https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2022 Winter Showcase
    • IWCE 2023 Pre-event Guide
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2023 Pre-event Guide
    • IWCE 2022 Winter Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Call Center/Command


Speaker: Choose security battles wisely

Speaker: Choose security battles wisely

The hacker community is populated with “too many smart people,” who are becoming more clever and sophisticated in their tactics, according to Eric Winsborrow, vice president of product marketing for network security solutions vendor McAfee
  • Written by Urgent Communications Administrator
  • 9th January 2006

ORLANDO–Enterprise IT security professionals should use a rifle-shot rather than shot-gun approach to preventing network attacks, because the hacker community is populated with “too many smart people,” who are becoming more clever and sophisticated in their tactics. So said Eric Winsborrow, vice president of product marketing for network security solutions vendor McAfee, today at the Homeland Security for Networked Industries conference here.

“They can’t possibly deal with everything,” Winsborrow said. “But what they can do is better manage the risk.”

He added that companies often spend too much money on their security efforts, creating systems so unwieldy that they are difficult to manage and siphoning resources from other important areas.

“If you keep buying solutions, you end up with a lot of stuff that doesn’t work together, and you quickly come to a point of diminishing returns.”

W. Hord Tipton, chief information officer for the Department of the Interior, who also spoke at the conference, agreed. “The only technology issues that we have are in keeping up with the technology,” he said. “There are almost too many tools. The challenge is to figure out which ones fit best.”

Instead of focusing on tools, Winsborrow suggested that IT security managers pinpoint assets and then prioritize them based on value and vulnerability.

“Risk is a mathematical equation that centers on vulnerabilities, assets and threats,” Winsborrow said. “True risk occurs when all three are at a high level. At some point, they have to do triage on their assets and spend their money on the ones with the greatest risk.”

A tool that AT&T uses to conduct such assessments for its internal systems will be made available to external customers later this year, according to speaker Roberta Bienfait, AT&T’s vice president of operations. Likening it to Wall Street’s Dow Jones Index, the solution provides analysis of potential cyber security problems, letting the carrier’s IT security managers pick and choose the ones worth addressing. When it comes to cyber security, more information always is better, according to Bienfait.

“It’s all about being proactive, predictive and preventive,” she said. “You can’t be reactive today. You have to have people running ‘what if’ scenarios all the time.”

Hord further suggested that enterprises could improve their cyber security efforts simply by consolidating their systems. Hord has overseen an effort by the DOI—which consists of eight agencies and 70,000 employees that manage facilities over 504 million acres (20% of the U.S. land mass) and control a $16.2 billion annual budget—that has reduced 13 wide area networks to one and 33 internal points of presence to five.

“It’s been a laborious effort,” Hord said. But he quickly added that the effort already is paying dividends. “We’re saving $2 million a year just in operating costs,” he said.

However, Hord added that despite the DOI’s best efforts, the department’s Web sites “are still proliferating.” At one point, DOI agencies maintained 50,000 sites. “It’s impossible to coordinate … in that scenario,” he said.

One type of attack that increasingly is popping up on the radar screens of cyber security professionals is created by software robots—or “botnets”—that are placed on unsuspecting computers and allow hackers, through the use of worms or Trojan horses, to gain control of the device without the user suspecting anything. Botnets currently are used primarily to steal data from enterprises that then is sold to the highest bidder, or to create a network of computers whose capacity is then leased to outside entities. But fear is growing that hackers eventually would use botnets to take down entire systems, said Donald (Andy) Purdy, acting director of the Department of Homeland Security’s National Cyber Security Division, also speaking at the conference.

“They’re getting into systems, and people aren’t noticing,” he said. “There is a false sense of security. You have to assume that they’re stealing your data every day.”

Purdy added that enterprises must become cognizant of the fact that hackers “can do harm when and where they want to.”

The key to mitigating such attacks, or at least lessening their severity, is preparedness. But cost-conscious executives often don’t provide to cyber security professionals enough resources to fight the battle, Purdy said. Consequently, he suggested that lawmakers hold CEOs accountable for sensitive data pirated from their company’s information systems, just as it did in 2002 when it passed the Sarbanes-Oxley Act, which allows criminal and civil penalties for inaccurate financial disclosure statements in the wake of the WorldCom and Enron scandals.

“If they’re held responsible, it might create a new dimension to get more resources in the right places,” Purdy said.

Tags: Call Center/Command content Enterprise Wireless Networks

Most Recent


  • How AT&T won DFW Airport's $10 million private 5G business
    According to Mike Youngs, it all started with the bathrooms at Dallas Fort Worth (DFW) International Airport. Youngs, the airport’s VP for IT, wanted to use wireless technology to reduce crowding in restroom lines during the COVID-19 pandemic. His team installed sensors and lights above stalls and monitors outside restrooms to let people know when […]
  • Russia's war in Ukraine shows cyberattacks can be war crimes
    Russia’s cyberattacks against Ukrainian civilian and critical infrastructure has shown what it looks like when cyberattacks are part of warfare. What remains to be seen is whether the world will treat them as war crimes. “For too long, the world has been considering cyber terrorism as something unrealistic, too sci-fi-ish, and cyber weapons as not […]
  • FCC grants 700 MHz Band 14 license renewal to FirstNet Authority
    An FCC bureau yesterday renewed the FirstNet Authority’s spectrum license into at least 2027, allowing the nationwide public-safety broadband network (NPSBN) to continue operating over the 700 MHz Band 14 airwaves—a key component of the FirstNet Authority’s 25-year agreement with contractor AT&T. Approved by the FCC Public Safety and Homeland Security Bureau (PSHSB), the license […]
  • How vehicle insurance and autonomy intertwined
    In early 2023 Oxbotica claimed at an event, which was held at Lloyd’s of London about the Future of Autonomy that insurance and autonomy are intertwined. At the event, Sam Tiltman, sharing economy and mobility leader for the UK & Ireland at Marsh, claimed that the combined impact of Mobility-as-a-Service (MaaS), electric vehicles and automation is huge. […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • New Orleans-area 911 center inks multiyear APEX deal with Carbyne to replace call-handling system
  • Speaker: Choose security battles wisely
    Newscan: Feds recover millions from pipeline ransom hackers, hint at U.S. Internet tactic
  • Cyber is the new Cold War, and AI is the arms race
  • Private wireless networks in the US start going public

Commentary


Updated: How ‘sidelink’ peer-to-peer communications can enhance public-safety operations

  • 1
27th February 2023

NG911 needed to secure our communities and nation

24th February 2023

How 5G is making cities safer, smarter, and more efficient

26th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

How AT&T won DFW Airport’s $10 million private 5G business dlvr.it/Spj4Pt

27th May 2023
UrgentComm

Russia’s war in Ukraine shows cyberattacks can be war crimes dlvr.it/Spj3c2

27th May 2023
UrgentComm

FCC grants 700 MHz Band 14 license renewal to FirstNet Authority dlvr.it/Spj2Ny

27th May 2023
UrgentComm

Broadband for Critical Communications Everywhere Providing Connectivity When Seconds Count dlvr.it/Sph602

26th May 2023
UrgentComm

How vehicle insurance and autonomy intertwined dlvr.it/SpglBb

26th May 2023
UrgentComm

World’s least-expensive self-driving vehicle revealed dlvr.it/Spgc88

26th May 2023
UrgentComm

Voice calling is finally making its way onto 5G dlvr.it/SpdtYW

26th May 2023
UrgentComm

With many cities facing a fiscal cliff as ARPA funding ends, debt ceiling debate continues on Capitol Hill dlvr.it/Spdsnq

26th May 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.