has become unduly bearish. i'm just wondering, perhaps there is a reason for that bearishness, given the amount of revenue growth deceleration that we're going to see going to calendar year '15-'16. when you point out we're going to 40% range down from 165% or so, in the previous year? >> yeah, absolutely. our upgrades predicated on the stock is under massive pressure this year. we think cyberlandscape is very robust, and we think fireeye is a leader. clearly with the revenue growth will decelerate given the acquisition which helped the revenue growth this yee. so they'll have an unfair comp next year. but when you look what is going on, no one wants to be the ceo of target again. when you look at fireeye's perspective on the cyberlandscape, they are an absolute leader, there is no question. we spoke to numerous customers that are using the tech
shares of fireeye popping after a ubs put a buy on the cybersecurity firm. brent hill is the analyst behind that call. brent, great to have you with us. >> thanks for having me. >> you know you believe that sentiment has become unduly bearish. i'm just wondering, perhaps there is a reason for that bearishness, given the amount of revenue growth deceleration that we're going to see going to calendar year '15-'16. when you point out we're going to 40% range down from 165% or so, in...
121
121
Sep 3, 2014
09/14
by
KTVU
tv
eye 121
favorite 0
quote 0
a cybersecurity blog first reported that several banks, the home improvement chain says it is looking into unusual activity to verify a possible breach and is assuring customers they they will not be responsible for any charges. home depot has 2200 stores in the u.s. the target breach involves almost 1800 stores and about 40 million credit and debit cards. >>> thousands of bay area workers enjoy free meals provided by their employees. the irs is trying to determine whether that perk can be considered a taxable benefit. all 150 employees at social networking startup tag received free meals. workers say it would cost them about $15 a day so they like being able to choose between two andres or a salad and sandwich options. >> we don't have to worry about finding something to eat. it's already here. it's upstairs. >> if it's provided to the employer -- by the employer to the employee and the employee doesn't have to pay for it, that's a significant benefit that's escaping taxation. >> the irs could decide meals proprovided is a fringe benefit. it could take two years to decide. >>> starti
a cybersecurity blog first reported that several banks, the home improvement chain says it is looking into unusual activity to verify a possible breach and is assuring customers they they will not be responsible for any charges. home depot has 2200 stores in the u.s. the target breach involves almost 1800 stores and about 40 million credit and debit cards. >>> thousands of bay area workers enjoy free meals provided by their employees. the irs is trying to determine whether that perk...
57
57
Sep 25, 2014
09/14
by
CSPAN2
tv
eye 57
favorite 0
quote 0
and thus in america cybersecurity workforce, two minutes. >> telesis such a leader on cybersecurity sothank you and we need to have more members of the chamber working on national security and cybersecurity as members of my table were noting. that's something we can do but on the education front we have been doing that in virginia. we passed the higher education bill that was very much focused on s.t.e.m. and we know my husband was a math teacher, came to fairfax county served in the schools for 30 years. i know how important it is. we have amendments in our budget that delicate grace and who is one of our pro-creation members worked with me and joe to have money for its steam education out because we had the arts for wolf trap so so wolf trap can do work with preschool children. they have programs that are now modeled around the country on s.t.e.m. education, steam education to get that science, technology and know-how at the beginning. i think we have great opportunities again to highlight the expertise we have in virginia. my husband has been the school system for over 30 years and
and thus in america cybersecurity workforce, two minutes. >> telesis such a leader on cybersecurity sothank you and we need to have more members of the chamber working on national security and cybersecurity as members of my table were noting. that's something we can do but on the education front we have been doing that in virginia. we passed the higher education bill that was very much focused on s.t.e.m. and we know my husband was a math teacher, came to fairfax county served in the...
206
206
Sep 2, 2014
09/14
by
KQEH
tv
eye 206
favorite 0
quote 0
white ops is a new york cybersecurity firm. it's coo stumbled across sherpa and is a big believer. >> we started talking about what the ideal health care program would look like. we didn't think it existed. i started googling around, i came across sherpa. it was what we described to each other as what we like. >> reporter: he thinks having a doctor on call it making his company for efficient. his employees don't need to see a doctor in order to communicate with one. that's what jay parkinson calls process. >> to me, the future of primary care looks a lot like what we're doing here. >> sherpa says it has added 20 new companies since we first aired that story back in july. it's also expanded into illinois and now plans to be in six more states before the end of the year. >>> our next story is about a disruptive innovation in the world of barbie doll. the pink toy aisle is going through a dramatic transformation because of one woman who wants to inspire future generations of female engineers, one toy at a time. tyler has her story
white ops is a new york cybersecurity firm. it's coo stumbled across sherpa and is a big believer. >> we started talking about what the ideal health care program would look like. we didn't think it existed. i started googling around, i came across sherpa. it was what we described to each other as what we like. >> reporter: he thinks having a doctor on call it making his company for efficient. his employees don't need to see a doctor in order to communicate with one. that's what jay...
