CSO - You know by now that cyber attacks are a growing threat to US government data facilities, critical infrastructure and American businesses. Thursday at RSA Conference 2012, FBI Director Robert Mueller will explain how the threat has been a game changer for his agency.
While Mueller's presentation isn't public at this point, an FBI spokesperson told CSO that his remarks would track closely with similar remarks made recently by FBI Executive Assistant Director Shawn Henry.
Henry has said in a number of presentations and interviews that you can't just use technology to defeat cyber threats, you have to know who is attacking you and what they're after. Henry has also suggested that the US create a new, separate, highly secure Internet for critical infrastructure, financial institutions and the government.
Notably, the FBI has itself been the target of a number of attacks recently, including an attack by the group Anonymous shortly after the FBI and New Zealand authorities arrested Megauploads founder Kim Dotcom.
Previously, in his testimony before Congress regarding the FBI's 2012 budget, Mueller noted that the FBI would need greater resources to continue its fight against cyber terrorism and other cyber attacks. "Technological advancements and the Internet's expansion will continue to empower malicious cyber actors to harm U.S. national security through criminal and intelligence activities," Mueller said in his testimony. "We must maintain our ability to keep pace with this rapidly developing technology."
The FBI's stance on cyber-attacks hasn't changed except to raise the level of urgency. Henry, in an interview with the Associated Press and reported in Air Force Times, said that networks should be developed where anonymity is not an option.
Mueller's view on the critical cyber security issues are nearly certain to reflect the views of the Obama Administration, which were expressed in recent Senate Cybersecurity hearings. Measures the administration espoused include a public-private partnership to help share information on cyber attacks. Previous statements by Mueller and others in the FBI have focused on the necessity for information sharing as an effective means of fighting cyber terrorism and other types of cyber-attacks.
Previous FBI statements regarding cyber attacks have stressed the fact that terrorist groups and nationally-sponsored hacker groups can tap into cybercrime organizations and use their resources, such as their botnets, to mount attacks on the US government and critical infrastructure. It was one such attack that succeeded briefly against the FBI and the US Department of Justice following the Megauploads arrests.
Read more about malware/cybercrime in CSOonline's Malware/Cybercrime section.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts