22
22
tv
eye 22
favorite 0
quote 0
i.t. network came under a fresh attack russian hackers were allegedly also to blame. chief political correspondent linda. said despite what we've just heard the government says no sensitive data has been leaked one of the main. they mean that so far what we know is that most of this data is data of a personal nature as you heard in the report that means maybe credit card numbers private e-mail addresses apparently a chat or two now the authenticity to city of the data that has that has been seen could not yet all be confirmed it may be that some of. these items are in fact falsified but any rate this differs from those previous attacks as we just heard those were attacks on the physical infrastructure of the german government of the parliament that is not the case here so that's why so far at least it appears that the information is of a personal nature and doesn't for instance relate to diplomatic or political sensitive information and so what has been the german government's response well the cyber defense coordinating body which is essentially a unit that brings to
i.t. network came under a fresh attack russian hackers were allegedly also to blame. chief political correspondent linda. said despite what we've just heard the government says no sensitive data has been leaked one of the main. they mean that so far what we know is that most of this data is data of a personal nature as you heard in the report that means maybe credit card numbers private e-mail addresses apparently a chat or two now the authenticity to city of the data that has that has been...
29
29
tv
eye 29
favorite 0
quote 0
i.t. network was not compromised and are looking at where the information came from the intent remains unclear some politicians are demanding action. and what i heard shocked me this is a grave attack on democracy in our country. there are massive problems in our digital security architecture we put tensions haven't looked off as enough in recent years the government has grown and neglected that if . we have to take action this is a turning point. all right this is a turning point a need for action very clear message there from german lawmakers we have our political correspondent maximiliano with us here in studio she's following the latest developments on the story for us max what are authorities saying about this hack and this leak what are they saying about what's been published and what they found out so far who's behind this well the german federal information security agency has said yesterday they have been meeting with intelligence services and they're also we know been working together with for example of the american intelligence services to investigate that data leak it was quite si
i.t. network was not compromised and are looking at where the information came from the intent remains unclear some politicians are demanding action. and what i heard shocked me this is a grave attack on democracy in our country. there are massive problems in our digital security architecture we put tensions haven't looked off as enough in recent years the government has grown and neglected that if . we have to take action this is a turning point. all right this is a turning point a need for...
23
23
tv
eye 23
favorite 0
quote 0
i.t. network was not compromised and they're looking at where the information came from the intent remains unclear some politicians are demanding action but what i heard shocked me this is a grave attack on democracy in our country. there are massive problems in our digital security architecture we put tensions haven't looked off as enough in recent years can we commit to the government has gross and neglected its if you find nothing this least we have to think. this is a turning point for more of the story we're joined in story here by is of us she is an expert on cyber security currently at berlin's digital society institute's isabel thanks for joining us here as we mentioned the cyber security agency the b.s.i. as it's called here in germany this is agency is defending itself right now saying it couldn't connect the dots between the information that they were seeing leaked and also that they only realized the extent of the sleek yesterday what do you make of that. yeah so i think right now we don't have enough information to judge their exact behavior but what we do know is that in earl
i.t. network was not compromised and they're looking at where the information came from the intent remains unclear some politicians are demanding action but what i heard shocked me this is a grave attack on democracy in our country. there are massive problems in our digital security architecture we put tensions haven't looked off as enough in recent years can we commit to the government has gross and neglected its if you find nothing this least we have to think. this is a turning point for more...
30
30
tv
eye 30
favorite 0
quote 0
i.t. network was not compromised and they're looking at where the stolen information came from the intent though remains unclear. it come on i mean yes we have abuse difficult to make money with this daughter because most is already publicly available so there's limited black mode which i'm sure we used to speak of activism but we'll see what the investigation turns up middle ne of years maximally on the kosik has been tracking the story for us she joins me now in studio max you heard there german authorities they've known about this for weeks why did it take them so long why didn't we know about this sooner well it's not uncommon for investigators for something current a case is to keep the public uninformed for certain terms of like keeping the investigation going like strategic reasons bus in this crisis rather problematic because they said they knew by mid december when the initial publication of the lings where the data was circulated with became public but the early yesterday stated that the now looking into it they had yesterday crisis meeting with the intelligence services and the
i.t. network was not compromised and they're looking at where the stolen information came from the intent though remains unclear. it come on i mean yes we have abuse difficult to make money with this daughter because most is already publicly available so there's limited black mode which i'm sure we used to speak of activism but we'll see what the investigation turns up middle ne of years maximally on the kosik has been tracking the story for us she joins me now in studio max you heard there...