58
58
Sep 25, 2014
09/14
by
CSPAN3
tv
eye 58
favorite 0
quote 0
i've written an op ed recently on the importance of cybersecurity legislation. real bipartisan support in the house, in the senate for cybersecurity legislation and i think it is critical to our national security. >> thank you. mr. olsen, with respect to violent extremism, a and to the extent that you can give information this this kind of a setting, have you seen any difference in the recruitment and sophistication of isis or isil in comparison to other terrorist groups? >> i would say what we've seen from isil is a very sophisticated prop began saturday effort. the types of information they put out on the internet and in particular using social media really exceed the types of propaganda that we've seen from other groups. so certainly that effort has been quite sophisticated and extensive. i think we still are -- it remains to be seen, the impact of that information on potential recruits. the one fact i could point to is the number of foreign fighters. and the significant number of foreign fighters that have traveled to syria. again, many of those, not all, bu
i've written an op ed recently on the importance of cybersecurity legislation. real bipartisan support in the house, in the senate for cybersecurity legislation and i think it is critical to our national security. >> thank you. mr. olsen, with respect to violent extremism, a and to the extent that you can give information this this kind of a setting, have you seen any difference in the recruitment and sophistication of isis or isil in comparison to other terrorist groups? >> i would...
45
45
Sep 29, 2014
09/14
by
CSPAN3
tv
eye 45
favorite 0
quote 0
including designing and implementing risk-based cybersecurity programs at federal agent situation. establishing and identifying standards for critical infrastructures, and detecting and responding to and mitigating cyber incidents. and since that report, we've got 28 gao additional recommendations. and i know that we've been talking about today in this hearing. in fact, gao has designated federal information security as a high-risk area in the federal government since 1997. and i think that there isn't anyone on this committee, or anyone in congress, or the public that doesn't think that more should be done. and in fact, that we embrace every potential positive, productive recommendation moving forward. so
including designing and implementing risk-based cybersecurity programs at federal agent situation. establishing and identifying standards for critical infrastructures, and detecting and responding to and mitigating cyber incidents. and since that report, we've got 28 gao additional recommendations. and i know that we've been talking about today in this hearing. in fact, gao has designated federal information security as a high-risk area in the federal government since 1997. and i think that...
435
435
Sep 3, 2014
09/14
by
WCAU
tv
eye 435
favorite 0
quote 0
now, a website focusing on cybersecurity says the same group of russian and ukrainian hackers suspected massive target breach may be behind the possible home depot breach. target has been overhauling its security department and systems and is accelerating its $100 million plan to roll out chip-based credit card technology in all of its stores as an extra safety precaution. for its part, home depot says it will notify customers immediately if the breach is confirmed. live in the digital operations center, i'm vai sikahema, nbc 10. >>> it is 4:47. apple confirms hackers breached the individual accounts of female celebrities to steal nude photos and post them on the internet. apple says it found no evidence of a widespread problem in its icloud or find my iphone services. the fbi is involved, trying to track down the people who stole those images. >>> experts say the seismic activity near a rumbling volcano in iceland is calming down now. that crater set up a huge plume of steam and gas yesterday. experts warned of a possible ash cloud that could affect world air travel just as an eruption
now, a website focusing on cybersecurity says the same group of russian and ukrainian hackers suspected massive target breach may be behind the possible home depot breach. target has been overhauling its security department and systems and is accelerating its $100 million plan to roll out chip-based credit card technology in all of its stores as an extra safety precaution. for its part, home depot says it will notify customers immediately if the breach is confirmed. live in the digital...
201
201
Sep 6, 2014
09/14
by
CSPAN
tv
eye 201
favorite 0
quote 0
the senator has been a leader in cybersecurity. the senator is right.we have to get better insight into how the public is being protected by private service providers. host: a couple of questions from twitter. i think they are really good. is the cloud being monitored by the nsa? wants the information leaves her home, isn't it public domain? guest: both are great questions. the cloud is being monitored. problem with the snowden stuff is a gave you the impression that only nsa does this kind of monitoring. are four orn, there five countries that monitor everything. when you get on your phone in washington, you should say high in several different linkages. inyou should say "hi" several different languages. nsa cannot monitor without a warrant. that does not apply to other countries' intelligence services, including some of our allies who probably do monitor it. with the internet, there is not a lot of privacy left on it. is your data of the domain when it leaves your house? this is a really good question and a difficult one because when you put something
the senator has been a leader in cybersecurity. the senator is right.we have to get better insight into how the public is being protected by private service providers. host: a couple of questions from twitter. i think they are really good. is the cloud being monitored by the nsa? wants the information leaves her home, isn't it public domain? guest: both are great questions. the cloud is being monitored. problem with the snowden stuff is a gave you the impression that only nsa does this kind of...
