ICD Brief 76.
Since May 2016’s inaugural ICD Brief, we’ve observed a global rush to “do” to move from plans to implementation: to innovate, secure and anticipate. Today’s edition looks at key metrics of success in the news this week.
In particular, be sure and listen to Cyber Command’s outgoing Admiral Mike Rogers report to the Senate Armed Service Committee. Cyber chief says Trump has given him no new authority to strike at Russian interference threat with the complete video of the hearing included. And see how trade is affected by recent changes in China’s cyber laws in An Update on Chinese Cybersecurity and the WTO.
In elections, we bring you a report from Jelena Milic’s Centre for Euro-Atlantic Studies on how opposition has used their internationally recognized brand against them in today’s Belgrade election. Read on. And an upbeat report on Israel Developing Cutting Edge Artificial Intelligence Crime-Fighting Tools.
DHS Leaders Push Cybersecurity Risk Assessment Program for Critical Infrastructure Companies Chris Bing cyberscoop
MAR 1, 2 “Secretary of Homeland Security Kirstjen Nielsen is pitching a new supply chain cybersecurity program in an effort to engage with some of the country’s largest critical infrastructure providers, including the oil, electric and water treatment industries.”
Equifax Finds Another 2.4 Million Americans Hit by 2017 Data Breach
Paul Davidson, USA TODAY
“Equifax said Thursday that 2.4 million more people than it previously believed were affected by its massive data breach last year, the second time it has revised up estimates of the number of Americans whose information was stolen.”
Cyber chief says Trump has given him no new authority to strike at Russian interference threat Aaron Blake and Ellen Nakashima Washington Post
“The head of U.S. Cyber Command warned lawmakers that penalties and other measures have not “changed the calculus or the behavior” of Russia as it seeks to interfere with this year’s midterm elections.”SASC Hearing with Admiral Rogers Cyber Command-VIDEO DOD News
New York Has Toughest Cybersecurity in US- and It’s Still Not Enough
Brennan Weiss Business Insider UK
“Five months before the 9/11 attacks, US Secretary of Defense Donald Rumsfeld sent a memo to one of his advisers with an ominous message.
“Cyberwar,” read the subject line. “Please take a look at this article,” Rumsfeld wrote, “and tell me what you think I ought to do about it. Thanks.” Attached was a 38-page paper, published seven months prior, analyzing the consequences of society’s increasing dependence on the internet.”
An Update on Chinese Cybersecurity and the WTO
Chris Mirasola Lawfare
“In recent years China has crafted a significant body of domestic cybersecurity laws, regulations and standards. As I have previously outlined, a number of World Trade Organization members, led by Japan and the United States, have argued that portions of China’s cybersecurity regime conflict with its commitments under the General Agreement on Trade in Services (GATS). Developments in China’s cybersecurity regime and minutes from June and October WTO Services Council meetings suggest that Chinese cybersecurity regulations deserve a second look.”
Russia’s “Fancy Bear” Reportedly Hacks German Government Network
SCOTT NEUMAN npr Two-Way
“Germany says it managed to fend off a cyberattack against key ministries, but declined to confirm media reports that the culprit was the Russian intelligence operation blamed for interference in U.S. elections.”
Israel Developing Cutting Edge Artificial Intelligence Crime-Fighting Tools
LIDAR GRAVÉ-LAZI The Jerusalem Post
“Ben – Gurion University of the Negev and the Israel Police aim to develop advanced cyber, big-data and artificial intelligence tools that may eventually be able to predict and prevent crime.”
Russian Hacker False Flags Work – Even After They’re Exposed
Andy Greenberg WIRED
“False flags, for the modern nation-state hacker, are quickly becoming as standard a part of the toolkit as phishing links and infected Microsoft Office attachments. Why simply hide your identity when you can simply paste a new one over it, invented or borrowed? Russia’s hackers, in particular, have lately experimented with that digital mask-swapping with increasingly deceptive tactics—ones that, even when their deceit is successful dispelled, still manage to muddy the waters of accountability.”
Influence of pro-Putin Structures on Belgrade Election That No One Is Talking About
“The Center for Euro-Atlantic Studies (CEAS) from Belgrade expresses great concern regarding the fact that, despite numerous indications and obvious connections, during the election campaign for Belgrade elections, which many consider transcend the limits of communal, management and other issues related only to the city of Belgrade, none of election participants, commentators and the media mentions the illegitimate, non-transparent, and possibly a criminal influence of pro-Putin structures on themselves.” For details, read this article!
Cisco, Apple, Aon and Allianz Work to Shield Small Businesses from Cyber Attack Michael Guta Small Business Trends
“A new partnership between Cisco, Apple, Aon and Allianz seeks to protect small businesses from the growing threat of cyberattack. The threat to small business is growing, with around 43 percent of all cyber attacks squarely aimed at this segment.”
New Cyber Security Style Guide Helps Bridge the Communication Gap
J.M. Porup CSO from IDG
“The Cyber Security Style Guide is a solid attempt to bridge the communications gap, and establish a shared vocabulary we can build on. Created by technical editor Brianne Hughes, of security consultancy Bishop Fox, the style guide is the real deal. (…) While it’s no magic potion, it is a good first step in a journey of a thousand miles.”