David Jarvis: CISOs and other security leaders are asking, "How do I assess the real security risks to my company? How can I best communicate that risk to the broader organization and manage expectations? Even if I succeed at that, do I have the skills, resources and tools for success?" These are all important questions.
Richard Bejtlich: The administration should develop the capability to take asymmetric actions that target adversary core interests, but in a way that leverages our strengths against their weaknesses.
Lisa Monaco: We are not where we need to be in terms of federal cybersecurity.
David Sanger: The ultimate Russian hack on the United States could involve severing the fiber-optic cables at some of their hardest-to-access locations ... where the cables are hard to monitor and breaks are hard to find and repair.
Steven Bellovin: There's good evidence that people are playing serious malicious games with the routing table.
James Suroweicki: The only way to win the game is simply not to play.
|