79
79
Jan 4, 2019
01/19
by
LINKTV
tv
eye 79
favorite 0
quote 0
i.t. network came under a fresh attack. brent: i'm joined by our political correspondent. the government saying that no sincere data was taken or published, right? what does that mean? >> it means in the end that no data was published that could breach national security. most of the data we've seen today -- well, some of it because there's a whole mass of it -- most of it is private content. cell phone numbers, pictures, chat protocol from facebook and whatsapp and other social media channels -- could go as far as some real estate account details , not only politicians but also public figures such as artists and writers and other people. it is not sensitive for national security, but could be quite sensible information for personal people. brent: private information could be embarrassing for some people, but it happened a month ago. it has been on the internet for weeks. why are we just finding out? >> that's the big question everyone is asking. we have learned about the national cyber defense unit holding a special meeting now at this moment, and everybody is wondering wh
i.t. network came under a fresh attack. brent: i'm joined by our political correspondent. the government saying that no sincere data was taken or published, right? what does that mean? >> it means in the end that no data was published that could breach national security. most of the data we've seen today -- well, some of it because there's a whole mass of it -- most of it is private content. cell phone numbers, pictures, chat protocol from facebook and whatsapp and other social media...
45
45
tv
eye 45
favorite 0
quote 0
i.t. network came under a fresh attack russian hackers were allegedly also to blame. well let's get more on this from v.w. social media. chief political correspondent bill and clay welcome both let's start with you melinda the government says no sensitive data data has been linked to what does that mean that means that most of this data or so far all that has been reviewed appears to be personal data things like cell phone numbers facebook posts you heard in the report a number that supposedly is the chancellor's fax number this is not the kind of attack that we have seen here in germany in the past as just described attacks on the actual i.t. infrastructure of the german government of the parliament this appears to be quite different and for that reason possibly somewhat limited risk in comparison to those other attacks but again it's early days we don't know the full scope yet and what is being made of the fact that the only political party untouched by this is the right wing populist i have to say. well of course one of the first speculations that was put out there
i.t. network came under a fresh attack russian hackers were allegedly also to blame. well let's get more on this from v.w. social media. chief political correspondent bill and clay welcome both let's start with you melinda the government says no sensitive data data has been linked to what does that mean that means that most of this data or so far all that has been reviewed appears to be personal data things like cell phone numbers facebook posts you heard in the report a number that supposedly...
SFGTV: San Francisco Government Television
38
38
Jan 31, 2019
01/19
by
SFGTV
tv
eye 38
favorite 0
quote 0
i.t. operations, network and facilities. so the dph security and privacy team was started in 2016. a chief information security officer should be on board by the end of the month or the beginning of february. this will be our first information security officer. it was established in the beginning of 2018 we had act being chief information security officers to this point and it will be our first i'll tell you what they are responsible for. the chief information security officers has a team that report up to them and for business continuity and ensuring annual audits for security are performed and any findings discovered that have to be mitigated. the team also worked with the county of san francisco. 567bd operation have been on the service team and the epic team creation and support of the third-party systems to bring full functionality of epic. and we experienced staff last year and established the epic bill team from operations and within i.t. and people who v volunteered and we did assessments and sent them for training and they're working on the epic project today. the next two
i.t. operations, network and facilities. so the dph security and privacy team was started in 2016. a chief information security officer should be on board by the end of the month or the beginning of february. this will be our first information security officer. it was established in the beginning of 2018 we had act being chief information security officers to this point and it will be our first i'll tell you what they are responsible for. the chief information security officers has a team that...
