In the News – This Week in Critical Infrastructure: Week of July 18, 2016
Posted: July 21, 2016 at 1:55 pm, Last Updated: July 21, 2016 at 2:50 pm
This Week in Critical Infrastructure, we have an updated report from the 2016 Black Hat USA Cybersecurity Conference outlining survey responses from attendees at last year’s event, including expert opinions regarding the threats of highest concern among security professionals; a new survey released by Dell on Digital Transformation Security; a special issue on Critical Infrastructure from the Federal Times; and a look at the latest policy discussions surrounding the definition of an armed cyberattack.
In 2015, Black Hat USA surveyed attendees at their annual conference, the majority of whom were certified security professionals, asking about their views on the current state of cybersecurity in their firms. “The results of that study were alarming, as nearly three-quarters (72%) of respondents felt it likely that their organizations would have to deal with a major data breach in the year ahead. Approximately two-thirds of respondents said they did not have enough staff, budget, or training to meet those challenges.” Following the 2016 conference, they have updated survey results, and “most expert security professionals in the industry are even more concerned this year than they were last year.”
Dell has released its 2016 survey of international IT security professionals covering topics of Digital Transformation. With responses from over 600 professionals from firms in the United States, United Kingdom, Germany, Belgium, the Netherlands, Luxembourg, France, Scandinavia, and Australia, this report examines the current thinking on Digital Transformation technologies and their impacts on security.
The Federal Times has published a special edition focusing on critical infrastructure, with stories on cybersecurity, risk, and each of the critical infrastructure sectors. The article on transportation written by Jill R. Aitoro features contributions from CIP/HS Director Dr. Mark Troutman.
C4ISRNet Asks ‘What Defines an Armed Cyberattack?’
July 18, 2016
While the list of authorities recognizing cyber operations as a domain for military action continues to grow, leaders continue to debate the contours of cyber warfare and its boundaries in comparison to traditional conflict. Among the highest priorities in this area is to define the boundaries of cyber attacks that warrant military reprisals. As nations plan and perform operations targeting physical infrastructure assets like power grids and dams, the need for certainty grows. C4ISRNet takes a look at the current state of the cyber warfare debate in the U.S. among officials and lawmakers.
Write to the Editors at email@example.com