Profile cover photo
Profile photo
ICIT
1,630 followers -
A tactical, bipartisan forum of Federal Agency executives, legislative community members and industry leaders focused on solutions based strategies to our Nation's critical infrastructure obstacles‏
A tactical, bipartisan forum of Federal Agency executives, legislative community members and industry leaders focused on solutions based strategies to our Nation's critical infrastructure obstacles‏

1,630 followers
About
Posts

Post has attachment

Post has attachment

Post has attachment
Public
Silicon Valley is developing technologies to upload your brain to the cloud after you die. This brings with it a myriad of privacy, ethical, and cybersecurity questions. Fascinating and frightening! What do you think?

#immortal #afterlife #ai #artificialintelligence #cloud #scifi #ethics #cybersecurity

https://www.nbcnews.com/mach/tech/your-brain-cloud-how-tech-world-wants-disrupt-death-ncna894191
Add a comment...

Post has attachment

Post has attachment

Post has attachment
Public
As EU privacy law looms, debate swirls on cybersecurity impact

Days ahead of the implementation of a sweeping European privacy law, debate is swirling on whether the measure will have negative consequences for cybersecurity.

The controversy is about the so-called internet address book or WHOIS directory, which up to now has been a public database identifying the owners of websites and domains.
...

https://www.afp.com/en/news/23/eu-privacy-law-looms-debate-swirls-cybersecurity-impact-doc-1584572
Add a comment...

Post has attachment
Public
Defending against ransomware attacks

Verizon’s 2018 Data Breach Investigations Report found that ransomware accounts for 85 percent of all malware targeting the healthcare industry, according to an article on the Health IT Security website.

One of the best ways to prevent ransomware attacks is to educate employees about how to avoid falling for phishing and other social engineering tactics.

Cyber hygiene is thinking before you click, not surfing the internet for personal reasons like going to Google or Facebook or checking your Twitter feed from a workstation computer, according to ICIT Co-founder and Senior Fellow James Scott.

https://www.healthcarefacilitiestoday.com/posts/Defending-against-ransomware-attacks--18447
Add a comment...

Post has attachment
Public
President Trump Eliminates Job of National Cybersecurity Coordinator

President Donald Trump eliminated the job of the nation’s cybersecurity czar. Democratic lawmakers immediately introduced legislation to restore it. Why?
To note, this White House position was created in 2009, under the Barack Obama Administration, by the State Department’s coordinator Chris Painter. It echoes the same demonstrative spirit the Department of Homeland Security had when set up illegitimately by the George W Bush administration after the 9/11 tragedy, ponder that if you will.
...
Add a comment...

Post has attachment
Public
The FDA Finally Suggests Meaningful Action to Secure Medical Devices

Healthcare depends on the crucial medical devices essential for the treatment and diagnosis of illness and disease. The Food and Drug Administration (FDA) regulates over 190,000 different devices, which are manufactured by more than 18,000 firms in more than 21,000 medical device facilities worldwide. Digital instruments range from pacemakers to MRIs to software-driven insulin pumps. Remote access applications medical apps, telehealth, and other technologies are driving a revolution in health care. While health systems offer significant increases in patient well-being and convenience, internet-connected devices also pose a risk to consumers. In the past, security-by-design has been absent in health devices because functionality and cost were more heavily prioritized. However, the FDA now recognizes that its public health responsibilities span the life cycle of medical devices. Additionally, the FDA acknowledges that it must make well-supported regulatory decisions that account for each lifecycle stage and the totality of the evidence, to determine whether the benefits of devices outweigh the risks to consumers and vital systems. To improve device cybersecurity, The US Food & Drug Administration plans to ask Congress for more funding and regulatory powers to improve its approach towards cybersecurity and medical device safety [1]. According to the recently released “Medical Device Safety Action Plan: Protecting Patients, Promoting Public Health.”
...
Add a comment...

Post has attachment
Public
Crushing Protectionist Silos to Expedite Tech Industry Niche Evolution: Using Social Media to Curate and Disseminate Information

The digital threat landscape is comprised of organization-centric asymmetric warfare theaters populated by innumerable hyper-evolving sophisticated and unsophisticated adversaries with myriad motives, tools, techniques, and procedures. As trite as it sounds, it remains true now more than ever that “knowledge is power.” However, in the Digital Age, where access to information is ubiquitous, pervasive, and immediate, it can prove challenging to isolate essential content from the surrounding multitude of uncultivated material, distracting articles, memes, fake news, disinformation, media talk-pieces, or coverage that is simply non-essential to the audience. Ignorance of a threat or emerging technology can prove deadly to businesses and devastating to consumers. Human-operated social media accounts that propagate curated content can help to level the threat landscape by broadcasting critical information between and outside of niche industry silos and can thereby elevate inclusive cybersecurity and cyber-hygiene conversations and cross-sector efforts by informing key stakeholders of glaring vulnerabilities, emerging trends, and nescient threats.
...
Add a comment...
Wait while more posts are being loaded