44
44
Sep 19, 2014
09/14
by
CSPAN2
tv
eye 44
favorite 0
quote 0
so what about cybersecurity? when is there going to be some comprehensive meeting of the mind that is going to actually manifest itself in legislation? >> go ahead. >> we have a short window to get this done in lame duck. i've had good sessions. dutch and i both had good discussions. i happened to bump into the durbin in the hallway. >> talking about senate. >> senate is a hurdle. we pass ad bipartisan bill twice on pretty difficult subject and bringing all stakeholders in the room working it out. the problem was it is 13 page bill and hard to take anything serious in congress if it is anything short of -- >> in this congress we got 300 votes, that is miracle in this congress we're in now. people don't realize 80% of the networking controlled by private sector. our intelligence committee good as see anybody seeing attacks come in. we can't really share information. like being weather forecaster and see sandy coming up the east coast and you can't warn anybody. this, the target. ladies, target, whatever, the other
so what about cybersecurity? when is there going to be some comprehensive meeting of the mind that is going to actually manifest itself in legislation? >> go ahead. >> we have a short window to get this done in lame duck. i've had good sessions. dutch and i both had good discussions. i happened to bump into the durbin in the hallway. >> talking about senate. >> senate is a hurdle. we pass ad bipartisan bill twice on pretty difficult subject and bringing all stakeholders...
86
86
Sep 25, 2014
09/14
by
FBC
tv
eye 86
favorite 0
quote 0
cybersecurity experts warn about the heartl
cybersecurity experts warn about the heartl
128
128
Sep 7, 2014
09/14
by
BLOOMBERG
tv
eye 128
favorite 0
quote 0
lead on, to execute the internet policy principles so when we make these very tough decisions on cybersecurity privacy that we execute. the policies have already been written. we are not inventing new privacy policies. it's how do we execute new ideas that the president has been championing and see them to the finish line? >> so what does it mean in practice for silicon valley and technology companies like google? like facebook? like apple? how does the c.t.o. impact them? >> i hope it's an opportunity for an interface. we're not going to solve problems with government on its own or the private sector on its own but the public-private interface and i think the principle role is to foster greater improvements between the public and private sector. >> former u.s. c.t.o. aneesh chopra coming up, the wait is going to get a bit longer for alibaba's groups i.p.o. it could become the laragest in u.s. history. we'll tell you why the road show was delayed and what it means for alibaba next. ♪ >> we focus on innovation, technology and the future of business. i'm emily chang. alibaba's highly anticipated
lead on, to execute the internet policy principles so when we make these very tough decisions on cybersecurity privacy that we execute. the policies have already been written. we are not inventing new privacy policies. it's how do we execute new ideas that the president has been championing and see them to the finish line? >> so what does it mean in practice for silicon valley and technology companies like google? like facebook? like apple? how does the c.t.o. impact them? >> i hope...
51
51
Sep 6, 2014
09/14
by
BLOOMBERG
tv
eye 51
favorite 0
quote 0
lead on, to execute the internet policy principles so when we make these very tough decisions on cybersecurity privacy that we execute. the policies have already been written. we are not inventing new privacy policies. it's how do we execute new ideas that the president has been championing and see them to the finish line? >> so what does it mean in practice for silicon valley and technology companies like google? like facebook? like apple? how does the c.t.o. impact them? >> i hope it's an opportunity for an interface. we're not going to solve problems with government on its own or the private sector on its own but the public-private interface and i think the principle role is to foster greater improvements between the public and private sector. as government opens more data, it allows entrepreneurs and innovators to consume it and to build new products and services. as the government works to shape privacy and security policies, it is working with the private sector to ensure that we engage on commerce on the internet, we can do so with confidence. the public-private interface is critical an
lead on, to execute the internet policy principles so when we make these very tough decisions on cybersecurity privacy that we execute. the policies have already been written. we are not inventing new privacy policies. it's how do we execute new ideas that the president has been championing and see them to the finish line? >> so what does it mean in practice for silicon valley and technology companies like google? like facebook? like apple? how does the c.t.o. impact them? >> i hope...
