36
36
Jan 12, 2018
01/18
by
CSPAN3
tv
eye 36
favorite 0
quote 0
all of the cybersecurity discussion we will have in the next hour really dovetails nicely into how you do it matters. >> thank you, secretary. i think a lot of what we will talk about today is the nuances of implementation and understanding, as we talk about possible strategies to tackle this challenge in front of us with securing the systems. mr. talk about strategies to tackle this problem in front of us in securing the system. last but not least. >> so from the great state of florida, i wish we knew what it was like to have a very close statewide election. but it's a pleasure to be here. thank you, commissioner masterson, to be a part of this conversation. we have three ways to vote. we have no excuse vote by mail. we have in person early voting that's mandated at the state level. for a period of time, there's a minimum. but then we have some discretion to go above and beyond that. and then we have election day. and that's probably been the biggest change in how elections were administered in the state of florida since the 2007 election. they were cast between 7:00 p.m. in the 2016
all of the cybersecurity discussion we will have in the next hour really dovetails nicely into how you do it matters. >> thank you, secretary. i think a lot of what we will talk about today is the nuances of implementation and understanding, as we talk about possible strategies to tackle this challenge in front of us with securing the systems. mr. talk about strategies to tackle this problem in front of us in securing the system. last but not least. >> so from the great state of...
58
58
Jan 30, 2018
01/18
by
CSPAN2
tv
eye 58
favorite 0
quote 0
we want to know how to leverage the resources to better shore up the cybersecurity and online privacy. i will speak more about this in a moment i hope to weigh in on what we are doing in the areas where the department can be even more impactful. finally, they always seek input on the work on the emerging technologies. how much has led the government when it comes to the new and emerging technologies but that requires continued engagement for the industry and from all of you. in order to ensure that american entrepreneurs are able to take risks and fight globa to fight l markets for products and services we need to make sure we are charting the right path. on such issues as artificial intelligence and we are looking for the industry to help us make the right choices in the government. as i noted cybersecurity is a key to the administration and as many of you know they issued an executive order on strengthening the networks and critical infrastructure. they sought to promote action and other automated distributed threads. attacks can be extremely damaging and the broad internet at risk
we want to know how to leverage the resources to better shore up the cybersecurity and online privacy. i will speak more about this in a moment i hope to weigh in on what we are doing in the areas where the department can be even more impactful. finally, they always seek input on the work on the emerging technologies. how much has led the government when it comes to the new and emerging technologies but that requires continued engagement for the industry and from all of you. in order to ensure...
78
78
Jan 13, 2018
01/18
by
CSPAN2
tv
eye 78
favorite 0
quote 1
cybersecurity in russia and those from american prisons. be in those crazy conditions to get that information to them. and they said in those safe houses across the country and knows about a few cases one of the russian cyberafter the cold war was the intelligence service to extract information. but there are hopes and then to be put in a room and is confident with the cyberweapons that could get out of control. because of personal correspondence and for example the critical infrastructure but usually those groups by those cyberspecialist but it was from those who were not afraid. but with those criminals selections but those cybercrews and cybersecurity members with that $15 million from the russian bank but then they were thrown into moscow with the war chest with the diamond but altogether with about 15 different regions that the experts for this investigation and with those group leaders recruited so they failed to mention with the market layoff. every morning except on the weekends every morning except on the weekends. [inaudible conve
cybersecurity in russia and those from american prisons. be in those crazy conditions to get that information to them. and they said in those safe houses across the country and knows about a few cases one of the russian cyberafter the cold war was the intelligence service to extract information. but there are hopes and then to be put in a room and is confident with the cyberweapons that could get out of control. because of personal correspondence and for example the critical infrastructure but...
46
46
Jan 23, 2018
01/18
by
CSPAN3
tv
eye 46
favorite 0
quote 0
jeremy has been a long-time computer scientist engaged in elections research, looking at the cybersecurity challenges in elections. jeremy was a member of the ac's technical guidelines development committee, helping us work on writing the next version of the standards coming early 2018, april, may 2018. jeremy also is a poll worker in his home county of fairfax county, virginia. i know it takes a great deal of pride and he's learned a lot about the process in that way. he's affectionately known in our community as east coast jeremy because jeremy gray, who was supposed to be here, is west coast jeremy. i will try not to refer to you that way or just east coast. that was my plan if jeremy gray had been here. immediately to my right is secretary of state nellie gorbea from the state of rhode island. i got to know the secretary well through the process of your voting system procurement process. secretary gorbea doesn't take no for an answer. she knew she wanted to innovate in the state of rhode island and pushed to get innovations into place in the state of rhode island prior to the last pres
jeremy has been a long-time computer scientist engaged in elections research, looking at the cybersecurity challenges in elections. jeremy was a member of the ac's technical guidelines development committee, helping us work on writing the next version of the standards coming early 2018, april, may 2018. jeremy also is a poll worker in his home county of fairfax county, virginia. i know it takes a great deal of pride and he's learned a lot about the process in that way. he's affectionately known...
61
61
Jan 17, 2018
01/18
by
CSPAN2
tv
eye 61
favorite 0
quote 0
or the inl's cybersecurity training outreach to idaho businesses. consider the thriving cybersecurity degree programs at our universities and the idaho national guard's cyber operations squadron. so we are reaching a critical mass of infrastructure. all that's needed is our continuing commitment for idaho to remain on the vanguard of this evolving discipline. on a related note, no report on our progress over the past decade would be complete without highlighting the growing partnership between the state of idaho and the idaho national lab. we are light years beyond the kind of legal and political disputes that dogged our relationship for many years. today the inl is much more than a remote nuclear engineering outpost on the eastern idaho desert. our connections now include my leadership in nuclear energy or line commission, our strategic energy alliance, and the center for advanced energy studies with its cutting-edge smart grid research. and let's not forget the inl's growing collaboration with our universities, as well as the department of energy'
or the inl's cybersecurity training outreach to idaho businesses. consider the thriving cybersecurity degree programs at our universities and the idaho national guard's cyber operations squadron. so we are reaching a critical mass of infrastructure. all that's needed is our continuing commitment for idaho to remain on the vanguard of this evolving discipline. on a related note, no report on our progress over the past decade would be complete without highlighting the growing partnership between...
