{"id":10726,"date":"2012-02-21T14:01:00","date_gmt":"2012-02-21T19:01:00","guid":{"rendered":"http:\/\/devweb.rjrinnovations.com\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/"},"modified":"2012-02-21T14:01:00","modified_gmt":"2012-02-21T19:01:00","slug":"cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2","status":"publish","type":"post","link":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/","title":{"rendered":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 1"},"content":{"rendered":"<p>Testimony of Bill Conner, President and CEO of Entrust<\/p>\n<p>Before the Subcommittee on Communications and Technology<br \/>of the Energy and Commerce Committee<br \/>U.S. House of Representatives<\/p>\n<p>Part 1<\/p>\n<p>Hacking for Harm<\/p>\n<p>Experts agree that cybercrime poses a greater threat to the security of nations, corporations and individuals than ever before. In recent years, cybercriminals have moved from hacking for honor \u2014 such as for bragging rights within the hacker community \u2014 to hacking for harm and profit; in short, it&#8217;s now overt criminal activity. Increasingly, the most common victims of targeted cybercrimes are those who can least afford a major financial hit such as small businesses. With the increased dependence of the Internet to conduct business, it is no surprise that cybercrimes \u2014 ranging from identity theft to financial fraud to cyber terrorism \u2014 have dramatically increased against small and large enterprises. Unlike citizens, who are protected by FDIC regulations, businesses&#8217; cash or intellectual property is not safeguarded by law.<\/p>\n<p>By Bill Conner<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 1 Hacking for Harm Experts agree that cybercrime poses a greater threat to the security of nations, corporations and individuals than ever before. In recent  [&#8230;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[39],"class_list":["post-10726","post","type-post","status-publish","format-standard","hentry","category-blog-fr","tag-english-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&quot;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&quot; - Part 1 - RJR Innovations<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&quot; - Part 1 - RJR Innovations\" \/>\n<meta property=\"og:description\" content=\"Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 1 Hacking for Harm Experts agree that cybercrime poses a greater threat to the security of nations, corporations and individuals than ever before. In recent [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RJR Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-02-21T19:01:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RJRInnovations\" \/>\n<meta name=\"twitter:site\" content=\"@RJRInnovations\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 1\",\"datePublished\":\"2012-02-21T19:01:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\\\/\"},\"wordCount\":167,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"keywords\":[\"English @fr\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\\\/\",\"name\":\"\\\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\\\" - Part 1 - RJR Innovations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\"},\"datePublished\":\"2012-02-21T19:01:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"name\":\"RJR Innovations\",\"description\":\"Connect your business... All of IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rjrinnovations.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\",\"name\":\"RJR Innovations\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"contentUrl\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"width\":400,\"height\":237,\"caption\":\"RJR Innovations\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RJR-Innovations-107107129324171\\\/\",\"https:\\\/\\\/x.com\\\/RJRInnovations\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rjr-innovations\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/RJRInnovations\"]},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 1 - RJR Innovations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/","og_locale":"fr_FR","og_type":"article","og_title":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 1 - RJR Innovations","og_description":"Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 1 Hacking for Harm Experts agree that cybercrime poses a greater threat to the security of nations, corporations and individuals than ever before. In recent [...]","og_url":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/","og_site_name":"RJR Innovations","article_publisher":"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","article_published_time":"2012-02-21T19:01:00+00:00","twitter_card":"summary_large_image","twitter_creator":"@RJRInnovations","twitter_site":"@RJRInnovations","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/#article","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/"},"author":{"name":"","@id":""},"headline":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 1","datePublished":"2012-02-21T19:01:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/"},"wordCount":167,"publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"keywords":["English @fr"],"articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/","url":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/","name":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 1 - RJR Innovations","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/#website"},"datePublished":"2012-02-21T19:01:00+00:00","breadcrumb":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-1-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rjrinnovations.com\/fr\/"},{"@type":"ListItem","position":2,"name":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 1"}]},{"@type":"WebSite","@id":"https:\/\/www.rjrinnovations.com\/#website","url":"https:\/\/www.rjrinnovations.com\/","name":"RJR Innovations","description":"Connect your business... All of IT","publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rjrinnovations.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rjrinnovations.com\/#organization","name":"RJR Innovations","url":"https:\/\/www.rjrinnovations.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","contentUrl":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","width":400,"height":237,"caption":"RJR Innovations"},"image":{"@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","https:\/\/x.com\/RJRInnovations","https:\/\/www.linkedin.com\/company\/rjr-innovations","https:\/\/www.youtube.com\/user\/RJRInnovations"]},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/comments?post=10726"}],"version-history":[{"count":0,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10726\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/media?parent=10726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/categories?post=10726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/tags?post=10726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}