239
239
Sep 22, 2014
09/14
by
CNBC
tv
eye 239
favorite 0
quote 0
i am also intrigued by cyberarc, and it's a cybersecurity firm that soon will become public. would definitely like to get a piece, even though i've got to tell you we know that palo alto remains the best in show. that stock broke 100, or par, as wall street jibberish. of all the companies that have come public, my three favorite all are buyable whenever the market throws a sale. nicholas in california, nicho s nicholas. >> caller: >> caller: i'm calling from my apartment on orange grove. thank you for making investing cool, thank you for my parents for getting into you. my question is about twitter, specifically with alibaba behind us, where do you see it going? >> i like it. ever since anthony came there, it's become a turn -- i think it's the news source for everybody in the world. i took some heat last week from a guy -- i won't mention his name -- who was saying basically that it doesn't matter that nota was the cfo, i have to tell you, it does matter and the company has its act together. i like twitter on this pullback. a big boo-yah for you. p.e. parsley energy. a few m
i am also intrigued by cyberarc, and it's a cybersecurity firm that soon will become public. would definitely like to get a piece, even though i've got to tell you we know that palo alto remains the best in show. that stock broke 100, or par, as wall street jibberish. of all the companies that have come public, my three favorite all are buyable whenever the market throws a sale. nicholas in california, nicho s nicholas. >> caller: >> caller: i'm calling from my apartment on orange...
196
196
Sep 9, 2014
09/14
by
CNNW
tv
eye 196
favorite 0
quote 0
chief business correspondent christine romans is here to speak about it, as well as cybersecurity expert mark rash with everything we know at the moment. i have a lot of questions, i know you get riled up about this, christine. what do we know? >> we know it's a lot of people. we know this has been going on since at least april and it was last week that home depot executives realized it was happening. it was law enforcement and a cybersecurity blogger brian krebs who noticed this information was available. if you went to the spring selling sees ton get seed for your lard you may have been giving your information to hackers around the world. the company is still kind of in the discovery mode trying to figure out the scope of this. but they are confirming if you go to their website, you can see there's a very brief statement about what they know for sure right now. if you think, if you think that your information might be out there, they're going to give free credit monitoring service. if the money comes out of your account or sput fraudulently on your credit card, they are going to reburs
chief business correspondent christine romans is here to speak about it, as well as cybersecurity expert mark rash with everything we know at the moment. i have a lot of questions, i know you get riled up about this, christine. what do we know? >> we know it's a lot of people. we know this has been going on since at least april and it was last week that home depot executives realized it was happening. it was law enforcement and a cybersecurity blogger brian krebs who noticed this...
290
290
Sep 22, 2014
09/14
by
CNBC
tv
eye 290
favorite 0
quote 1
but first it's cybersecurity and, two, it's tech.ame if a long, long time april lot of people are wondering how the tech market's going to hold up. last one, it was mobile-i, they do all of the collision avoidance devices out there. collision avoidance chips, really than was a huge success. that was 25 at the end of july. up better than 90%. that's the first one we've seen in a while. finally, china stocks, alibaba opened around -- i can't see it, but opened around 91. there it is, 91. jd.com, dangdang. >> bob pisani. mentions mobile i. >> i like that stock. >> yes, i do. deals. germany, what's go on over there? feel aggressive, at least in m&a. >> boy, you qualified that. >> thankfully. trw, last week, this morning merck buying sigma-aldrich. and you've got dresser-rand. wow, these are three of the largest deals ever done by german companies, 3 of the 4 largest german acquisitions have occurred this year. german acquisitions in the u.s., topped 61 billion this year, that's 5% of u.s. m&a deal value. of course, as we know, foreign bu
but first it's cybersecurity and, two, it's tech.ame if a long, long time april lot of people are wondering how the tech market's going to hold up. last one, it was mobile-i, they do all of the collision avoidance devices out there. collision avoidance chips, really than was a huge success. that was 25 at the end of july. up better than 90%. that's the first one we've seen in a while. finally, china stocks, alibaba opened around -- i can't see it, but opened around 91. there it is, 91. jd.com,...
82
82
tv
eye 82
favorite 0
quote 0
joining us is john lucich, ceo of the cybersecurity firm network security group.good to have you here. how could it happen? one would assume that security would at least protect individual phones. this looks like, what, a broad attack on celebrities? >> we're in the early stages of the investigation right now. but it doesn't look like the phones themselves were hacked. it looks like the accounts online were hacked that these phones sync to. apple said they did an investigation and said they haven't found any weaknesses or compromises into the system. but that doesn't mean the accounts were compromised. when you set up an account, you're asked for a user name and password. if you use a weak password -- there are reports who say there's a vulnerability in the system that the hackers were allowed to try again and again, despite the fact that typically in the industry, every three tries locks the account. they tried over a period of time and gained access. >> apple says none were the breach of any apple system and they also fixed a bug in its find my iphone service th
joining us is john lucich, ceo of the cybersecurity firm network security group.good to have you here. how could it happen? one would assume that security would at least protect individual phones. this looks like, what, a broad attack on celebrities? >> we're in the early stages of the investigation right now. but it doesn't look like the phones themselves were hacked. it looks like the accounts online were hacked that these phones sync to. apple said they did an investigation and said...