Feeds

Securing cyberspace against war, terror and red tape

DHS's Greg Garcia in the hot seat

Boost IT visibility and business value

It was just this week that a research firm from Atlanta came out with research about a botnet they call Kraken, evidently it goes under other names such as Bobax. It's a massive botnet, and it's living in many cases inside of fortune 500 companies and presumably other places it shouldn't be. If Fortune 500 companies aren't taking steps to prevent this kind of thing, what evidence do we have that we're really on the right track when it comes to preventing attacks against important infrastructure?

Good question. I think a lot of companies are taking the right steps and a lot of companies are not taking the right steps and part of my role is to communicate the business proposition to these companies as to why they need to take steps to protect against threats that they're not actually seeing. And that's the challenge from a lot of the companies - they feel they need to actually see the threat but sometimes they don't know that they're being infiltrated.

This conference is evidence - there are what 17,000 people here - that there is an increasing awareness. So even though there are a lot of companies that are responsible and doing the right thing, our networks really are only as strong as the weakest link and because we are so interconnected, if there are companies that are not doing what they need to do to protect their networks, that in turn may be jeopardizing the security of companies that very well may be doing the right thing, and the federal government as well.

So do you use a carrot, or at some point do you use a stick?

I think it's really a combination, but a stick model, if you mean regulatory, I would be concerned that we could through a regulatory model not keep up with evolving technology, we could not keep up with evolving threats and that what instead we need to do is to push the market place to provide market-based incentives for companies that in order for me as one company to do business with you as another company, I need to be convinced that you're doing the right thing with you're networks.

If you're going to connect to me I don't want to catch your virus. I as your customer have to demand this upon you as my vendor or my service provider. That's the model we're trying to push. The stick has to be coming from the market place to the market place, not from the government to the marketplace.

Build a business case: developing custom apps

More from The Register

next story
Hello, police, El Reg here. Are we a bunch of terrorists now?
Do Brits risk arrest for watching beheading video nasty? We asked the fuzz
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.