{"id":10730,"date":"2012-02-23T09:36:00","date_gmt":"2012-02-23T14:36:00","guid":{"rendered":"http:\/\/devweb.rjrinnovations.com\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/"},"modified":"2016-10-13T10:20:51","modified_gmt":"2016-10-13T14:20:51","slug":"cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2","status":"publish","type":"post","link":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/","title":{"rendered":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 3"},"content":{"rendered":"<p>Testimony of Bill Conner, President and CEO of Entrust<\/p>\n<p>Before the Subcommittee on Communications and Technology<br \/>of the Energy and Commerce Committee<br \/>U.S. House of Representatives<\/p>\n<p>Part 3<\/p>\n<p>The Zone Defense <\/p>\n<p>Sadly, the football season is officially over. However, it seems to me that cyber defense is much like playing defense in football \u2014 you don&#8217;t know what play the other team is calling, therefore, you need to defend against everyone. We first need to understand what offensive strategy we are up against. If the offense sees a hole in your front line, they will exploit it. If they see you are exposed in the secondary, they will attack there. And they will keep trying new angles until you react to shut down that vulnerability.<\/p>\n<p>Cyber security is much the same way \u2014 businesses do not know how they will be attacked. They don&#8217;t know if the threat comes due to a download from an employee surfing the Web, via an attack from within, or from a virus that may have entered the system on an email. What we do know is, that to win, large government and private organizations of all sizes need to have a strategy to deal with the range of threats. If we wait until we are hacked, it&#8217;s too late.<\/p>\n<p>Cybercriminals will search for that open door and if they find it, they will wreak havoc on data and possibly divert a company&#8217;s payments or IP to the bad guys. Consider the amount of time and money it takes a company that has lost all its data to a cyber-attack \u2014 not to mention the significant hit to the credibility they lose with their customers if a cybercriminal stole personal information.<\/p>\n<p>Let&#8217;s be clear. What we face is a threatening cyber environment where warfare is being conducted by foreign governments, international crime rings and common thieves in the U.S. It takes everyone \u2014 government, major organizations, small businesses and individuals \u2014 working together to defeat those forces. <\/p>\n<p>By Bill Conner<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 3 The Zone Defense Sadly, the football season is officially over. However, it seems to me that cyber defense is much like playing defense in  [&#8230;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[39],"class_list":["post-10730","post","type-post","status-publish","format-standard","hentry","category-blog-fr","tag-english-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&quot;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&quot; - Part 3 - RJR Innovations<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&quot; - Part 3 - RJR Innovations\" \/>\n<meta property=\"og:description\" content=\"Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 3 The Zone Defense Sadly, the football season is officially over. However, it seems to me that cyber defense is much like playing defense in [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RJR Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-02-23T14:36:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-13T14:20:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RJRInnovations\" \/>\n<meta name=\"twitter:site\" content=\"@RJRInnovations\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 3\",\"datePublished\":\"2012-02-23T14:36:00+00:00\",\"dateModified\":\"2016-10-13T14:20:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\\\/\"},\"wordCount\":339,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"keywords\":[\"English @fr\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\\\/\",\"name\":\"\\\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\\\" - Part 3 - RJR Innovations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\"},\"datePublished\":\"2012-02-23T14:36:00+00:00\",\"dateModified\":\"2016-10-13T14:20:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"name\":\"RJR Innovations\",\"description\":\"Connect your business... All of IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rjrinnovations.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\",\"name\":\"RJR Innovations\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"contentUrl\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"width\":400,\"height\":237,\"caption\":\"RJR Innovations\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RJR-Innovations-107107129324171\\\/\",\"https:\\\/\\\/x.com\\\/RJRInnovations\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rjr-innovations\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/RJRInnovations\"]},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 3 - RJR Innovations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/","og_locale":"fr_FR","og_type":"article","og_title":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 3 - RJR Innovations","og_description":"Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 3 The Zone Defense Sadly, the football season is officially over. However, it seems to me that cyber defense is much like playing defense in [...]","og_url":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/","og_site_name":"RJR Innovations","article_publisher":"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","article_published_time":"2012-02-23T14:36:00+00:00","article_modified_time":"2016-10-13T14:20:51+00:00","twitter_card":"summary_large_image","twitter_creator":"@RJRInnovations","twitter_site":"@RJRInnovations","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/#article","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/"},"author":{"name":"","@id":""},"headline":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 3","datePublished":"2012-02-23T14:36:00+00:00","dateModified":"2016-10-13T14:20:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/"},"wordCount":339,"publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"keywords":["English @fr"],"articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/","url":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/","name":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 3 - RJR Innovations","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/#website"},"datePublished":"2012-02-23T14:36:00+00:00","dateModified":"2016-10-13T14:20:51+00:00","breadcrumb":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-3-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rjrinnovations.com\/fr\/"},{"@type":"ListItem","position":2,"name":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 3"}]},{"@type":"WebSite","@id":"https:\/\/www.rjrinnovations.com\/#website","url":"https:\/\/www.rjrinnovations.com\/","name":"RJR Innovations","description":"Connect your business... All of IT","publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rjrinnovations.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rjrinnovations.com\/#organization","name":"RJR Innovations","url":"https:\/\/www.rjrinnovations.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","contentUrl":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","width":400,"height":237,"caption":"RJR Innovations"},"image":{"@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","https:\/\/x.com\/RJRInnovations","https:\/\/www.linkedin.com\/company\/rjr-innovations","https:\/\/www.youtube.com\/user\/RJRInnovations"]},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/comments?post=10730"}],"version-history":[{"count":0,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10730\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/media?parent=10730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/categories?post=10730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/tags?post=10730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}