У нас вы можете посмотреть бесплатно US Cybersecurity Policy for Data Breach, Ransomware and Supply Chain или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Moderator: Roslyn Layton, Program Chair, TPRC49 Speakers: Carole House, Director of Cybersecurity and Secure Digital Innovation, White House National Security Council (NSC) Brendan Carr, Commissioner, Federal Communications Commission Josephine Wolff, Assistant Professor of Cybersecurity Thomas Vartanian, Financial Technology and Regulatory Expert Karl Grindal, School of Public Policy, Georgia Tech University This webinar reflects on recent high profile cyberattacks in the USA which appear to be growing more frequent, more sophisticated, and more devastating. Recent ransomware attacks of JBS and Colonial have targeted critical infrastructure in the food and energy sectors. US and European governments experienced massive data breaches via a stealth attack which exploited software and credentials of Microsoft, SolarWinds, and VMWare. The panel will explore who bears responsibility to prevent and mitigate attack and whether products, services, and systems be certified to reduce risk. Cyber policy issues are more than technical and legal matters as they implicate larger geopolitical and economic forces. Many attacks originate from state actors like Russia, China, Iran, and North Korea, or actors residing in those states with support or at least neutrality from the government. Of these countries, only China has a leading information technology industry whose products, services, and applications are increasingly used by Americans. US voters and policymakers are questioning the efficacy of building critical infrastructure with components from the same vendors that facilitate China’s surveillance state in addition to the plethora of imported devices which may be manufactured with backdoors and forced labor and be governed by an extraterritorial set of laws and practices antithetical to the US Constitution and its associated rights. This event provides an overview of complex, integrated policy issues and how to support the research agenda on data breach, ransomware, and supply chain. It features remarks from leaders at the White House National Security Council, the Federal Communications Commission, and leading institutes for the study of public policy. It is followed by an overview of historical data on cyberattacks and a policy discussion.