• One of our PMOs focuses on computer security and protecting critical information infrastructure.

    WHITEHOUSE: Testimony of Joshua Gotbaum

  • Board of Computing Professionals Malaysia does not aim to regulate the computing profession in the nation but only applies to those who are identified as Critical National Information Infrastructure (CNII) entities with the intent to safeguard the interest of the nation in view of the current dynamic and challenging global environments.

    FORBES: Malaysian IT Community Response to Board of Computing Professionals Malaysia Bill 2011: Where's the Beef?

  • We need to make it easier for the government to share threat information so critical-infrastructure companies are better prepared.

    WHITEHOUSE: Taking the Cyberattack Threat Seriously

  • The EO actually does a couple of good things: It authorizes government agencies to share classified and unclassified threat and technical information with critical infrastructure owners and operators and allows for the expedited processing of security clearances to personnel within these entities.

    FORBES: Obama's Cybersecurity Action Reaches Too Far

  • The order will make it easier for private companies in control of our nation's critical infrastructure to share information about cyber attacks with the government.

    CNN: Obama challenges Republicans to help middle class grow

  • On cybersecurity, Obama signed an order on Tuesday making it easier for private companies controlling critical infrastructure to share information about cyber attacks with the government.

    CNN: Obama keeps pressure on Republicans with jobs plan

  • In March, Forbes.com obtained a document revealing a piece of the cyber initiative known as Project 12, which former officials say is designed to create channels for sharing classified information between government and critical infrastructure.

    FORBES: Bush's Cyber Secrets Dilemma

  • The methods and means used by unfriendly competitors or hostile nation states and the nature of modern day information processing technology dictate that we must be vigilant in protecting critical information assets and our national research infrastructure.

    CENTERFORSECURITYPOLICY: What should be done?

  • Marcus Sachs, the executive director of national security policy at Verizon (nyse: VZ - news - people ), was hopeful that Chertoff's appeal to the private sector at RSA might mean more information sharing with those critical infrastructure systems.

    FORBES: Bush's Cyber Secrets Dilemma

  • As we continue to improve our cybersecurity under existing authorities, comprehensive legislation remains essential to securing our critical infrastructure, facilitating greater cyber information sharing between government and the private sector, and protecting the privacy and civil liberties of the American people.

    WHITEHOUSE: The White House

  • In his position in the Homeland Security Intelligence division, he had access to a wide range of top-secret information, including vulnerabilities of national critical infrastructure.

    CENTERFORSECURITYPOLICY: 10failures

  • Because telecom carriers are identified as critical infrastructure you can see where resistance to information sharing comes from.

    FORBES: There Is No Need For A Cybersecurity Executive Order

  • Under the leadership of a few forward-thinking policymakers such as former Deputy Secretary of Defense William Lynn, the Department of Defense and intelligence community have greatly strengthened their information defenses and begun helping industry to protect critical infrastructure.

    FORBES: U.S. Headed For Cyberwar Showdown With China In 2012

  • Earlier this month, President Obama signed an executive order that directed federal agencies to improve information sharing about cyber threats with companies that own and operate critical infrastructure.

    FORBES: Forget Twitter Hacks. Verizon Says Skyrocketing Attacks On U.S. Infrastructure Are Real Cyber Threat

  • The information gathered by Perfect Citizen could also have applications beyond the critical infrastructure sector, officials said, serving as a data bank that would also help companies and agencies who call upon NSA for help with investigations of cyber attacks, as Google did when it sustained a major attack late last year.

    WSJ: U.S. Program to Detect Cyber Attacks on Infrastructure

  • Shahar Maor, an information-technology analyst at Israeli market research firm STKI, estimated that compared with large companies associated with defense or critical infrastructure, lower tier Israeli companies hire one-fifth as many information-security employees relative to computer users.

    WSJ: Israel's Businesses Losing the Cyber War

  • Creating an infrastructure and processes that delivers the right information to the right people is also critical.

    FORBES: Will Big Data Actually Live Up To Its Promise?

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定