29
29
Jan 5, 2018
01/18
by
BLOOMBERG
tv
eye 29
favorite 0
quote 0
>> cybersecurity is one.political situation, just becoming far more characteristic rate now, is another 1 -- characteristic right now, is another one. critical people go back to a system where one does not say openly what one thinks and keeps some reserve. the world is more dangerous today in terms of terrorism. are completely interdependent. it is going to be even more so going forward. >> you succeeded building this company. would you like to leave behind? what legacy would you like to leave behind? >> legacy is a big word. - what i really want to leave behind is the fact that we created this industry around employees lives around the world. convincing operations it is good for their bottom line and good for their goodwill. spending money on their employees in the form of prevention. everyone. for is reallyis industry starting to be recognized and i want the industry to grow. beingnk you so much for here. it has been a pleasure. ♪ scarlet: i'm scarlet fu. this is "bloomberg etf iq." we focus on the risks an
>> cybersecurity is one.political situation, just becoming far more characteristic rate now, is another 1 -- characteristic right now, is another one. critical people go back to a system where one does not say openly what one thinks and keeps some reserve. the world is more dangerous today in terms of terrorism. are completely interdependent. it is going to be even more so going forward. >> you succeeded building this company. would you like to leave behind? what legacy would you...
112
112
Jan 4, 2018
01/18
by
CNNW
tv
eye 112
favorite 0
quote 0
cybersecurity, election cybersecurity is a matter of department of homeland security's business. is why i designated critical infrastructure just before we left office. that's cybersecurity. but not voter fraud generally. i don't believe that's a security issue, nor should it be. >> also, i want to talk to you by -- when we learn more about the investigation, i want to have you back on in terms of whether we are making our voting more safe. we just don't know enough about anything that's being done to ask your take on it right now. i guess that's a shame in and of of course. >> we know more and more all the time. >> the focus seems so clearly on collusion and criminal implications on one side, who knew what and whether. they are all relevant questions. certainly the umbrella of oversight is how did the russians do this, how do we stop it? is that a fair statement? >> in the matter of cybersecurity and securing our in election infrastructure, some states have is taken this seriously and appear to be doing more to step up their own cybersecurity. others have not. at the federal lev
cybersecurity, election cybersecurity is a matter of department of homeland security's business. is why i designated critical infrastructure just before we left office. that's cybersecurity. but not voter fraud generally. i don't believe that's a security issue, nor should it be. >> also, i want to talk to you by -- when we learn more about the investigation, i want to have you back on in terms of whether we are making our voting more safe. we just don't know enough about anything that's...
65
65
Jan 31, 2018
01/18
by
CSPAN2
tv
eye 65
favorite 0
quote 0
first is the cybersecurity channel that is going to be featuring ab in ramallah later today as well for discussion between rabbit doll and my former boss, chairman greg walden. i look forward to seeing you later in the day. i would like to lay out some of the early international programs favorite thing to be aggressive in advocating u.s. interests g d values arrogation across the globe the itu and other form. i'd like to discuss department of commerce's security network to improve the security of things and 5g networks in the administration saying to counter the threat of bot nets. it has become what it is today in part because the long-standing bipartisan consensus around the principle of multi-stakeholder policymaking and standarder development. the idea of stakeholder should participate in open and transparent decision-making process. the mets continue to fight for the print old and in open interoperable collaboration between all stakeholders. right now, ntia as to priorities internationally. first is the preservation of the hua service which is become one of the most pressing issues
first is the cybersecurity channel that is going to be featuring ab in ramallah later today as well for discussion between rabbit doll and my former boss, chairman greg walden. i look forward to seeing you later in the day. i would like to lay out some of the early international programs favorite thing to be aggressive in advocating u.s. interests g d values arrogation across the globe the itu and other form. i'd like to discuss department of commerce's security network to improve the security...
44
44
Jan 6, 2018
01/18
by
BLOOMBERG
tv
eye 44
favorite 0
quote 0
arnaud: i think cybersecurity is one. geopolitical situation, which is becoming far more chaotic right now, is another one. because we don't know. we see, every day, new incidents taking place among nations, and it is quite critical that people go back to a system where one doesn't say openly what one thinks and keep some reserve so as to leave understanding for the others, so i think the world is more dangerous today. of course, more terrorism. and within a community which is far more intertwined than we used to, because we are completely interdependent. we are interdependent now, with asia, of course, and it will be more so going forward. haslinda: you have succeeded in building a company from $500,000. to an excess of one and half billion dollars. what is the legacy you would like to leave behind? --aud: "legacy is a big "legacy" is a big world. but what i really want to leave behind, or actually want to develop, is the fact that we have created this industry around taking care of employees around the world, convincing
arnaud: i think cybersecurity is one. geopolitical situation, which is becoming far more chaotic right now, is another one. because we don't know. we see, every day, new incidents taking place among nations, and it is quite critical that people go back to a system where one doesn't say openly what one thinks and keep some reserve so as to leave understanding for the others, so i think the world is more dangerous today. of course, more terrorism. and within a community which is far more...
138
138
Jan 16, 2018
01/18
by
CNNW
tv
eye 138
favorite 0
quote 0
continuing on this issue of cybersecurity. like to ask about active defense, which is sometimes inaccurately referred to as hacking back. active defense is a term that captured a spectrum of proactive cybersecurity measures, falls somewhere between passive defense and offense. some commentators believe that active defense is inappropriate and that current legal restrictions on the practice are therefore warranted. others believe that active defense should be more widely available to the private sector. i had two questions for you. first is active defense, a component of the department's current or planned cybersecurity assistance to the private sector. >> it is, yes, sir. but as you say there is wide disagreement with respect to what it means. what we mean is we want to provide the tools and resources to the private sector to protect their systems. so if we can anticipate or we are aware of a given threat and as you know, we have gone to great lengths this year to work with the intel community to also include otherwise classif
continuing on this issue of cybersecurity. like to ask about active defense, which is sometimes inaccurately referred to as hacking back. active defense is a term that captured a spectrum of proactive cybersecurity measures, falls somewhere between passive defense and offense. some commentators believe that active defense is inappropriate and that current legal restrictions on the practice are therefore warranted. others believe that active defense should be more widely available to the private...