336
336
Jan 23, 2019
01/19
by
CNBC
tv
eye 336
favorite 0
quote 0
founder of health care scene which is a network of health care i.t., a world i discovered that man is cool. i will read one. juldy is the owner of epic if she was to sell apple is an interesting acquire. apple has more trust in handling data than most technology companies. is it enough probably not today i think judy still trusts her accept and epic to protect their clients data a thousand times more than trusting apple to do so end quote. that was so thoughtful and constructive point, really liked it. if you are running electronic health care apple is ideal because they're trusted by consumers and they want you not the doctors or hospitals, but you to be empoured at the end of the day the electronic health records won't work the way they're supposed to, something many critics refuse to admit. it's plain as day to anyone in the system not that you can't transfer directly from one system to another. this also means you can't track outcomes to measure what works and what doesn't because you have separate silos of data and there's no incentive for any pl
founder of health care scene which is a network of health care i.t., a world i discovered that man is cool. i will read one. juldy is the owner of epic if she was to sell apple is an interesting acquire. apple has more trust in handling data than most technology companies. is it enough probably not today i think judy still trusts her accept and epic to protect their clients data a thousand times more than trusting apple to do so end quote. that was so thoughtful and constructive point, really...
73
73
Jan 30, 2019
01/19
by
BLOOMBERG
tv
eye 73
favorite 0
quote 0
jorgen: we have for a long time had a multivendor strategy within networks and i.t.. , nokia and the rest. we have all of these players in our networks globally. we have already one find the pilot going with huawei. yesterday, we announced the next one with ericsson. our plan is to have several 5g pilots before we go into a more operational and commercial phase, probably after 2020. it is exciting and we need to work with several in order to get the innovation up and the right fit. francine: will you work less with huawei in the future, and if you do, are you worried about possible repercussions? are you possibly worried about some of the equipment that they make going up? : i think we are facing a big issue and a complex situation. what we do is try to listen to experts, listen to governments. we will obviously comply with whatever decisions are made, but and we a vast portfolio, are also very focused on the innovation part here and motivated to keep relationships as long and as good as we can with several lenders. talk to me about your relationship with the activist
jorgen: we have for a long time had a multivendor strategy within networks and i.t.. , nokia and the rest. we have all of these players in our networks globally. we have already one find the pilot going with huawei. yesterday, we announced the next one with ericsson. our plan is to have several 5g pilots before we go into a more operational and commercial phase, probably after 2020. it is exciting and we need to work with several in order to get the innovation up and the right fit. francine:...
32
32
tv
eye 32
favorite 0
quote 0
very successful company that operates in many different sectors from data analysis to mobile networks and also i.t. in general and especially in african countries and middle eastern countries so you know how to make things work what is the most important aspect in your opinion. i guess i'm no different than anyone else wanting to go into these markets i think the trick is like me going to russia and doing business same thing a vice anyone wanting to come to this market says you need to physically come and on the stand and understand the game on the sun how the culture works is each country in africa you've got fifty four countries each one has got its own culture regulations so you can't generalize one rule and this is what we did when i even expanded into africa i actually went to these key countries on it operate in to understand how the system actually works is there a need for the products and services that we do we understand who the key players are we try to partner with them and this was our entry to the market and of course you invest you with the people on the ground you hire local people
very successful company that operates in many different sectors from data analysis to mobile networks and also i.t. in general and especially in african countries and middle eastern countries so you know how to make things work what is the most important aspect in your opinion. i guess i'm no different than anyone else wanting to go into these markets i think the trick is like me going to russia and doing business same thing a vice anyone wanting to come to this market says you need to...
88
88
Jan 6, 2019
01/19
by
MSNBCW
tv
eye 88
favorite 0
quote 0
i.t. guy was like, i want to meet the guy who did this, the networking system. he was kind of a legend in the i.t. world. >> he was so good, that cisco systems invited him to move to raleigh and work for the company. smart guy. >> smart guy. >> but if nancy was to go with him to america, for immigration reasons, they had to be married. so in the fall of 2000, they said their vows, an intimate family affair. >> how did she feel about going to north carolina? >> a little apprehensive at first. lots of tears at the airport. fear of the unknown. but i think she was excited. >> and a few years later there were two bmws in the driveway, nancy had a vast circle of friends and brad a bright future at cisco where he'd become an expert in the marriage of internet technology and telephones. one of just 152 such experts in the whole world. and best of all, two little girls, bella, born in 2004, katie, two years later. >> the best mother i've ever seen. she played and played and played. she was just so hands-on. >> and now they were putting up missing posters. sunday went by,
i.t. guy was like, i want to meet the guy who did this, the networking system. he was kind of a legend in the i.t. world. >> he was so good, that cisco systems invited him to move to raleigh and work for the company. smart guy. >> smart guy. >> but if nancy was to go with him to america, for immigration reasons, they had to be married. so in the fall of 2000, they said their vows, an intimate family affair. >> how did she feel about going to north carolina? >> a...
