Oser Communications Group

OCG Security Daily ASIS September 26, 2013

Issue link: http://osercommunicationsgroup.uberflip.com/i/186561

Contents of this Issue

Navigation

Page 27 of 31

28 Thursday, September 26, 2013 Firetide (Cont'd. from p. 1) Whether it's remote learning or public surveillance/safety, video is no longer data's stepson. It's taking its place at the head of the table. Companies are not looking for networking vendors that can handle video, but those that can transport and support it seamlessly because they're built from the ground up with video in mind. Control Risks (Cont'd. from p. 8) Meanwhile, IT–accepted as owning the risk–does not typically treat the nontechnical aspects with the comprehensive approach they deserve. Information security broadly, and digital security more specifically, are a mix of physical, technical and human elements, but the current risk-owners can only manage one leg of this tripod on their own. According to the DBIR, 37 percent of records lost in the studied attacks were the result of social engineering. Many of these, including the particularly damaging and precisely targeted attacks called "spear phishing," could be mitigated by an enterprise-wide security program that Excelsior College (Cont'd. from p. 1) the results to better inform practitioners and others about the mechanisms, attitudes and challenges associated with cybersecurity. Our work will also enhance Excelsior's own cybersecurity programs. OSD: We hear a lot about cybersecurity, cyber warfare and cyber terrorism. Why is this so important? JLC: Concern about our nation's cyber assets isn't new, but I think it has become more visible for two reasons: hackers are becoming more sophisticated, and it has been in the media more frequently. Millions of transactions take place daily, personal information and other sensitive data are kept in corporate servers, and much of our nation- OCG Security Daily HD Video Meets Mobility At Firetide, the application of video for surveillance, recognition, intelligent transportation systems and remote expert applications are driving rapid growth. For a public railway, metro subway or bus transit system, where cameras can be placed in locations where traditional wired networks are not feasible or costeffective, video is practically a musthave. In the United States alone, the 55 percent of the bus fleet with CCTV cameras are transitioning to IP-based systems. As an example, the rapid transit system under construction in the city of Mumbai, population 20 million, is called Mumbai Metro. It's a rapid transit system scheduled for completion by 2020, and has now incorporated video surveillance systems for the first time. The Mumbai Metro system is built on the Firetide AutoMesh™ platform, which includes our patented FMRP routing protocol for secure, multi-hop, high-bandwidth throughput that's designed for video. Together with the redundant and selfhealing mesh topology of our solution, you have a perfect intersection of high speed video performance meeting high speed mobility. acknowledges the potential vulnerabilities of individuals with access to that information. Effective protection against this type of attack requires a top-down security culture, mandated security training, effective policy roll-out and robust vetting procedures among other measures, most of which are typically outside the scope and capability of both the IT and security departments. For example, IT administrators with the highest levels of access to all of a company's most sensitive information should, but do not, receive increased attention and vetting from security. Information security experts agree that with time and physical access, an adversary can access almost any network or system. However, information security plans owned by IT departments are often thin or silent on traditional physical security risks and corresponding security design measures, including server room design and placement, access controls, CCTV, server room construction and alarms. The rapid emergence of new technologies and modes of doing business increase the urgency for coordination between the two departments. The Bring Your Own Device (BYOD) concept, cloud vendors, increasingly mobile users, business use of social media and continued reliance on outsourcing threaten to further exploit the gap. Integration and coordination to mitigate existing risks and keep pace with technology must be led from the top with directors and C- level executives building bridges between the IT and security departments. Control Risks is an independent, global risk consultancy specializing in political, integrity and security risk. We help some of the most influential organizations in the world to understand and manage the risks and opportunities of operating in complex or hostile environments. We support clients by providing strategic consultancy, expert analysis and in-depth investigations through to handling sensitive political issues and providing practical on the ground protection and support. al security is dependent on digital technology. Cybersecurity, however, is much more than a cadre of technicians necessary to maintain essential core security measures. Truly effective protection of our nation's cyber networks requires an interdisciplinary team of experts, working collaboratively and forward looking, in order for us to stay ahead of the bad guys. Government agencies and corporations across all industries need individuals with expertise in developing security policies, procedures and protocols. They need response teams that can address security breaches and people skilled in assuring legal and regulatory compliance. JLC: The official launch of the NCI is scheduled for January 2014, but we have been busy authoring our Fundamentals of Cybersecurity course in conjunction with Canvas Network, which plans to offer the course as an MOOC beginning January 2014. A great deal of time was spent ensuring that the most up-to-date information was available in the course, and outstanding instructors were positioned to facilitate it. We're really proud of the new book being published in November 2013 through Hudson Whitman/Excelsior College Press entitled "Protecting our Future: Educating a Cybersecurity Workforce." It brings together many unique perspectives on cybersecurity, the interdisciplinary approach, that until now haven't been discussed enough. From advance reviews, the book is raising a lot of excitement. We're also launching a peer reviewed journal, The National Cybersecurity Institute Journal, which will debut in the spring. This ongoing publication will highlight important aspects of cybersecurity and keep readers current with ongoing trends in the field. year ahead? OSD: What was the most significant event affecting NCI in the past year? OSD: What do you anticipate will be your greatest opportunity in the LP Software (Cont'd. from p. 1) presentation of LP Software's new product or of the company's suite of other software products: Loss Prevention Incident Management System LPMS is a web-enabled, centralized incident management solution that empowers management to control the workflow processes necessary to perform their job efficiently and with accountability. Compliance Audit Management System CAMS allows you to easily create For more information, visit booth 2417 at ASIS or go online to www.firetide.com. To learn more about Control Risks, visit www.controlrisks.com, call 866-919-3330, or email americas@controlrisks.com. JLC: We're looking forward to the research that we're doing, being able to share that with others, and bringing that back into Excelsior's six cybersecurity programs to ensure they have the most current material. Excelsior's newest program, a BS in Cyber Operations, was just launched and we know this is something the community has been seeking. That and Excelsior's MS in Cybersecurity are two programs that will help meet the growing demand for professionals across the cybersecurity spectrum. You can check these out at www.excelsior.edu/about/nationalcybersecurity-institute. OSD: How can our readers find out more about the National Cybersecurity Institute? JLC: The National Cybersecurity Institute is located at 2000 M Street NW, Suite 501 in Washington D.C. 20036. In addition, if you'd like more information about NCI, email us at nci@excelsior.edu. For more information, visit booth 3510 at ASIS, or go online to www.excelsior.edu. your own audits, questions, and scoring. Automatic emailing to store, district, and regional managers combined with built-in-reports allow you to get real-time and historical analysis of audit data. Employee Relations Management System ERMS is designed for managing employee relations incidents. It is an excellent alternative to tracking incidents in Microsoft Access/Excel or home-grown systems. For more information, visit booth 1995 or go online to www.lpguys.com.

Articles in this issue

Links on this page

view archives of Oser Communications Group - OCG Security Daily ASIS September 26, 2013