19 Jun Daily Rundown: 4 CISO Tips, Ireland Under Cyberattack, U.S. Marine Corps On Cyberwarfare
Cybersecurity news, odds and ends from Cybercrime Magazine
– Kerry Morgan, Cybercrime Reporter
Northport, N.Y. — Jun. 19, 2018
TODAY IN CYBER
The cybercrime stories we’re following, and you should too:
- Cybersecurity “boot camp” for teachers. New College Institute pairs with James Madison University to train educators on the basics of cybersecurity.
- University of New Orleans receives six figure grant for new cybersecurity training facility.
- Four tips to help narrow the gap between CISOs and board executives. Effective communication between security and business departments is imperative.
- Cybercrime hitting Ireland hard — nearly half of Irish businesses have reported cyberattacks within the past two years.
- Cyprus jumps on cybercrime. Police chief states additional resources will be given to their Office for Combating Cybercrime — including assigned “web constables.”
- U.S. Marine Corps increases focus on cyber warfare and growing their labor force behind it.
- Three months after cyberattack on Atlanta City Hall, Atlanta Police Chief discloses years of dashcam footage had been wiped out during the ransomware attack.
Cybersecurity expert and TED/TEDx speaker Jagdish Mahapatra explains that we’re making it so easy for the bad guys to harm us.
They said it, and it’s worth repeating:
“There are two kinds of people in America today: those who have experienced a foreign cyber attack and know it, and those who have experienced a foreign cyber attack and don’t know it.”
– Frank Wolf, Former Representative, VA 10th District.
Cybersecurity conferences and expos:
Aug. 9-12. DEF CON Hacking Conference, Las Vegas. 26th Annual Conference. One of the world’s biggest hacker conventions. Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, phone phreaking, hardware modification, and anything else that can be “hacked.”
Cyber terms for newbies, students, teachers, IT pros and everyone else:
Hijacking is a network security attack by which the intruder takes control of a connection, while a session is in progress. The intruder gains unauthorized access to the information.
Our editors’ picks for the best hacking and cybercrime movies:
1974 — The Conversation — Gene Hackman plays a surveillance expert using high-tech equipment (back in the day) to spy on a couple he fears may be in danger. Nominated for three Oscars.
Books that arm readers in the war against cybercrime:
Hacking the Hacker: Learn From the Experts Who Take Down Hackers by Roger Grimes, features 26 top hackers devoted to making the world a more cyber secure place.
Looking for cybersecurity lists? We’ve got a new one every day:
New York Cybersecurity Companies – a list of the hottest and most innovative cyber fighters in and around the Big Apple.
Top cybersecurity experts sharing their insights on social media:
@kevinmitnick — Kevin Mitnick: The World’s Most Famous Hacker, Security Consultant, Author, Public Speaker, and Chief Hacking Officer at KnowBe4.
Check back each business day for a new edition of the Daily Rundown!
– Kerry Morgan is a Cybercrime Reporter for Cybercrime Magazine.