18
18
quote
eye 18
favorite 0
quote 1
factor into what you're doing now and we're investor in watching companies in ai companies and cybersecurity companies who are absolutely fascinated with the empowerment that watching can bring to our going to our artisan power because the decentralized there's a lot of business models that exist today and allows you to have
factor into what you're doing now and we're investor in watching companies in ai companies and cybersecurity companies who are absolutely fascinated with the empowerment that watching can bring to our going to our artisan power because the decentralized there's a lot of business models that exist today and allows you to have
78
78
tv
eye 78
favorite 0
quote 0
but in cybersecurity, it's very hard to defend.t's very easy to attack, and so if you have something where it's incredibly easy to attack, incredibly hard to defend, that creates some very unusual challenges, and i think we haven't quite figured out what to do about them, we certainly are not able to defend as well as we can, we're not willing to take the precautions that are needed and it really calls out for some big -- a lot more work in the decade ahead. people's intuitions are shaped by their everyday experience where there's more of a balance between attack and defense. in the world of cyber, there's no balance at all. attack is super easy, defense is super hard. maria: my thanks to peter thiel. don't go anywhere, more "wall street week" after this. announcer: the carlyle group has been a wall street powerhouse for decades, why is the iconic founder stepping down now? he explains next, when "wall he explains next, when "wall street wee achoo! (snap) achoo! (snap) achoo! achoo! (snap) (snap) achoo! achoo! feel a cold coming on
but in cybersecurity, it's very hard to defend.t's very easy to attack, and so if you have something where it's incredibly easy to attack, incredibly hard to defend, that creates some very unusual challenges, and i think we haven't quite figured out what to do about them, we certainly are not able to defend as well as we can, we're not willing to take the precautions that are needed and it really calls out for some big -- a lot more work in the decade ahead. people's intuitions are shaped by...
96
96
Jan 25, 2018
01/18
by
FBC
tv
eye 96
favorite 0
quote 0
that would so cybersecurity businesses.hronicle will use technology to help foster an store larger amounts of data to recognize patterns. google looking for the next google, alphabet is. cheryl: something else they can promote. let's take a look at airline stocks right now. stocks in the sector really dropping. >> interesting movement paid united plans to increase available seats come at rancid beef up domestic spots by 4% to 6% over the next three years for the price of fame sparking concerns from investors that demand is expanding too and having to cut ticket prices sharply. united shares plunged more than 11% yesterday in shares of other airlines, american, southwest from alaska, chart luke all dropped on fears that this could drag the industry and to price war. >> i don't think this really sounds true because united is adding capacity. they cut capacity two years ago. he would think these airlines because they cut capacity that demand is there. i didn't think could make a move unless they knew the demand is there. >> la
that would so cybersecurity businesses.hronicle will use technology to help foster an store larger amounts of data to recognize patterns. google looking for the next google, alphabet is. cheryl: something else they can promote. let's take a look at airline stocks right now. stocks in the sector really dropping. >> interesting movement paid united plans to increase available seats come at rancid beef up domestic spots by 4% to 6% over the next three years for the price of fame sparking...
38
38
Jan 11, 2018
01/18
by
CSPAN2
tv
eye 38
favorite 0
quote 0
among a number of roles he is the ranking member of the asia-pacific and international cybersecurity subcommittee. senator cardin it is my privilege to welcome you here today. [applause] >> thank you very much for the generous introduction but also thank you for the great work you are doing for the alliance. also the german marshall fund for their leadership here at the german marshall fund ed has been an incredible asset on the transatlantic relationships to encourage dialogue to support democratic institutions and it is good to be here with michael chertoff who is serviced our country and it is an honor to be here. i know you will hear from tee17 later who is one of the in the house so i hope you understand our concern about russia's behavior is bipartisan or not partisan but is of great interest to national security. the alliance for security democracy is an effort to bring to the attention of the american people what the threat is all about. it is a great lead into why we did this report why i am releasing today the asymmetric assault on democracy and the implications for the u.s
among a number of roles he is the ranking member of the asia-pacific and international cybersecurity subcommittee. senator cardin it is my privilege to welcome you here today. [applause] >> thank you very much for the generous introduction but also thank you for the great work you are doing for the alliance. also the german marshall fund for their leadership here at the german marshall fund ed has been an incredible asset on the transatlantic relationships to encourage dialogue to support...
37
37
Jan 25, 2018
01/18
by
BLOOMBERG
tv
eye 37
favorite 0
quote 0
it is all about cybersecurity and ai. that is the big topic in davos.'s get perspective from michael gregoire. when you talk about cybersecurity you have to treat it like a disease. why is that? got to stay on top of it all the time and there is no end in sight. the threat factors continue to increase. improving, but not perfect, cooperation between countries and governments. it is a global problem. if you solve that problem in one do you or server, how make sure everybody else has an understand to that the threat factor has been solved? have governments and companies been so slow to rectify the issue? michael: it is extraordinarily complex. if you're a public company that has been compromised you have a duty of care to shareholders and customers to be thoughtful about that before you disclose it. you want to make sure that you because you have been helpful and you don't want to be penalized. have are no rules that caught up to the constant attacks we are seeing from multiple threat factors. the intel chip disaster. how will that impact cloud computing?
it is all about cybersecurity and ai. that is the big topic in davos.'s get perspective from michael gregoire. when you talk about cybersecurity you have to treat it like a disease. why is that? got to stay on top of it all the time and there is no end in sight. the threat factors continue to increase. improving, but not perfect, cooperation between countries and governments. it is a global problem. if you solve that problem in one do you or server, how make sure everybody else has an...
