Risk
3/3/2010
07:45 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

RSA: DHS Chief Launches Cybersecurity Competition

Secretary of the Department of Homeland Security, Janet Napolitano, is asking for help to engage the public in a discussion about cybersecurity.

Speaking at the RSA Conference in San Francisco on Wednesday, Secretary of the Department of Homeland Security (DHS) Janet Napolitano announced the National Cybersecurity Awareness Campaign Challenge Competition, a contest to solicit ideas from individuals and industry about how to best engage the American public in a discussion about cybersecurity.

"A secure cyber environment is as much about people and habits and culture as it is about machines," said Napolitano. "...We need to have an ongoing, two-way conversation between the public and private sectors [about how to improve cybersecurity]."

Proposals submitted to DHS before the April 30 deadline will be evaluated based on factors that include teamwork, effective metrics for distribution and engagement, use of Web 2.0 technology, compliance with spam laws, privacy, repeatability, feedback mechanism, list building, transparency, and message.

Winners will be invited to a DHS event in Washington D.C. in late May or early June and will have the opportunity to help plan the National Cybersecurity Awareness Campaign with DHS and to prepare the campaign for its launch in October, during Cybersecurity Awareness Month.

Further details are available at the DHS Web site.

Napolitano offered reassurance that DHS understands the challenges of cybersecurity and repeated President Obama's acknowledgment of the seriousness of the cyber threat faced by the nation.

At the same time, she came to ask for help. Success, she said, will depend on our ability to interface with the private sector.

"We're working with our private sector partners in the financial services arena and with other key industries about what needs to be done and what can be done," she said, adding that this can be expected to continue.

As DHS addresses the cybersecurity challenge, it needs more than ideas about public outreach strategy. It needs cybersecurity talent.

"In fact, we may be trying to recruit some of your talent right now," she said, scanning the audience of cybersecurity professionals. "We need it."

She described how the government has been deploying and improving its Einstein intrusion detection system to spot, identify, and (eventually) disable cyber threats to government agencies.

And she called on the private sector to "redouble efforts to increase the security, reliability, and quality of products you have that enter the global supply chain."

The goal, she said, is an IT ecosystem that offers security automation, speed and interoperability, and privacy.

"We need to do more and we need to do it faster," she said.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.