Crossroads Blog | Institute National Security and Counterterrorism

critical infrastructure, Cybersecurity, IBM, technology, Watson

Cyber Round Up: Good news for federal cybersecurity; Swiss pick Watson to confront cybersecurity; De-risking cities: connectivity and cybersecurity

  • A rare piece of good news for federal cybersecurity (FCW):  There is some sign of progress amidst all the negativity surrounding the government and cyber security. An article late last week discussed DHS’s Credentials and Authentication Management task order.  The program focuses on identity and access management, a problem the article suggests is behind every major breach of the U.S. government in the last five years. The article highlights the two strongest factors of CRED, the first of which is that the program is actually giving agencies the capability to create a master record for monitoring access.  Second, the grant was crafted with bonuses to incentivize agencies that go beyond the minimal requirements, allowing them to improve efficiency.  The full article can be read here.
  • SIX picks IBM Watson for cybercrime fight (Banking Technology):  This blog recently recapped a report that IBM’s Watson will be used in the fight against cybercrime.  A recent article reported that the Swiss market security infrastructure SIX will use the technology to bolster its cyber operations.  The Security Operations Center will use Watson’s ability to tap into over a million documents in order to do a comprehensive threat assessment.  SIX officials called the cognitive software a “perfect match.”  The full article can be read here.
  • De-Risking Cities: Connectivy and Cybersecurity (Planning Report):  The VX 2017 Conference was recently held for industry leaders to gather and discuss relevant issues in technology and clean energy.  A panel including representatives from the LA Department of Water and Power, Metropolitan Water District of Southern California, and the Information Systems Audit and Control Association addressed how to mitigate risk with critical infrastructure.  The article, which can be found here, includes the full transcript of the panel discussion.

Leave a Reply

Bitnami