109
109
Jan 25, 2018
01/18
by
CSPAN2
tv
eye 109
favorite 0
quote 0
the ten things you should follow for good cybersecurity hygiene. somewhere it seems we need a protocol list what emergency response sherbrooke like and the safeguards in place whether county or state or the federal system we need the information we desperately want this earthquake may be only minutes to respond. and we want to see but those that have safeguards for the false alarms and i remember one moment in hawaii's history it went on for hours they thought a tsunami wave was going to hit. that is why we deliver -- developed the belief system and it did work in kodiak on the science level that the wave would not be that great. so that there are safeguards for the public. >> i do wish fema was here i think they are a part of this discussion i echo those concerns for my colleagues today and appreciate your comments today one of the things i do have concerns about a very diverse and growing population of language barriers. i know you talked a little bit about this to enable spanish-language alerts can you talk a little bit more about that that they
the ten things you should follow for good cybersecurity hygiene. somewhere it seems we need a protocol list what emergency response sherbrooke like and the safeguards in place whether county or state or the federal system we need the information we desperately want this earthquake may be only minutes to respond. and we want to see but those that have safeguards for the false alarms and i remember one moment in hawaii's history it went on for hours they thought a tsunami wave was going to hit....
88
88
Jan 25, 2018
01/18
by
BLOOMBERG
tv
eye 88
favorite 0
quote 0
a stronger front on cybersecurity, as we hear from john king -- tom king next.s is bloomberg. ♪ julie: we had headlines crossing the bloomberg right now and are watching shares at cbs and viacom's writers reports the ceo's of the two companies are said to have discussed a merger. this is not necessarily new. we have been talking about this for several weeks. or have been reports surfacing for years, and this was an that was not successful. shares are spiking about 1.8% but it is not a larger move likely because this has been a topic of conversation. little bit of deja vu here. with the russia investigation swirling there are concerns about the ability of the u.s. to keep elections safe from outside influence, and that includes improving cyber security defensive -- cybersecurity defenses. i think the president has a very clear america first message and that message helps me lead the way online. cyberspace is a medium and what we need to do is establish rules of the road that benefit stability, benefit companies that are good, companies that want to do business ar
a stronger front on cybersecurity, as we hear from john king -- tom king next.s is bloomberg. ♪ julie: we had headlines crossing the bloomberg right now and are watching shares at cbs and viacom's writers reports the ceo's of the two companies are said to have discussed a merger. this is not necessarily new. we have been talking about this for several weeks. or have been reports surfacing for years, and this was an that was not successful. shares are spiking about 1.8% but it is not a larger...
102
102
Jan 24, 2018
01/18
by
FBC
tv
eye 102
favorite 0
quote 0
xfinitymobile.com world economic forum davos, switzerland biggest names in business innovation cybersecurity here, companies like intel, are asking their companies and their commerce, to stop installing software patch it released to fix security flaws on chips saying they can cause unpredictable system behavior to weigh in on that ceo of cisco chuck robbins great to see you. >> great to see you. >> i want to talk broadly what is happening in your business how are you you combating the cybersecurity vulnerability like this one. >> first of all, i think intel doing a reasonable job a significant issue, in the industry, we all try to come together with issues occur there is a great cooperative spirit between major tech companies when we find issues we are working through it like need is, and i think doing the right things. >> what can you tells us about i.t. people talking 4% economic growths your business, is the gut to any business in a host of sectors i want to ask what you are seeing in terms of i.t. budges are managers spending more on products. >> every year when we start new calendar yea
xfinitymobile.com world economic forum davos, switzerland biggest names in business innovation cybersecurity here, companies like intel, are asking their companies and their commerce, to stop installing software patch it released to fix security flaws on chips saying they can cause unpredictable system behavior to weigh in on that ceo of cisco chuck robbins great to see you. >> great to see you. >> i want to talk broadly what is happening in your business how are you you combating...
40
40
Jan 25, 2018
01/18
by
BLOOMBERG
tv
eye 40
favorite 0
quote 0
satmberg's haslinda amin down with one who says companies and to fight cybersecurity like a disease.: you have to stay on top of it all the time. there is no end in sight. you have to be vigilant. the threat factors continue to increase. we have improving, but not perfect, cooperation between companies. notave improving, but great, corporation between governments and other governments, and it is a global problem. if you solve that problem in one particular country or server, how do you make sure everybody else has an opportunity to understand that threat factor has been solved? haslinda: why have governments and companies been so slow to rectify the issue? guest: it is incredibly complex, first of all. if you have been optimized, you have a duty to care to your shareholders and customers, and you want to be thoughtful about that before you disclose it. to the extent that you do disclose it, you want to make sure you are identified because you have been helpful, you don't want to be penalized because you been helpful. there's no real regulation rules that have caught up to the constan
satmberg's haslinda amin down with one who says companies and to fight cybersecurity like a disease.: you have to stay on top of it all the time. there is no end in sight. you have to be vigilant. the threat factors continue to increase. we have improving, but not perfect, cooperation between companies. notave improving, but great, corporation between governments and other governments, and it is a global problem. if you solve that problem in one particular country or server, how do you make...
53
53
Jan 26, 2018
01/18
by
BLOOMBERG
tv
eye 53
favorite 0
quote 0
jennifer: we have about 1/4 of our portfolio in cybersecurity, fund one, and we expect that would be. in davos, it is continuing to be important, a global thesis. we have a lot of experience in looking at cybersecurity from a number of different angles, from iot to the threat vectors and different dimensions, so that is a key area for us. ai is another area where we have been doing a lot of investing. we think using machine learning as an adjunct really can drive better outcomes for those companies and better experiences for the end consumer. those are some of the areas. blockchain is another one we are looking at, but primarily around solving business problems. those are some acid-based plays you are seeing. emily: thank you for joining us, jennifer fonstad. still ahead, watch out, waymo. apple is expanding its self-driving test fleet in california. we will have all the details. this is bloomberg. ♪ emily: a story we are watching -- google has reached out to jake sullivan, a former deputy chief of staff to hillary clinton at the state department, in its search for a new head of inte
jennifer: we have about 1/4 of our portfolio in cybersecurity, fund one, and we expect that would be. in davos, it is continuing to be important, a global thesis. we have a lot of experience in looking at cybersecurity from a number of different angles, from iot to the threat vectors and different dimensions, so that is a key area for us. ai is another area where we have been doing a lot of investing. we think using machine learning as an adjunct really can drive better outcomes for those...
