SlideShare a Scribd company logo
1 of 19
Eric T. Winn
• Threats to the security of the United States and
its citizens can come in many forms:
• Planes crashing into buildings
• Bombs detonated in crowded areas
• Mass murders can enter schools and kill innocent
children
• Cyber attacks on the banking industry, businesses,
government agencies, etc.
• The FBI, CIA, NSA and other federal, state and
local agencies are working diligently to detect
and prevent an event such as 9/11 from
occurring again
• In order to disrupt any type of criminal
activity, whether terrorism or any other type of
crime, we must think like the criminal
• We must understand where we have
weaknesses and what we need to do to prevent
them from being exploited
• Since 9/11, tremendous efforts have been made
to secure sections of our critical infrastructure
that fell victim to terrorists
• While these efforts are needed and necessary,
we must not be narrowly focused on from
where the next attack will come or take place
• Efforts must be made to protect all aspects of
our critical infrastructure to include cyber
systems
• Cyber security has been defined as security of
the nation’s computer and telecommunications
infrastructure to include military, all forms of
communications networks, electrical grids and
power plants.
• These attacks can involve both the public and
private sectors
• Government agencies
• Banks
• Businesses
• Power companies
• Any other organization that utilizes computer and
telecommunications systems
• The theory describes power in three different
circuits:
• Episodic circuit
• Social integration circuit
• System integration circuit
• The theory describes power relationships and
how they are interconnected
• The episodic circuit describes how events can
shape policy
• The events of 9/11 demonstrated how the lack of
communication left the nation in a vulnerable state
• The creation of the Department of Homeland
Security illustrates the episodic power of an
organization
• Redirecting funds and resources, implementing
personnel policy, oversight and other functions
were placed under the control of a single person
• The creation of DHS also affected congressional
functions
• This resulted in redirecting funds to certain
areas of the country under the pretense of
protection from terrorism
• Terrorism is a grave threat to the nation but
attacks are waged against organizations every
day that are not affiliated with a terrorist
organization
• We must take a holistic approach when
securing a nation
• We cannot focus solely on threats from one
source
• While terrorism is a serious threat to the nation,
threats to the security of the nation come from
many other areas and occur by many different
means
• Cyber security was placed on the back burner
and greater attention was placed on securing
the nation from a single type of threat and from
a single organization
• In the years following 9/11, it was unclear as to
who was in charge of cyber security efforts and
what was being accomplished to reach that
goal
• Episodic power played a key role in the
implementation of cyber security in the United
States
• Social and cultural differences can have grave
consequences on how policy is created
• Legislative actions were taken prior to 9/11 to
create a department tasked with protecting the
homeland but basically died in Congress due
to lack of interest
• It took the loss of thousands of lives and
billions in infrastructure to realize that efforts
were needed to protect the nation’s homeland
• Following 9/11, a bill was introduced to focus
on cyber security efforts
• The bill was debated but no action was taken
• Nearly a year later, another bill was introduced
that resulted in the creation of DHS
• Still, there was a lack of interest in securing the
nation’s cyber network
• Cyber security lost when trying to compete
with other national security functions
• It is argued that voicing concern about DHS
not focusing enough on cyber security would
appear unpatriotic
• The technological means of control over the
physical and social environment and the skills
associated with these means
• System integration is a strong source of
transformation and tension
• System integration relies heavily on the
management of an organization to explain the
new rules and norms implied by the system
• It must be done in such a manner that members
of the organization understand and are willing
to accept
• The Cyber Security Enhancement Act allowed
companies to provide government with customer’s
electronic information without a warrant or other
legal document
• It did not have to be provided following a request,
it could be the initiative of the company as an
“immediate threat to a national security interest”
which was later changed to “subjective good faith”
• This did not require judicial oversight or
notification to the person communicating the
information
• Buy-in from others in the organization is
needed during the design and development
stage of the system and not when the system is
being implemented
• Why does it take an event to occur before our
government begins to focus attention on the
situation?
• Dhillon, G. (2013). Enterprise cyber security:
Principles and practice. Washington, D.C.
Paradigm Books

More Related Content

What's hot

Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?Crystal Miller
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Article assignment obama and the smith mundt act repeal telecommunications un...
Article assignment obama and the smith mundt act repeal telecommunications un...Article assignment obama and the smith mundt act repeal telecommunications un...
Article assignment obama and the smith mundt act repeal telecommunications un...Wayne Williams
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Legal Issues of Government Use of Social Media
Legal Issues of Government Use of Social MediaLegal Issues of Government Use of Social Media
Legal Issues of Government Use of Social MediaDavid Menken
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship groot83
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Planbfuesz
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberIGF Indonesia
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceblogzilla
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapanrmackinnon
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
 

What's hot (19)

Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Article assignment obama and the smith mundt act repeal telecommunications un...
Article assignment obama and the smith mundt act repeal telecommunications un...Article assignment obama and the smith mundt act repeal telecommunications un...
Article assignment obama and the smith mundt act repeal telecommunications un...
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Legal Issues of Government Use of Social Media
Legal Issues of Government Use of Social MediaLegal Issues of Government Use of Social Media
Legal Issues of Government Use of Social Media
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Cyberbullying and the law
Cyberbullying and the lawCyberbullying and the law
Cyberbullying and the law
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Essential components of a policy problem definition
Essential components of a policy problem definitionEssential components of a policy problem definition
Essential components of a policy problem definition
 
ARTICLE 4/27/12
ARTICLE 4/27/12ARTICLE 4/27/12
ARTICLE 4/27/12
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Plan
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 

Similar to United states cyber security policy (Eric Winn)

Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technologyorrenprunckun
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellUBA-komitet
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy makerDoing What I Do
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 
Political Transitions After a Peace Agreement: Opportunities for the Bangsamoro
Political Transitions After a Peace Agreement: Opportunities for the BangsamoroPolitical Transitions After a Peace Agreement: Opportunities for the Bangsamoro
Political Transitions After a Peace Agreement: Opportunities for the BangsamoroIAGorgph
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentInternet Law Center
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxphilipnelson29183
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietySarah Granger
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Jack Whitsitt
 
Rise of the Private Police
Rise of the Private PoliceRise of the Private Police
Rise of the Private PoliceDavid Ramirez
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 
The Issue Of Homeland Security
The Issue Of Homeland SecurityThe Issue Of Homeland Security
The Issue Of Homeland SecurityMary Brown
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15difordham
 

Similar to United states cyber security policy (Eric Winn) (20)

CT3- STEVENS
CT3- STEVENSCT3- STEVENS
CT3- STEVENS
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
 
Chapter14
Chapter14Chapter14
Chapter14
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
Political Transitions After a Peace Agreement: Opportunities for the Bangsamoro
Political Transitions After a Peace Agreement: Opportunities for the BangsamoroPolitical Transitions After a Peace Agreement: Opportunities for the Bangsamoro
Political Transitions After a Peace Agreement: Opportunities for the Bangsamoro
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
 
Rise of the Private Police
Rise of the Private PoliceRise of the Private Police
Rise of the Private Police
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
The Issue Of Homeland Security
The Issue Of Homeland SecurityThe Issue Of Homeland Security
The Issue Of Homeland Security
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

United states cyber security policy (Eric Winn)

  • 2. • Threats to the security of the United States and its citizens can come in many forms: • Planes crashing into buildings • Bombs detonated in crowded areas • Mass murders can enter schools and kill innocent children • Cyber attacks on the banking industry, businesses, government agencies, etc.
  • 3. • The FBI, CIA, NSA and other federal, state and local agencies are working diligently to detect and prevent an event such as 9/11 from occurring again • In order to disrupt any type of criminal activity, whether terrorism or any other type of crime, we must think like the criminal • We must understand where we have weaknesses and what we need to do to prevent them from being exploited
  • 4. • Since 9/11, tremendous efforts have been made to secure sections of our critical infrastructure that fell victim to terrorists • While these efforts are needed and necessary, we must not be narrowly focused on from where the next attack will come or take place • Efforts must be made to protect all aspects of our critical infrastructure to include cyber systems
  • 5. • Cyber security has been defined as security of the nation’s computer and telecommunications infrastructure to include military, all forms of communications networks, electrical grids and power plants.
  • 6. • These attacks can involve both the public and private sectors • Government agencies • Banks • Businesses • Power companies • Any other organization that utilizes computer and telecommunications systems
  • 7. • The theory describes power in three different circuits: • Episodic circuit • Social integration circuit • System integration circuit • The theory describes power relationships and how they are interconnected
  • 8. • The episodic circuit describes how events can shape policy • The events of 9/11 demonstrated how the lack of communication left the nation in a vulnerable state • The creation of the Department of Homeland Security illustrates the episodic power of an organization • Redirecting funds and resources, implementing personnel policy, oversight and other functions were placed under the control of a single person
  • 9. • The creation of DHS also affected congressional functions • This resulted in redirecting funds to certain areas of the country under the pretense of protection from terrorism • Terrorism is a grave threat to the nation but attacks are waged against organizations every day that are not affiliated with a terrorist organization • We must take a holistic approach when securing a nation
  • 10. • We cannot focus solely on threats from one source • While terrorism is a serious threat to the nation, threats to the security of the nation come from many other areas and occur by many different means • Cyber security was placed on the back burner and greater attention was placed on securing the nation from a single type of threat and from a single organization
  • 11. • In the years following 9/11, it was unclear as to who was in charge of cyber security efforts and what was being accomplished to reach that goal • Episodic power played a key role in the implementation of cyber security in the United States
  • 12. • Social and cultural differences can have grave consequences on how policy is created • Legislative actions were taken prior to 9/11 to create a department tasked with protecting the homeland but basically died in Congress due to lack of interest • It took the loss of thousands of lives and billions in infrastructure to realize that efforts were needed to protect the nation’s homeland
  • 13. • Following 9/11, a bill was introduced to focus on cyber security efforts • The bill was debated but no action was taken • Nearly a year later, another bill was introduced that resulted in the creation of DHS • Still, there was a lack of interest in securing the nation’s cyber network • Cyber security lost when trying to compete with other national security functions
  • 14. • It is argued that voicing concern about DHS not focusing enough on cyber security would appear unpatriotic
  • 15. • The technological means of control over the physical and social environment and the skills associated with these means • System integration is a strong source of transformation and tension • System integration relies heavily on the management of an organization to explain the new rules and norms implied by the system • It must be done in such a manner that members of the organization understand and are willing to accept
  • 16. • The Cyber Security Enhancement Act allowed companies to provide government with customer’s electronic information without a warrant or other legal document • It did not have to be provided following a request, it could be the initiative of the company as an “immediate threat to a national security interest” which was later changed to “subjective good faith” • This did not require judicial oversight or notification to the person communicating the information
  • 17. • Buy-in from others in the organization is needed during the design and development stage of the system and not when the system is being implemented
  • 18. • Why does it take an event to occur before our government begins to focus attention on the situation?
  • 19. • Dhillon, G. (2013). Enterprise cyber security: Principles and practice. Washington, D.C. Paradigm Books