Quantcast
Channel: Firestorm Articles RSS Feed
Viewing all articles
Browse latest Browse all 27

Security Breach at Kennedy | Cybersecurity - Beyond Cyberspace | DISASTER DUE DILIGENCE | 17 August, 2012

$
0
0

 
    DISASTER DUE DILIGENCETM   |   17 August, 2012
Recommended News, and Original Commentary and Analysis from Firestorm®
Our Experts The Book Crisis Blog Visit our website In a Crisis?
 
  Latest News - What We're Reading  
Security Breach at New York’s Kennedy Airport - Security Flaw Exposed

According to news reports regarding the recent security breach at New York’s Kennedy Airport, the visceral reaction by some is that the technology failed.  This may be true; however, any review of the security breach should consider the non-technical aspects as well. 

It is absolutely critical to review what happened and why — however investigators might discover during the analysis, that the technology worked fine and it was a policy, process or training issue that created the vulnerability. 

A systems approach in the analysis to the security breach would consider not only the technical capabilities that some assert may have failed, but also those responsible for monitoring the technology and their training—as well as policy, planning and exercises employed that are designed to test the system’s capabilities. 

Any analysis should consider all elements that may have contributed to the security breach.  Technology solutions are only as good as those who employ them; the human element will always be a necessary component. Firestorm Expert Council member Pat Philbin

West Nile Virus Spreads

West Nile virus is spreading faster than it has in years, health officials stated, and the pace of the mosquito-borne disease is getting worse. States are reporting more cases than usual, said a specialist in mosquito-borne diseases with the Centers for Disease Control and Prevention (CDC) in Fort Collins, Colorado, and Texas is getting the worst of it.

 
Michael Dell's daughter all at sea on social networks - how do your kids measure up?

As a very prominent CEO and public figure, Michael Dell spends millions of dollars a year on private security. His children however, don't seem to have the hang of online safety. His daughter has apparently been suspended from Twitter for being too open with details of the family's activities and whereabouts. This article from NakedSecurity contains excellent tips to keep you, your family and your business safe on the web.

  From our Blog - What We're Writing  

2012 FEMA Region IX Public

 
Marisol ShankarMarisol Shankar gives us her analysis on her recent attendance at the 2012 FEMA Region IX Public / Private Sector Leadership Conference in Los Angeles. Her takeaways of recurring themes?  1: Build relationships before disaster strikes 2: The federal government cannot and should not take on the task of preparing communities/cities/counties/states 3: We are getting there, need to continue furthering existing efforts. Read more


How To Regain Control in a Social Media Crisis

One of the biggest stresses of a social media crisis is the loss of control that comes with one. Organizations see their social media platforms being taken over with negative and critical comments and they don’t know what to do or how to respond in order to regain control of the situation. From Firestorm Expert Council Member Melissa Agnes.  Melissa will Co-host a Firestorm Session with Grant Rampy on September 12 on Transparency: Can There Be Too Much?. Read more

Cybersecurity – Critical Computer Infrastructure Should Extend Beyond Cyberspace

Ed Levy for Firestorm on CybersecurityEd Levy discusses the current Administration's statement of “exploring whether to issue an executive order to protect the U.S. critical computer infrastructure from cyber attacks.” Ed is a senior security executive with nearly 30-years in the corporate and government sectors. Mr. Levy was the VP & Global Head of Security for Thomson Reuters: Read more


 
 
                       
  FIRESTORM®  EVENTS  
  Threat Management: Navigating the Obvious  
 
with Chief Security Officer Ed Levy


Do you really know what’s walking out of your door?

According to results of ID management provider Cyber-Ark's sixth annual global "Trust, Security and Passwords Survey," just under half of 820 respondents admitted if they were fired tomorrow, they'd walk out with proprietary data such as privileged password lists, company databases, R&D plans and financial reports -- even though they know they are not entitled to it.



  Transparency: Can There Be Too Much?
Social Media and PR Risk Management
 

With Melissa Agnes and Grant Rampy on September 12



In this session, Grant Rampy and Melissa Agnes examine the mature, business-minded approach organizations should pursue when it comes to social media and crisis communications. Sure, social media demands that we be transparent with our audience, but what exactly does that mean? Where is the line drawn between being transparent and being too transparent?




Suzy Loughlin to Present "Who Owns Brand You with Tabletop Exercise
Sullivan County Chamber of Commerce
Liberty, NY

Ed Levy To Present at ASIS Philadelphia: Duty Of Care: What's The Security Director's Role?

Guy Higgins to Present Social Media Crisis Communication at Rocky Mountain Chapter of the Association of Contingency Planners


JOIN US AT DRJ FALL WORLD! BOOTH 105



 

  FIRESTORM - DISASTER DUE DILIGENCETM
Your Crisis Coach™ for Crisis Management, Critical Decision Support, Crisis Communications, Crisis Public Relations, and Consequence Management
1000 Holcomb Woods Pkwy | Suite 130  
Roswell, GA  |  30076
(800) 321-2219
Send us an email
firestorm.com


17-Aug-12 11:00 AM

Viewing all articles
Browse latest Browse all 27

Latest Images

Trending Articles





Latest Images