28
28
tv
eye 28
favorite 0
quote 1
just walk chain but many other technologies that merging tech machine learning satellite data cybersecurity a.r.v. our robotics blocked change our whole forcing transparency on to any platform that exists out there so if you don't start innovating yourself very fast you're probably going to lose out you say it has to be integrated into legacy systems y. and others these are new systems they're replacing existing systems like p.d.p. music file sharing on the web it didn't have to integrate with that's a long playing records or cassette tapes it obliterated that model i love that analogy that's an amazing analogy and i think you're absolutely right some industries are not going to need integration into legacy systems because they will just need to leapfrog as you just pointed out in music why do we need to go back and integrate in certain things unfortunately some industries in the world that not run that way and they are run in the way that current systems work so why change them also have to remember that a lot. these companies run by quarterly numbers and they report to wall street and so
just walk chain but many other technologies that merging tech machine learning satellite data cybersecurity a.r.v. our robotics blocked change our whole forcing transparency on to any platform that exists out there so if you don't start innovating yourself very fast you're probably going to lose out you say it has to be integrated into legacy systems y. and others these are new systems they're replacing existing systems like p.d.p. music file sharing on the web it didn't have to integrate with...
57
57
Jan 18, 2018
01/18
by
CSPAN2
tv
eye 57
favorite 0
quote 0
but this also raises the issue of cybersecurity, the surface is becoming much bigger in terms of the unexpected exception so it is an area where we are working with our governments how we can increase the resilience of our electrical systems in order to minimize such attacks. what kind of measures need to be taken in order to minimize the undeserved attacks in terms of making our systems more vulnerable. this is a serious issue with the electrification and the position of our systems. >> it is something that we focus a lot on here, because as we work to enhance our systems and truly make them more efficient, make the more cost competitive. you realize that you are also building and another level of vulnerability, if you will. one more area of vulnerability i want to bring up, and i speak to a live here in this committee. some years ago when we were more reliant on other nations for our sources of oil, we talked about that vulnerability and it was not only energy vulnerability, but only barely of a security perspective, national security perspective. as you pointed out, we are in a mu
but this also raises the issue of cybersecurity, the surface is becoming much bigger in terms of the unexpected exception so it is an area where we are working with our governments how we can increase the resilience of our electrical systems in order to minimize such attacks. what kind of measures need to be taken in order to minimize the undeserved attacks in terms of making our systems more vulnerable. this is a serious issue with the electrification and the position of our systems. >>...
73
73
Jan 13, 2018
01/18
by
FOXNEWSW
tv
eye 73
favorite 0
quote 0
say your cybersecurity expertly left in the state of hawaii calls you and says we need your help. what would you do at this point to ensure that this never happens again? >> probably the first thing is by the people involved in letting this dog in the first place because i mean, just for what they did. however we have to do is if somebody will implement something like this you have to escalate this it will take higher approval. you cannot release nuclear weapons without authorization to the present. someone cannot do it just because they want to. there should be a system in place that allows people to express these communication systems to say this is the system. you concur, do we have authority to activate? maybe they have those particles and their and if someone did not follow those, it is a training issue. a policy issue. but my goodness! from a digital standpoint, there would be no reason for this to go out for someone to not give authority. >> spoke about the delay in the second message that went out to let people know it was a false alarm. 11 people were already hearing the
say your cybersecurity expertly left in the state of hawaii calls you and says we need your help. what would you do at this point to ensure that this never happens again? >> probably the first thing is by the people involved in letting this dog in the first place because i mean, just for what they did. however we have to do is if somebody will implement something like this you have to escalate this it will take higher approval. you cannot release nuclear weapons without authorization to...
79
79
Jan 11, 2018
01/18
by
CSPAN2
tv
eye 79
favorite 0
quote 1
putin for the meddling in democracies and move to cybersecurity and electoral procedures. they understand russia was actively engaged in and during the referendum they had the energy supplies to form the public about the activities of the security services and strengthen the defense against cyber attacks and disinformation.yb the countries have been particularly good at focusing on their individual citizens and empowering them with the thinking skills to fight this information foinformation for en incorporated into its primary schools the curriculum to teach digital competency including how to differentiate between the reliable and unreliable sources even one of the most popular cartoon characters that has been recruited to help children learn about the dangers of fake news the need to check the sources of information. in germany all political parties and 2016 accept, you guessed it, agreed not to use these tools in their campaigning. they warned in a major address at the fake news and disinformation tactics the interior ministry also proposed the creation of a center of d
putin for the meddling in democracies and move to cybersecurity and electoral procedures. they understand russia was actively engaged in and during the referendum they had the energy supplies to form the public about the activities of the security services and strengthen the defense against cyber attacks and disinformation.yb the countries have been particularly good at focusing on their individual citizens and empowering them with the thinking skills to fight this information foinformation for...
67
67
Jan 16, 2018
01/18
by
CSPAN2
tv
eye 67
favorite 0
quote 0
we must take action to protect her critical infrastructure from cybersecurity attacks and ensure the security of energy. a good and networks are under constant cyber attacks from 2012 in 2016, reported cyber incidents against you is critical infrastructure more than doubled pics and now that our vulnerabilities have been exposed by various attempts including russians to attack a electricity grid, cyber threats to longer just a threat. we have been hacked and we must take additional steps to protect our energy infrastructure. i very much appreciate the chair master, to the pacific northwest to see some of the latest and greatest both technologies and approaches to cybersecurity, and she and i have worked on legislation and we passed out of the senate. we are just hopeful that sometimes our colleagues in the house will make this a priority and move forward on working in a bicameral basis on cybersecurity since its infrastructure so important. obviously diversify our energy mix is another key part of the energy security puzzle, and security needs minimizing the consequences of climate i
we must take action to protect her critical infrastructure from cybersecurity attacks and ensure the security of energy. a good and networks are under constant cyber attacks from 2012 in 2016, reported cyber incidents against you is critical infrastructure more than doubled pics and now that our vulnerabilities have been exposed by various attempts including russians to attack a electricity grid, cyber threats to longer just a threat. we have been hacked and we must take additional steps to...
120
120
Jan 16, 2018
01/18
by
MSNBCW
tv
eye 120
favorite 0
quote 0
first is, active defense a component of the defendant's planned cybersecurity assistance to the private sector? >> it is. yes, sir. but as you say, there is wide disagreement with respect to what it means. what we mean is we want to provide the tools and resources to the private ivate sector to t their systems. if we are aware or can anticipate a given threat, and we've gone to great lengths this year to work with the intel community to also include otherwise classified information with respect to malware, botnets and other instexfections. we want the private sector to actively defend themselves before they are attacked. >> do you believe that current law imposes any unnecessary constraints on the private sector's ability to deploy active defense? >> i would say that i'd be happy to work with your staff. it's rather complicated, as you know. there's some limitations with respect to liability. there's other questions with respect to insurance. we do need to continue to work with the private sector to understand if there are any barriers that would prevent them from taking measures to pr
first is, active defense a component of the defendant's planned cybersecurity assistance to the private sector? >> it is. yes, sir. but as you say, there is wide disagreement with respect to what it means. what we mean is we want to provide the tools and resources to the private ivate sector to t their systems. if we are aware or can anticipate a given threat, and we've gone to great lengths this year to work with the intel community to also include otherwise classified information with...
135
135
Jan 16, 2018
01/18
by
FOXNEWSW
tv
eye 135
favorite 0
quote 0
i would want to turn to the issue of cybersecurity.tically important part of the department's mission and one that demands close attention. last month the assistant secretary for sapa security and communications announced that dhs is planning to significantly expand its engagement with the private sector to combat threats like the 2017 cyberattack which was attributed to north korea. can you provide specific examples of how you expect dhs's cybersecurity collaboration with the private sector to change following last month's announcement? >> sure, i will keep it short because i would be happy to talk about this all day and all the great things we're doing. if general we're looking to do a couple of things. we have as you know an automated indicator sharing program. we're looking to make sure that once we have' identified threats we can disseminate that in not only a way that's actionable but tail ored to different companies and different sectors and working with the private sector to understand that's critical. traditionally we've looke
i would want to turn to the issue of cybersecurity.tically important part of the department's mission and one that demands close attention. last month the assistant secretary for sapa security and communications announced that dhs is planning to significantly expand its engagement with the private sector to combat threats like the 2017 cyberattack which was attributed to north korea. can you provide specific examples of how you expect dhs's cybersecurity collaboration with the private sector to...
35
35
Jan 6, 2018
01/18
by
BLOOMBERG
tv
eye 35
favorite 0
quote 0
we have a very good footprint in the cybersecurity enterprise. those are growing.quarter, the billings in the enterprise software grew 20%. we are announcing really big design wins. i am hoping to see more, and you should expect to see more. when we married the two together in the future, we are going to have a platform of security for iot management. as i said, i am excited about the future of the company. we are executing to it. we are showing results. it is not just the strategy or piece of paper like the first time you when i spoke. now, we are really delivering. i am very pleased we are doing that. emily: that was john chen. coming up, the iranian government is cracking down on social media, as ways of protests gripped the country. a reminder, all episodes are now live streaming on twitter. this is bloomberg. ♪ emily: welcome back to the "best of bloomberg technology." i am emily chang. antigovernment protests have swept across iran this week. technology is playing a crucial role. is to grow is blocked in the country. we talked about this with a former analyst
we have a very good footprint in the cybersecurity enterprise. those are growing.quarter, the billings in the enterprise software grew 20%. we are announcing really big design wins. i am hoping to see more, and you should expect to see more. when we married the two together in the future, we are going to have a platform of security for iot management. as i said, i am excited about the future of the company. we are executing to it. we are showing results. it is not just the strategy or piece of...
33
33
Jan 6, 2018
01/18
by
BLOOMBERG
tv
eye 33
favorite 0
quote 0
we have a very good footprint in the cybersecurity enterprise. growing.the billings in the enterprise software grew 20%. we are announcing really big design wins. more, and you see should expect to see more. when we married the two together in the future, we are going to have a platform of security for iot management. as i said, i am excited about the future of the company. we are executing to it. we are showing results. oris not just the strategy piece of paper like the first time you when i spoke. now, we are really delivering. i am very pleased we are doing that. emily: that was john chen. up, the iranian government is cracking down on social media, as ways of protests gripped the country. a reminder, all episodes are now live streaming on twitter. this is bloomberg. ♪ retail. under pressure like never before. and it's connected technology that's moving companies forward fast. e-commerce. real time inventory. virtual changing rooms. that's why retailers rely on comcast business to deliver consistent network speed across multiple locations. every corpor
we have a very good footprint in the cybersecurity enterprise. growing.the billings in the enterprise software grew 20%. we are announcing really big design wins. more, and you see should expect to see more. when we married the two together in the future, we are going to have a platform of security for iot management. as i said, i am excited about the future of the company. we are executing to it. we are showing results. oris not just the strategy piece of paper like the first time you when i...
50
50
Jan 3, 2018
01/18
by
BLOOMBERG
tv
eye 50
favorite 0
quote 0
we have a very good footprint in the cybersecurity enterprise for regulated industry in we generate growththe right area. particular, like the banks and governments and health care. those are growing. last quarter, we announced our billings on the enterprise software grew 20%. qnx organization, focusing on design wins, we are announcing big design wins. i'm hoping to see more, and you should expect to see more. when we marry the two together in the future, we are going to have a platform of security for iot management. said, i'm very excited about the future of the company. we are executing to it. we are showing the results. so, it's not just a strategy on a piece of paper, like the first time you and i spoke. now we are really delivering. vein of thee questions i have to ask, john, you've been on the board of disney for more than a decade now. i'm curious what you think of the acquisition of the fox asset, a massive acquisition, and how you see that setting disney up for the future. john: well, you have to ask that. you know i never answer questions about disney. any questions about disne
we have a very good footprint in the cybersecurity enterprise for regulated industry in we generate growththe right area. particular, like the banks and governments and health care. those are growing. last quarter, we announced our billings on the enterprise software grew 20%. qnx organization, focusing on design wins, we are announcing big design wins. i'm hoping to see more, and you should expect to see more. when we marry the two together in the future, we are going to have a platform of...
