{"id":10746,"date":"2012-03-07T10:26:00","date_gmt":"2012-03-07T15:26:00","guid":{"rendered":"http:\/\/devweb.rjrinnovations.com\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/"},"modified":"2016-10-13T10:20:46","modified_gmt":"2016-10-13T14:20:46","slug":"cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2","status":"publish","type":"post","link":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/","title":{"rendered":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 10"},"content":{"rendered":"<p>Testimony of Bill Conner, President and CEO of Entrust<\/p>\n<p>Before the Subcommittee on Communications and Technology<br \/>of the Energy and Commerce Committee<br \/>U.S. House of Representatives<\/p>\n<p>Part 10<\/p>\n<p>Action Items<\/p>\n<p>With all of this in mind, and recognizing that this is not a legislative hearing on specific remedies, there are still three key points that Washington should keep in mind.<\/p>\n<p>First, cyber security legislation must ensure there is proper corporate governance within an organization to ensure someone with appropriate authority is responsible for overseeing the cybersecurity program. It must require and recognize that cybersecurity is not a one-time fix, as was Y2K, but requires continued vigilance since threats continue to evolve rapidly.<\/p>\n<p>Second, the Federal government needs to work more closely with the private sector to exchange critical information about the threats that each experiences. A perfect example of the problems that face the government and protecting itself came to light via the hacking of a well-known security company that resulted in the compromise of three Department of Defense contractors and potentially critical DOD intelligence. All three attacks leveraged the security information gained in the hack of the cybersecurity product company.<\/p>\n<p>This kind of situation is persistent and we have been asking the appropriate agencies to work with us to deter further damaging breaches. Congress needs to direct the government&#8217;s intelligence community to work more closely with cybersecurity companies and to share vital information on evolving threats, attack methods and how to defend against threats.<\/p>\n<p>Third, the private sector would also benefit from an education or awareness campaign. While large enterprises have information security personnel, many small and medium businesses do not. The same cybersecurity companies mentioned above could work with the Department of Commerce and the Small Business Administration to make this information available to these smaller enterprises via webinars, online guidance and checklists. The weakest link in a chain remains a real threat in the cyber world and helping educate smaller entities is a vitally important part of the puzzle.<\/p>\n<p>Thank you again for this opportunity to testify and look forward to any questions you may have.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 10 Action Items With all of this in mind, and recognizing that this is not a legislative hearing on specific remedies, there are still three  [&#8230;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[39],"class_list":["post-10746","post","type-post","status-publish","format-standard","hentry","category-blog-fr","tag-english-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&quot;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&quot; - Part 10 - RJR Innovations<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&quot; - Part 10 - RJR Innovations\" \/>\n<meta property=\"og:description\" content=\"Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 10 Action Items With all of this in mind, and recognizing that this is not a legislative hearing on specific remedies, there are still three [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RJR Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-07T15:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-13T14:20:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RJRInnovations\" \/>\n<meta name=\"twitter:site\" content=\"@RJRInnovations\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 10\",\"datePublished\":\"2012-03-07T15:26:00+00:00\",\"dateModified\":\"2016-10-13T14:20:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\\\/\"},\"wordCount\":358,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"keywords\":[\"English @fr\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\\\/\",\"name\":\"\\\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\\\" - Part 10 - RJR Innovations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\"},\"datePublished\":\"2012-03-07T15:26:00+00:00\",\"dateModified\":\"2016-10-13T14:20:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 10\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"name\":\"RJR Innovations\",\"description\":\"Connect your business... All of IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rjrinnovations.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\",\"name\":\"RJR Innovations\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"contentUrl\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"width\":400,\"height\":237,\"caption\":\"RJR Innovations\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RJR-Innovations-107107129324171\\\/\",\"https:\\\/\\\/x.com\\\/RJRInnovations\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rjr-innovations\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/RJRInnovations\"]},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 10 - RJR Innovations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/","og_locale":"fr_FR","og_type":"article","og_title":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 10 - RJR Innovations","og_description":"Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 10 Action Items With all of this in mind, and recognizing that this is not a legislative hearing on specific remedies, there are still three [...]","og_url":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/","og_site_name":"RJR Innovations","article_publisher":"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","article_published_time":"2012-03-07T15:26:00+00:00","article_modified_time":"2016-10-13T14:20:46+00:00","twitter_card":"summary_large_image","twitter_creator":"@RJRInnovations","twitter_site":"@RJRInnovations","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/#article","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/"},"author":{"name":"","@id":""},"headline":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 10","datePublished":"2012-03-07T15:26:00+00:00","dateModified":"2016-10-13T14:20:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/"},"wordCount":358,"publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"keywords":["English @fr"],"articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/","url":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/","name":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 10 - RJR Innovations","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/#website"},"datePublished":"2012-03-07T15:26:00+00:00","dateModified":"2016-10-13T14:20:46+00:00","breadcrumb":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-10-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rjrinnovations.com\/fr\/"},{"@type":"ListItem","position":2,"name":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 10"}]},{"@type":"WebSite","@id":"https:\/\/www.rjrinnovations.com\/#website","url":"https:\/\/www.rjrinnovations.com\/","name":"RJR Innovations","description":"Connect your business... All of IT","publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rjrinnovations.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rjrinnovations.com\/#organization","name":"RJR Innovations","url":"https:\/\/www.rjrinnovations.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","contentUrl":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","width":400,"height":237,"caption":"RJR Innovations"},"image":{"@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","https:\/\/x.com\/RJRInnovations","https:\/\/www.linkedin.com\/company\/rjr-innovations","https:\/\/www.youtube.com\/user\/RJRInnovations"]},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/comments?post=10746"}],"version-history":[{"count":0,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10746\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/media?parent=10746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/categories?post=10746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/tags?post=10746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}