You are on page 1of 2

Cyber Security World Conference 2014 to Build on Obama's Cyber

Threat Information Sharing rame!or" #gainst $lobal %ac"er #ttac"s


Building off of the momentum of past successful conferences, Golden Networking presents
Cyber Security World Conference 20! New "ork City
#www$CyberSecurityWorldConference$com%, forum that will bring the latest thinking from
security e&perts to hundreds of senior e&ecuti'es focused on protecting enterprises and
go'ernment(s information assets$
&e! 'or" City( &'( )S# *&o+ember 1( 2014, --
According to The Hill, the Obama
administration's recently issued cyber threat
information sharing framework comes at a time
when discussions are heating up in Congress
on stalled legislation dealing with cyber security.
hy lawmakers and law enforcement officials
ha!e been pounding the pa!ement in recent
weeks, declaring that steps to ease the sharing
of information about cyber threats are critical for
the country's defenses, will be discussed at
"olden #etworking's Cyber $ecurity orld
Conference %&'( #ew )ork City
*www.Cyber$ecurityorldConference.com+,
uni,ue professional gathering where
cybersecurity e-perts are set to illustrate
business on protecting their information from
cyber-attacks.
The document fills a gap in the ..$. /epartment
of Commerce's #ational 0nstitute of $tandards
and Technology *#0$T+'s more general
cybersecurity framework, released on 1ebruary
'%, %&'(. The framework, created through
collaboration between industry and go!ernment,
consists of standards, guidelines, and practices
to promote the protection of critical
infrastructure. The prioriti2ed, fle-ible, repeatable, and cost-effecti!e approach of the framework
helps owners and operators of critical infrastructure to manage cybersecurity-related risk.
The /epartment of Homeland $ecurity's Critical 0nfrastructure Cyber Community C3 4oluntary
5rogram helps align critical infrastructure owners and operators with e-isting resources that will
assist their efforts to adopt the Cybersecurity 1ramework and manage their cyber risks. #0$T also
issued a companion roadmap that discusses #0$T's ne-t steps with the 1ramework and identifies
key areas of cybersecurity de!elopment, alignment, and collaboration.
6oadblocks to total implementation still remain though, as both industry and pri!acy groups ha!e
been hesitant to freely share information in the current legal landscape. One bill that would address
the legal issues is the Cybersecurity 0nformation $haring Act *C0$A+, but it remains unclear whether
the bill could see action in the lame-duck session after the elections, according to The Hill. Absent
congressional action, businesses are concerned about whether they will be protected from liability
when sharing information with the go!ernment. Con!ersely, pri!acy ad!ocates are wary of what
personal data industries might share with the go!ernment, gi!en the sur!eillance acti!ities that ha!e
been re!ealed at the #ational $ecurity Agency *#$A+.
#bout Cyber Security World Conference 2014
Cybersecurity is ne!er again a term to ignore for indi!iduals or corporations. The daily acti!ities of all
Americans, the country's global economic prominence and worldwide security rely on a safe and
resilient cyberspace. .nfortunately, the number of cyber-attacks has increased dramatically o!er the
last years, e-posing confidential personal and business data, disrupting critical operations, and
imposing e-orbitantly high costs on the economy o!erall.
7ust recently, 7.5. 8organ Chase, America's largest commercial bank with 9%.:; trillion in assets,
announced that about <= million households and < million of small-business customers had been
affected by a cyberattack in one of the most sweeping known global breaches. The company said
the unknown attackers stole customers' contact information, which included names, email
addresses, numbers and addresses, affected an amount e,ui!alent to almost two-thirds of American
households.
A brief walk down memory lane of some the biggest recent cyber-attacks now include Adobe
$ystems, Automated /ata 5rocessing, Citigroup, >?Trade 1inancial, 1idelity 0n!estments, Home
/epot, H$@C, #asda, O8A, #eiman 8arcus, Target and al-mart. 0t is not unlikely to consider that
the information of e!ery American has already been compromised in any of these publicly disclosed
attacks.
6enowned information security e-perts and inno!ati!e ser!ice pro!iders will present at Cyber
$ecurity orld Conference %&'( their latest thinking to hundreds of senior e-ecuti!es focused on
protecting enterprises and go!ernmental agencies. Topics that will be discussed includeB
C 0s @iometrics the Dey to 5ersonal and Corporate $ecurityE
C $trengthening the $ecurity of 0ndustry-wide Technology 0nfrastructure
C Cyber $ecurity 8egatrends $ecurity 5rofessionals can't 0gnore Today
C Dey Considerations about $ecurity in the 0nternet of Things Age
C Cyber $ecurity and its 6ole in the O!erall $ecurity of the .nited $tates
C How Hackers 6eally Operate to Obtain 1inancial /ata
C /esigning and 8anaging >ffecti!e 0nformation $ecurity 5rograms
Cyber $ecurity orld Conference %&'( is produced by "olden #etworking, the premier networking
community for business and technology e-ecuti!es, entrepreneurs and in!estors. 5anelists,
speakers and sponsors are in!ited to contact "olden #etworking by sending an email to
informationFgoldennetworking.com.
-edia Contact.
7ulia 5etro!a
8edia 6elations Coordinator
"olden #etworking
G'-('(-1O6.8$&
Hpetro!aFgoldennetworking.com
httpBIIwww.goldennetworking.com

You might also like