CYBERSECURITY: A SPECIAL REPORT

Fort Meade transforming from Army base to cyber city

The area is thriving from a boom in cybersecurity and intelligence work — fields that are expected to grow.

After leaks, NSA struggles for trust

Agency is trying to regain industry’s faith in order to work cooperatively against cyber-threats.

The arms race in cyberspace

Offensive cyber-operations are inevitable part of conflict, and no more likely to go away than guns or missiles.

 

Rep. Rogers: Snowden might have outside help

 

A World Health Organization for cyber defense

A World Health Organization for cyber defense

At Washington Post Live's 2013 Cybersecurity Summit, Microsoft’s Craig Mundie cites a health space analogy for what companies and government bodies need in a vulnerable cyber world. He says we need a World Health Organization equivalent for networks. ”This is where I think government has a role to play,” Mundie says. “If all governments are late to the party, you do have the tendency for the private sector to come forward. In the U.S., it’s vigilantism, it’s illegal to chase bad guys up the wire and certainly illegal to shoot back."
'I don't speak dolphin'

'I don't speak dolphin'

We’re pretty vulnerable,” says former deputy secretary of homeland security Jane Lute at Washington Post Live's 2013 Cybersecurity Summit. “For a long time, we’re chasing the shiny new widget. We need to stay on top of the critical controls. We also need to focus on manpower. You can ask executives, ‘are you talking to your CTO?’” The response generally, according to Lute, “‘I don’t speak dolphin.’”
Cyber attacks, from personal information to destruction

Cyber attacks, from personal information to destruction

“Something like this will happen,” says former deputy secretary of defense William J. Lynn of Washington Post Live’s simulation cyber attack. Lynn recounts that the cyber threat used to be theft of information or theft of money. “We’ve now moved up to disruption,” he says. “The third level is actual destruction. I think it’s reasonable to believe that we’re moving in that direction.”
Ex-NSA chief Michael Hayden on Edward Snowden

Ex-NSA chief Michael Hayden on Edward Snowden

"How on earth did Edward Snowden get access to so much stuff?" Washington Post syndicated columnist David Ignatius asks former CIA and NSA director Michael Hayden.
Cyber security in the information age

Cyber security in the information age

Mark Young, former executive director of the Directorate for Plans and Policy at U.S. Cyber Command, is president of the cyber consulting firm Ronin Analytics. He says cybersecurity processes need to be updated to reflect the information age.
Rep. Rogers: Combined solution likely on debt limit, continuing resolution

Rep. Rogers: Combined solution likely on debt limit, continuing resolution

Rep. Mike Rogers (R-Mich.) believes conversations are happening in Congress that will end the shutdown soon and that there will probably be a combined solution on the debt limit and a continuing resolution.
'Basic hygiene' reducing the risk of cyber attacks

'Basic hygiene' reducing the risk of cyber attacks

Visa handles 30,000 transactions a second, 56 billion transactions a year, according to Ellen Richey, Visa's chief enterprise risk officer. “The payment industry is losing $10 billion a year from [cyber] theft,” she adds, at Washington Post Live's 2013 Cybersecurity Summit. Former deputy secretary of Homeland Security Jane Lute nods at another summit theme — we’re not talking about cyber prevention anymore. “There are a number of things we can do — basic hygiene we can do, but we’re not doing.”
Most data breaches identifed by banks, payment systems says Visa's Ellen Richey

Most data breaches identifed by banks, payment systems says Visa's Ellen Richey

Visa's chief enterprise risk officer Ellen Richey says while she's grateful when government approaches her about potential cyber security issues, most data breaches are identified by banks and payment systems, like Visa. Former deputy secretary of Homeland Security Jane Lute adds, the awareness of the financial sector is incredible. “In the sector of critical infrastructure, not all are up to speed as the financial sector … there’s still a lack of knowledge, and a lack of practice.”
How are corporations, government securing internet backdoors?

How are corporations, government securing internet backdoors?

Former CIA director Michael Hayden and Microsoft senior advisor Craig Mundie discuss the vulnerabilities and securities of internet backdoors.
2013 Cybersecurity Summit Opening Sponsor Remarks

2013 Cybersecurity Summit Opening Sponsor Remarks

Charles Croom, vice president of cyber security solutions at Lockheed Martin, gives the opening sponsor remarks at Washington Post Live's 2013 Cybersecurity Summit.