91
91
Jan 17, 2018
01/18
by
CNBC
tv
eye 91
favorite 0
quote 0
. >> in terms of cybersecurity, surely that must be a threat that evolved over the last decade or so has it featured high in the global risk report >> it's jumped up, but now cys r cyber is in the top five in terms of overall global risks and has been rising. does that play into the geopolitical context >> absolutely. one key underpinnings of the growth of cyberrisk in the survey is the likely increase in state sponsored attacks, so a clear connection between geopolitics and cyberrisk. >> i guess the bigger question is whether government is, and central banks have the right equipment in the toolbox to manage the next challenges when they arise what is your view when it comes to that? >> a couple concerns multilateral institutions and agreements have been waning, as the more nationalist politics has taken hold so more protectionism, less liberal multilateralism. that could be a problem in responding to risk the other issue is central banks are usually responding by lower interest rates, and there's really nowhere to go with interest rates now if there was an economic crisis, it would
. >> in terms of cybersecurity, surely that must be a threat that evolved over the last decade or so has it featured high in the global risk report >> it's jumped up, but now cys r cyber is in the top five in terms of overall global risks and has been rising. does that play into the geopolitical context >> absolutely. one key underpinnings of the growth of cyberrisk in the survey is the likely increase in state sponsored attacks, so a clear connection between geopolitics and...
131
131
tv
eye 131
favorite 0
quote 0
was just a laughingstock when it comes to cybersecurity.he might as well have been clicking random viagra ads. it was so reckless. cnn publish as story saying yahoo! is hacked. five days later she is sending classified information about syria to her yahoo! email address. sending passwords in plain text. it is reckless. when the dnc gets hacked, they're so mad, they're talking about what an outrage it is but this is how hacks happen. gerri: right. >> so they're kind of losing the sympathy on that. if they want to put their own party data at risk with recklessness that's fine but this is national security stuff. gerri: right. >> there is real cognitive dissew dense here. democrats don't seem to care about hacking. >> that happens. people talk about both sides of their mouth. who was actually weighing in pretty heavily on this today? it is the president. here is what he tweeted. "crooked hillary" clinton top aide huma abedin is accused of disregarding basic security protocols. she put passwords into the hands of foreign agents. remember sailor
was just a laughingstock when it comes to cybersecurity.he might as well have been clicking random viagra ads. it was so reckless. cnn publish as story saying yahoo! is hacked. five days later she is sending classified information about syria to her yahoo! email address. sending passwords in plain text. it is reckless. when the dnc gets hacked, they're so mad, they're talking about what an outrage it is but this is how hacks happen. gerri: right. >> so they're kind of losing the sympathy...
54
54
Jan 12, 2018
01/18
by
BLOOMBERG
tv
eye 54
favorite 0
quote 0
senate, according to the cybersecurity firm trend micro, saying -- nicknamed fancy bare is trying together the emails of america's political elite, looking for confidential information to leak. food shortages in venezuela that have left three people dead and 16 injured. -- ofesident of the cattle ranchers says at least two farms were attacked by mobs of people who slaughtered cows. a mobo on twitter showing attacking -- with a machete. months of political stalemate according to people familiar with discussions -- angela merkel and the social democratic party as a tentative plan to form a new government. it includes more government involvement in education and changes to health insurance, but no tax hikes. global news, 24 hours a day. powered by more than 2700 journalists and analysts in more than 120 countries. i'm mark, this is bloomberg. >> it is noon in new york, 5:00 p.m. in london, and 1:00 a.m. in hong kong. welcome to bloomberg markets. shery: from bloomberg world headquarters in new york, these are the top stories. the two-year treasury yield topped 2% for the first time since 2008
senate, according to the cybersecurity firm trend micro, saying -- nicknamed fancy bare is trying together the emails of america's political elite, looking for confidential information to leak. food shortages in venezuela that have left three people dead and 16 injured. -- ofesident of the cattle ranchers says at least two farms were attacked by mobs of people who slaughtered cows. a mobo on twitter showing attacking -- with a machete. months of political stalemate according to people familiar...
73
73
Jan 30, 2018
01/18
by
CSPAN3
tv
eye 73
favorite 0
quote 0
cybersecurity. here are the ten things that you should follow for good cybersecurity hygiene. somewhere it seems to me that we need this protocol list of here's what emergency response should look like, and here are the safeguards that should be in place. whether you're talking about a county or a state or, you know, the federal system. because we're going to keep marching ahead. we need the information. we desperately want this kind of -- when it's an earthquake, you only have, you know -- you might only have minutes to respond. and because as i said this article about the big one in the northwest, we want to see the state and information. we also want to make sure like the things that happened in hawaii also have new safeguards for false alarms. and i remember senator inoway talking about a previous moment in hawaii history prior to this technology where they had -- i think it went on for hours, he said they thought a tsunami wave was going to hit. so this went on for hours and hours. that's why w
cybersecurity. here are the ten things that you should follow for good cybersecurity hygiene. somewhere it seems to me that we need this protocol list of here's what emergency response should look like, and here are the safeguards that should be in place. whether you're talking about a county or a state or, you know, the federal system. because we're going to keep marching ahead. we need the information. we desperately want this kind of -- when it's an earthquake, you only have, you know -- you...