54
54
Jan 19, 2019
01/19
by
BLOOMBERG
tv
eye 54
favorite 0
quote 0
i.t. to where intellectual property, software capabilities are passed up through the network, historicallyu could have those networks or that software located in various locations and serve it up to across customers countries. as rules get more strict, that requires not just i.t. but delivery of i.t. in many cases local to a country. if you had a data center for example in the eu serving everyone including the u.k., as of brexit, you would now need to have data centers in the u.k. and also in the eu. that is just one issue with all of that. but there are a broader set of issues. you probably hear the term " gdpr." you and youruse customers concern about the viability of the region? and demand for ongoing robust demand for your products? answer your question, the simple answer is no. with that said, within the context of that question are complexities. the ability now to go deliver on it becomes a bit more difficult than it was before. for example, you have certain rules where you can actually have employee data, if you were a bank based in germany. and you had employees in the u.k., you do
i.t. to where intellectual property, software capabilities are passed up through the network, historicallyu could have those networks or that software located in various locations and serve it up to across customers countries. as rules get more strict, that requires not just i.t. but delivery of i.t. in many cases local to a country. if you had a data center for example in the eu serving everyone including the u.k., as of brexit, you would now need to have data centers in the u.k. and also in...
136
136
Jan 22, 2019
01/19
by
FOXNEWSW
tv
eye 136
favorite 0
quote 0
i.t. guy built it into a communications network, installing spyware on a blackberry devices, to keep trackwives and mistresses, and one quote, el chapo told a mistress to buy kilos. and that way you can make another trip, love. el chapo's secretary testified that the cartel leader bribed the mexican military, police and politicians including former mexican president and rake and rake opinion at toe, paying him $1 million, wiretapped phone conversations and also in one exchange, telling his lieutenant, clip heating up cricket cops expected of stealing from them. >> you already beat them up once, they should listen now. >> but in a scapegoat for corrupt mexican government in cahoots with the real mastermind, his partner. a fugitive at large. >> bret: thank you. to the senate sets a date for a vote on legislation to end the partial government shutdown. a democrats are lining up against it, what about the shutdown will get reaction from flannel we come back. ♪ go ahead, ask it a question. tecky, can you offer low costs and award-winning full service with a satisfaction guarantee, like schwab?
i.t. guy built it into a communications network, installing spyware on a blackberry devices, to keep trackwives and mistresses, and one quote, el chapo told a mistress to buy kilos. and that way you can make another trip, love. el chapo's secretary testified that the cartel leader bribed the mexican military, police and politicians including former mexican president and rake and rake opinion at toe, paying him $1 million, wiretapped phone conversations and also in one exchange, telling his...
74
74
Jan 5, 2019
01/19
by
CSPAN
tv
eye 74
favorite 0
quote 0
i.t. person who is analyzing the network of a source that is visiting secure drop, news organization dot-com. and just with that information you can implicate a source. this is a new problem, modern problem in source protection. to be listed in our public directory as sort of an endorsed secure drop instance, because we don't own any of them. these are all independent instances, you have to fulfill that requirement. a certain level of security has to be on that actual tip page that will direct your sources. because we're not only interested in protecting the news organization, we're also interested in protecting the source. we take some of that on in our public documentation. robert: talking about individuals. we're talking about people. and it's interesting what you said that 12 years ago when you started out as a journalist you didn't know what source protection was, anyone was coming after you. i can assure you if you had been russian, chinese, vietnamese, working in the middle east, you would know because you saw your colleagues, your friends, your family jailed or otherwise oppressed or
i.t. person who is analyzing the network of a source that is visiting secure drop, news organization dot-com. and just with that information you can implicate a source. this is a new problem, modern problem in source protection. to be listed in our public directory as sort of an endorsed secure drop instance, because we don't own any of them. these are all independent instances, you have to fulfill that requirement. a certain level of security has to be on that actual tip page that will direct...
