Measuring the Metrics – ICD Brief 76.

ICD Brief 76.

26.02.2018.-04.03.2018.

Since May 2016’s inaugural ICD Brief, we’ve observed a global rush to “do” to move from plans to implementation: to innovate, secure and anticipate.  Today’s edition looks at key metrics of success in the news this week.

In particular, be sure and listen to Cyber Command’s outgoing Admiral Mike Rogers report to the Senate Armed Service Committee. Cyber chief says Trump has given him no new authority to strike at Russian interference threat with the complete video of the hearing included. And see how trade is affected by recent changes in China’s cyber laws in An Update on Chinese Cybersecurity and the WTO.

In elections, we bring you a report from Jelena Milic’s Centre for Euro-Atlantic Studies on how opposition has used their internationally recognized brand against them in today’s Belgrade election. Read on. And an upbeat report on Israel Developing Cutting Edge Artificial Intelligence Crime-Fighting Tools.

 

USA

DHS Leaders Push Cybersecurity Risk Assessment Program for Critical Infrastructure Companies   Chris Bing      cyberscoop

MAR 1, 2 “Secretary of Homeland Security Kirstjen Nielsen is pitching a new supply chain cybersecurity program in an effort to engage with some of the country’s largest critical infrastructure providers, including the oil, electric and water treatment industries.”

Equifax Finds Another 2.4 Million Americans Hit by 2017 Data Breach

Paul Davidson, USA TODAY

“Equifax said Thursday that 2.4 million more people than it previously believed were affected by its massive data breach last year, the second time it has revised up estimates of the number of Americans whose information was stolen.”

Cyber chief says Trump has given him no new authority to strike at Russian interference threat  Aaron Blake and Ellen Nakashima  Washington Post

“The head of U.S. Cyber Command warned lawmakers that penalties and other measures have not “changed the calculus or the behavior” of Russia as it seeks to interfere with this year’s midterm elections.”SASC Hearing with Admiral Rogers Cyber Command-VIDEO  DOD News

New York Has Toughest Cybersecurity in US- and It’s Still Not Enough

Brennan Weiss  Business Insider UK

“Five months before the 9/11 attacks, US Secretary of Defense Donald Rumsfeld sent a memo to one of his advisers with an ominous message.

“Cyberwar,” read the subject line. “Please take a look at this article,” Rumsfeld wrote, “and tell me what you think I ought to do about it. Thanks.” Attached was a 38-page paper, published seven months prior, analyzing the consequences of society’s increasing dependence on the internet.”

China

An Update on Chinese Cybersecurity and the WTO

Chris Mirasola   Lawfare

“In recent years China has crafted a significant body of domestic cybersecurity laws, regulations and standards. As I have previously outlined, a number of World Trade Organization members, led by Japan and the United States, have argued that portions of China’s cybersecurity regime conflict with its commitments under the General Agreement on Trade in Services (GATS). Developments in China’s cybersecurity regime and minutes from June and October WTO Services Council meetings suggest that Chinese cybersecurity regulations deserve a second look.”

Germany

Russia’s “Fancy Bear” Reportedly Hacks German Government Network

SCOTT NEUMAN  npr Two-Way

“Germany says it managed to fend off a cyberattack against key ministries, but declined to confirm media reports that the culprit was the Russian intelligence operation blamed for interference in U.S. elections.”

Israel

Israel Developing Cutting Edge Artificial Intelligence Crime-Fighting Tools

LIDAR GRAVÉ-LAZI    The Jerusalem Post

“Ben – Gurion University of the Negev and the Israel Police aim to develop advanced cyber, big-data and artificial intelligence tools that may eventually be able to predict and prevent crime.”

Russia

Russian Hacker False Flags Work – Even After They’re Exposed

Andy Greenberg   WIRED

“False flags, for the modern nation-state hacker, are quickly becoming as standard a part of the toolkit as phishing links and infected Microsoft Office attachments. Why simply hide your identity when you can simply paste a new one over it, invented or borrowed? Russia’s hackers, in particular, have lately experimented with that digital mask-swapping with increasingly deceptive tactics—ones that, even when their deceit is successful dispelled, still manage to muddy the waters of accountability.”

Serbia

Influence of pro-Putin Structures on Belgrade Election That No One Is Talking About

“The Center for Euro-Atlantic Studies (CEAS) from Belgrade expresses great concern regarding the fact that, despite numerous indications and obvious connections, during the election campaign for Belgrade elections, which many consider transcend the limits of communal, management and other issues related only to the city of Belgrade, none of election participants, commentators and the media mentions the illegitimate, non-transparent, and possibly a criminal influence of pro-Putin structures on themselves.” For details, read this article!

Insurance

Cisco, Apple, Aon and Allianz Work to Shield Small Businesses from Cyber Attack    Michael Guta    Small Business Trends

“A new partnership between Cisco, Apple, Aon and Allianz seeks to protect small businesses from the growing threat of cyberattack. The threat to small business is growing, with around 43 percent of all cyber attacks squarely aimed at this segment.”

Feature

New Cyber Security Style Guide Helps Bridge the Communication Gap

 J.M. Porup    CSO from IDG

“The Cyber Security Style Guide is a solid attempt to bridge the communications gap, and establish a shared vocabulary we can build on. Created by technical editor Brianne Hughes, of security consultancy Bishop Fox, the style guide is the real deal. (…) While it’s no magic potion, it is a good first step in a journey of a thousand miles.”

This entry was posted in Weekly Brief. Bookmark the permalink.

Comments are closed.