20
20
Jan 12, 2018
01/18
by
CSPAN2
tv
eye 20
favorite 0
quote 0
. >> with respect to the airline miles i was wondering in terms of cybersecurity we are not the only nation under threat. our nato allies are in just as much danger as we are and responding in different ways going to paper to shut down internet voting. what have you learned in your world travels in other countries as well? >> i attended a conference in the hague this summer there were a number of democracies they are talking about the threats that they face but none of them were focused that they want to say we can look at security features but what sort of things can we do sure the citizens can still cast their ballots? they have more resources than the united states puts into the election but for the most part it is a continuing threat but i think of that as things change the security measures need to change as well. we are not going towards internet voting anytime soon but we are looking at redoing the security measures that have been put in place to talk about what things manufacturer should look at as they go to be certified. looking back on 2000 the election is run differently
. >> with respect to the airline miles i was wondering in terms of cybersecurity we are not the only nation under threat. our nato allies are in just as much danger as we are and responding in different ways going to paper to shut down internet voting. what have you learned in your world travels in other countries as well? >> i attended a conference in the hague this summer there were a number of democracies they are talking about the threats that they face but none of them were...
169
169
Jan 31, 2018
01/18
by
MSNBCW
tv
eye 169
favorite 0
quote 0
. >> jay, we want to talk to you about cybersecurity, but we've run out of time. can we have you back to talk about cybersecurity? >> understood. >> thank you very much. former dhs secretary, jay johnson, thanks for your time. >>> we're going to continue following this conversation. next we'll talk about the politics of the memo. we're here to find out what's going on between capitol hill and the white house and was there potentially any sort of coordination between the two in order to get this memo out there? smile dad. i take medication for high blood pressure and cholesterol. but they might not be enough to protect my heart. adding bayer aspirin can further reduce the risk of another heart attack. because my second chance matters. be sure to talk to your doctor before you begin an aspirin regimen. >>> we're still following that breaking news out of virginia. we are told the congressmen's buses are on their way to the event. the president also just brought reporters in for a spray, as we call it, on taxes. he'll probably mention the train crash. and when he does
. >> jay, we want to talk to you about cybersecurity, but we've run out of time. can we have you back to talk about cybersecurity? >> understood. >> thank you very much. former dhs secretary, jay johnson, thanks for your time. >>> we're going to continue following this conversation. next we'll talk about the politics of the memo. we're here to find out what's going on between capitol hill and the white house and was there potentially any sort of coordination between...
62
62
Jan 31, 2018
01/18
by
CSPAN2
tv
eye 62
favorite 0
quote 0
it's got a bike zero day viruses in cybersecurity speak. cybersecurity protections, antivirus is only as good as what has been seen for in terms of malware. the only way to get in front of that is to combine really smart threat analyst on whatever threat act it is that's out there with the technologists, and his companies that do that do better in terms of getting a foot of these actions. >> what's your assessment of the companies here and others in the united states? >> yeah, i think facebook and google i've seen massive increases and much more success in that space. i think twitter gets beat oftentimes picnicking continue to get beat because they rely too heavily on technology. i don't think the partnerships they need to adequately get out in front of them. >> if i could respond to that because, you said it twice and it disagree. i think there are many external researchers who have said that a lot of this terrorist content doesn't come has moved off of our platform. the average isis account in 2014 at 177 followers. now they have 14. they
it's got a bike zero day viruses in cybersecurity speak. cybersecurity protections, antivirus is only as good as what has been seen for in terms of malware. the only way to get in front of that is to combine really smart threat analyst on whatever threat act it is that's out there with the technologists, and his companies that do that do better in terms of getting a foot of these actions. >> what's your assessment of the companies here and others in the united states? >> yeah, i...
102
102
Jan 13, 2018
01/18
by
CNNW
tv
eye 102
favorite 0
quote 0
. >>> next, a cybersecurity firm tracking russian hackers, the same who stole dnc party e-mails says the group now has a new u.s. target in its sights. we'll tell you who it is next. - [narrator] you hope nobody knows it's you. (toots) but you know it's you. so know this. the activated charcoal in charco caps adsorbs gas for fast gas relief without passing the gas. charco caps: put less boom in the room. for fast gas relief without passing the gas. he's a nascar champion who's she's a world-class swimmer who's stared down the best in her sport. but for both of them, the most challenging opponent was... pe blood clots in my lung. it was really scary. a dvt in my leg. i had to learn all i could to help protect myself. my doctor and i choose xarelto® xarelto®... to help keep me protected. xarelto® is a latest-generation blood thinner... ...that's proven to treat and reduce the risk of dvt and pe blood clots from happening again. in clinical studies, almost 98% of patients on xarelto® did not experience another dvt or pe. here's how xarelto works. xarelto® works differently. warfarin int
. >>> next, a cybersecurity firm tracking russian hackers, the same who stole dnc party e-mails says the group now has a new u.s. target in its sights. we'll tell you who it is next. - [narrator] you hope nobody knows it's you. (toots) but you know it's you. so know this. the activated charcoal in charco caps adsorbs gas for fast gas relief without passing the gas. charco caps: put less boom in the room. for fast gas relief without passing the gas. he's a nascar champion who's she's a...
69
69
Jan 11, 2018
01/18
by
CSPAN3
tv
eye 69
favorite 0
quote 0
putin for his meddling in democracies and move to strengthen cybersecurity and e electoral procedures. they understand that russia was actively engaged in the uk with twitter accounts during the brexit referendum. the baltic states have diversified supplies, informed their public about the activities of russia security services and strengthened defenses against cyberattacks and disinformation. the nordic countries have been particularly good on focusing on their individual citizens and empowering them with the critical thinking skills to fight this information. for example, sweden incorporated into its primary schools a curriculum to teach digital competency including how to differentiate between reliable and unreliable sources. even bansu, the bear, one of sweden's most popular cartoon characters, has been recruited to help children learn about the dangers of fake news and the need to cross-check sources of information. and in germany, all political parties in 2016 except, you guessed it, afd, agreed not to use bugs and paid trolls in their campaigning. chancellor merkel warned in a
putin for his meddling in democracies and move to strengthen cybersecurity and e electoral procedures. they understand that russia was actively engaged in the uk with twitter accounts during the brexit referendum. the baltic states have diversified supplies, informed their public about the activities of russia security services and strengthened defenses against cyberattacks and disinformation. the nordic countries have been particularly good on focusing on their individual citizens and...