pcast cybersecurity

Upload: angela-jones

Post on 04-Jun-2018

225 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Pcast Cybersecurity

    1/31

  • 8/13/2019 Pcast Cybersecurity

    2/31

  • 8/13/2019 Pcast Cybersecurity

    3/31

  • 8/13/2019 Pcast Cybersecurity

    4/31

    http://www.whitehouse.gov/ostp/pcast
  • 8/13/2019 Pcast Cybersecurity

    5/31

  • 8/13/2019 Pcast Cybersecurity

    6/31

  • 8/13/2019 Pcast Cybersecurity

    7/31

  • 8/13/2019 Pcast Cybersecurity

    8/31

  • 8/13/2019 Pcast Cybersecurity

    9/31

  • 8/13/2019 Pcast Cybersecurity

    10/31

  • 8/13/2019 Pcast Cybersecurity

    11/31

  • 8/13/2019 Pcast Cybersecurity

    12/31

  • 8/13/2019 Pcast Cybersecurity

    13/31

  • 8/13/2019 Pcast Cybersecurity

    14/31

  • 8/13/2019 Pcast Cybersecurity

    15/31

  • 8/13/2019 Pcast Cybersecurity

    16/31

  • 8/13/2019 Pcast Cybersecurity

    17/31

    http://www.nytimes.com/2010/10/27/business/27spam.htmlhttp://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime.pdf
  • 8/13/2019 Pcast Cybersecurity

    18/31

  • 8/13/2019 Pcast Cybersecurity

    19/31

    http://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resilhttp://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resilhttp://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurityhttp://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurityhttp://www.whitehouse.gov/blog/2012/08/01/collaborative-and-cross-cutting-approaches-cybersecurityhttp://www.whitehouse.gov/blog/2012/08/01/collaborative-and-cross-cutting-approaches-cybersecurityhttp://goals.performance.gov/content/cybersecurityhttp://www.whitehouse.gov/blog/2012/08/01/collaborative-and-cross-cutting-approaches-cybersecurity
  • 8/13/2019 Pcast Cybersecurity

    20/31

  • 8/13/2019 Pcast Cybersecurity

    21/31

  • 8/13/2019 Pcast Cybersecurity

    22/31

    http://www.forbes.com/sites/ciocentral/2013/05/15/how-to-prepare-for-when-the-sec-comes-asking-about-cybersecurity-risk/http://www.forbes.com/sites/ciocentral/2013/05/15/how-to-prepare-for-when-the-sec-comes-asking-about-cybersecurity-risk/http://www.bloomberg.com/news/2013-05-13/sec-chairman-reviewing-company-cybersecurity-disclosures.html
  • 8/13/2019 Pcast Cybersecurity

    23/31

    http://cee.che.ufl.edu/AIChE_CEE_Klein_DuPont_Extended.pdfhttp://www.reuters.com/article/2013/05/28/usa-cybersecurity-insurance-newyork-idUSL2N0E919B20130528
  • 8/13/2019 Pcast Cybersecurity

    24/31

    http://www.gsa.gov/portal/category/102371?utm_source=OCSIT&utm_term=fedramphttp://cee.che.ufl.edu/AIChE_CEE_Klein_DuPont_Extended.pdf
  • 8/13/2019 Pcast Cybersecurity

    25/31

    http://www.nytimes.com/2013/01/01/technology/antivirus-makers-work-on-software-to-catch-malware-more-effectively.html?pagewanted=allhttp://www.nytimes.com/2013/01/01/technology/antivirus-makers-work-on-software-to-catch-malware-more-effectively.html?pagewanted=allhttp://articles.washingtonpost.com/2012-09-16/world/35494752_1_top-cyber-private-sector-crowdstrikehttp://www.npr.org/2012/05/10/152374358/cybersecurity-firms-ditch-defense-learn-to-hunthttp://intelreport.mandiant.com/http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?pagewanted=allhttp://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?pagewanted=allhttp://www.nytimes.com/2013/02/02/technology/washington-posts-joins-list-of-media-hacked-by-the-chinese.htmlhttp://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0
  • 8/13/2019 Pcast Cybersecurity

    26/31

  • 8/13/2019 Pcast Cybersecurity

    27/31

  • 8/13/2019 Pcast Cybersecurity

    28/31

  • 8/13/2019 Pcast Cybersecurity

    29/31

  • 8/13/2019 Pcast Cybersecurity

    30/31

    http://www.whitehouse.gov/ostp/pcast
  • 8/13/2019 Pcast Cybersecurity

    31/31