89
89
Jan 20, 2019
01/19
by
BLOOMBERG
tv
eye 89
favorite 0
quote 0
i.t. to the cloud come over intellectual property, software capabilities are passed up through the networkhistorically you can have those networks or that software located in various locations and service up to various customers across countries. now as privacy rules get stricter and stricter, that requires not just i.t. come up with the delivery of i.t. in many cases local to the country. if you had a data center in the u.k.,ving everyone in the as of brexit you would now need to have data centers in the u.k. and the eu. that is only one issue with all of that. but there are a broader set of issues. you probably hear the term gdpr. but there are a bunch of issues coming up in europe that are significant. reporter: do they cause you and your customers concern about the andility of the region , robustor ongoing demand for your products? reporter: the simple answer to your question is no. there are complex -- guest: the simple answer to your question is no. there are complexities. you have certain rules where you can actually have employee data -- if you are a bank raised in germany and had
i.t. to the cloud come over intellectual property, software capabilities are passed up through the networkhistorically you can have those networks or that software located in various locations and service up to various customers across countries. now as privacy rules get stricter and stricter, that requires not just i.t. come up with the delivery of i.t. in many cases local to the country. if you had a data center in the u.k.,ving everyone in the as of brexit you would now need to have data...
145
145
Jan 21, 2019
01/19
by
KQED
tv
eye 145
favorite 0
quote 0
i.t. guy and built a custom-encrypted commications network that by all accounts was working great until the. approached that guy and turned him into an informant and gave the law enforcement access to te servers which allowed them to record all the conversations chapo was having with basically everyone in his busineas. for the spireware, that was chapo's own doing when he installed commercial spyware on the phones of his wife and mistresses and all those communications were recorded, and the same i.t. guy gave the f.b.i. access to that data as well. >> did chapo react in any way when his voice was playing outer through the cou>>rtroom? o when his crois was playing in the couroom so much. normally he's pretty stoic, staring down witnesses on the witness stand, talking toat attorneys oring his wife's attention in the gallery. his most notable reaction is when hitrs miss was testifying and we were seeing the messages that were both embarrassing an highly incriminating and he sort of hung his head a little bit and seed to be staring down in his lap which is really the n rst time we've sey sign
i.t. guy and built a custom-encrypted commications network that by all accounts was working great until the. approached that guy and turned him into an informant and gave the law enforcement access to te servers which allowed them to record all the conversations chapo was having with basically everyone in his busineas. for the spireware, that was chapo's own doing when he installed commercial spyware on the phones of his wife and mistresses and all those communications were recorded, and the...
SFGTV: San Francisco Government Television
119
119
Jan 31, 2019
01/19
by
SFGTV
tv
eye 119
favorite 0
quote 0
i.t. system audits that we conduct. what we're looking at is the system security around all of our systems network in the city at large. much of that work is not published publicly. simply bauds we flood -- because we need to protect the infrastructure of the city as relates to our network. then we have our whistleblower program. our investigations that are conducted under my review. finally, we have a robust follow-up program on all of our recommendations. we issue every six months until they are closed. as of september 2018, we have implemented 94%, meaning our department implemented 94% of the 2000 plus recommendations issued from july 1, 2010 through july 30, 2018. 99%, which is about 1800 recommendations issued between july 2010 and through june 30, 2016 have been implemented. our department really do great job in my mind of making sure that they are implementing our audit recommendations and following up. during the first six months of the fiscal year, we publicly issue 26 audits and assessments. 11 which are mandated, comet appliance audit such as concession audits at the the airport, franchise fee and those typ
i.t. system audits that we conduct. what we're looking at is the system security around all of our systems network in the city at large. much of that work is not published publicly. simply bauds we flood -- because we need to protect the infrastructure of the city as relates to our network. then we have our whistleblower program. our investigations that are conducted under my review. finally, we have a robust follow-up program on all of our recommendations. we issue every six months until they...
