Risk
3/3/2010
07:45 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

RSA: DHS Chief Launches Cybersecurity Competition

Secretary of the Department of Homeland Security, Janet Napolitano, is asking for help to engage the public in a discussion about cybersecurity.

Speaking at the RSA Conference in San Francisco on Wednesday, Secretary of the Department of Homeland Security (DHS) Janet Napolitano announced the National Cybersecurity Awareness Campaign Challenge Competition, a contest to solicit ideas from individuals and industry about how to best engage the American public in a discussion about cybersecurity.

"A secure cyber environment is as much about people and habits and culture as it is about machines," said Napolitano. "...We need to have an ongoing, two-way conversation between the public and private sectors [about how to improve cybersecurity]."

Proposals submitted to DHS before the April 30 deadline will be evaluated based on factors that include teamwork, effective metrics for distribution and engagement, use of Web 2.0 technology, compliance with spam laws, privacy, repeatability, feedback mechanism, list building, transparency, and message.

Winners will be invited to a DHS event in Washington D.C. in late May or early June and will have the opportunity to help plan the National Cybersecurity Awareness Campaign with DHS and to prepare the campaign for its launch in October, during Cybersecurity Awareness Month.

Further details are available at the DHS Web site.

Napolitano offered reassurance that DHS understands the challenges of cybersecurity and repeated President Obama's acknowledgment of the seriousness of the cyber threat faced by the nation.

At the same time, she came to ask for help. Success, she said, will depend on our ability to interface with the private sector.

"We're working with our private sector partners in the financial services arena and with other key industries about what needs to be done and what can be done," she said, adding that this can be expected to continue.

As DHS addresses the cybersecurity challenge, it needs more than ideas about public outreach strategy. It needs cybersecurity talent.

"In fact, we may be trying to recruit some of your talent right now," she said, scanning the audience of cybersecurity professionals. "We need it."

She described how the government has been deploying and improving its Einstein intrusion detection system to spot, identify, and (eventually) disable cyber threats to government agencies.

And she called on the private sector to "redouble efforts to increase the security, reliability, and quality of products you have that enter the global supply chain."

The goal, she said, is an IT ecosystem that offers security automation, speed and interoperability, and privacy.

"We need to do more and we need to do it faster," she said.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.