45
45
Jan 29, 2019
01/19
by
ALJAZ
tv
eye 45
favorite 0
quote 0
i.t. all japan he explains why while why technology is unsettling wash i think that the big question here is really around security because if we talk about the upcoming five g. network rollouts you know five g. networks are not just going to be about phones they're going to be about cars they're going to be about factories they're going to be about everything and the prospect of a chinese vendor deploying this in the u.s. or japan or the u.k. is somewhat unsettling for local governments and i think that's really what's driving this so actually in the last five to ten years china has really really evolved and mature and i was in beijing last week and they were showing their five g. networks they could do three gigabits per second the four g. networks can only do fifty megabits per second so there has been quite a substantial improvement in the technology on the chinese side but the u.s. has to rely on a foreign vendor anyways because there's only really three major players in this market who are nokia ericsson and while way still to come on al-jazeera cyprus prepares to host a regional summit we'll tell you how it's coming coping rather with an increase the number of
i.t. all japan he explains why while why technology is unsettling wash i think that the big question here is really around security because if we talk about the upcoming five g. network rollouts you know five g. networks are not just going to be about phones they're going to be about cars they're going to be about factories they're going to be about everything and the prospect of a chinese vendor deploying this in the u.s. or japan or the u.k. is somewhat unsettling for local governments and i...
118
118
Jan 14, 2019
01/19
by
CSPAN3
tv
eye 118
favorite 0
quote 0
network, information technology. in our ports and waterways, there's an explosion of -- supply chains, blockchain technology, integrated i.t. systems. those have created tremendous opportunities for efficiencies but injected tremendous vulnerabilities. with are leveraging our long-term established relationship across american ports with our maritime stakeholders to better understand the risks and consequences and help us effe effectively collectively counter cyber security threats. the coast guard provides tremendous value in that space, that domain of cyber security. because we have broad authorities as a law enforcement agency, because we're a member of the national intelligence community, and because we're an armed force. we operate across the dotmill, the dotcom, got.gov domains. coast guard members are embedded in the dhs national cyber security and communications integration center. we conduct cyber threat hunting, prevent the risk assessments. incident response across the nation's critical infrastructure. look no further than the recent midterm 2018 elections. as part of the dhs team, coast guard members helped safe
network, information technology. in our ports and waterways, there's an explosion of -- supply chains, blockchain technology, integrated i.t. systems. those have created tremendous opportunities for efficiencies but injected tremendous vulnerabilities. with are leveraging our long-term established relationship across american ports with our maritime stakeholders to better understand the risks and consequences and help us effe effectively collectively counter cyber security threats. the coast...
58
58
Jan 8, 2019
01/19
by
CSPAN
tv
eye 58
favorite 0
quote 0
i.t. service organization. we have reduced the number of staff it takes to do the work, but we still have over 400 organizations across the state that touch our networks. today, virtually every one of these organizations is responsible for their own cybersecurity. this is not nearly impossible. i think it is impossible to ask, and it is enormously full of risk. that's why we call for an incremental investment of $16.4 million to centralize and heighten security capabilities and efforts and to help protect against what we have today which is 5.6 million cyberattacks against the state of north dakota every month and even one breach or one financial attack by a bad actor could be far costlier than those trying to shore up that shortfall with that money to fund those it projects and improve public safety and to ensure we can maintain border integrity it is critical infrastructure. just as important as a road or a bridge. it is a necessary investment to protect our citizens' personal and private data. [applause] turning to main street, communities representing more than 1.5 million north dakotans are engaged of the initiatives from main street. exploring w
i.t. service organization. we have reduced the number of staff it takes to do the work, but we still have over 400 organizations across the state that touch our networks. today, virtually every one of these organizations is responsible for their own cybersecurity. this is not nearly impossible. i think it is impossible to ask, and it is enormously full of risk. that's why we call for an incremental investment of $16.4 million to centralize and heighten security capabilities and efforts and to...