<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Cybersecurity &#8211; CalWatchdog.com</title>
	<atom:link href="https://calwatchdog.com/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://calwatchdog.com</link>
	<description></description>
	<lastBuildDate>Wed, 16 Mar 2016 15:11:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">43098748</site>	<item>
		<title>State&#8217;s top cyberdefender steps down after months of criticism over security lapses</title>
		<link>https://calwatchdog.com/2016/03/16/states-top-cyberdefender-steps-months-criticism-security-lapses/</link>
					<comments>https://calwatchdog.com/2016/03/16/states-top-cyberdefender-steps-months-criticism-security-lapses/#comments</comments>
		
		<dc:creator><![CDATA[Matt Fleming]]></dc:creator>
		<pubDate>Wed, 16 Mar 2016 15:11:03 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Inside Government]]></category>
		<category><![CDATA[Elaine Howle]]></category>
		<category><![CDATA[Jerry Brown]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[michelle robinson]]></category>
		<guid isPermaLink="false">http://calwatchdog.com/?p=87332</guid>

					<description><![CDATA[Michele Robinson, the state&#8217;s top officer in charge of cybersecurity, stepped down last week after spending the last seven months under fire for widespread lapses in the state&#8217;s safeguards against hacking. In an]]></description>
										<content:encoded><![CDATA[<p><div id="attachment_87342" style="width: 302px" class="wp-caption alignright"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-87342" class=" wp-image-87342" src="http://calwatchdog.com/wp-content/uploads/2016/03/MicheleRobinson.jpg" alt="Michele Robinson" width="292" height="292" srcset="https://calwatchdog.com/wp-content/uploads/2016/03/MicheleRobinson.jpg 600w, https://calwatchdog.com/wp-content/uploads/2016/03/MicheleRobinson-220x220.jpg 220w" sizes="(max-width: 292px) 100vw, 292px" /><p id="caption-attachment-87342" class="wp-caption-text">Michele Robinson</p></div></p>
<p>Michele Robinson, the state&#8217;s top officer in charge of cybersecurity, stepped down last week after spending the last seven months under fire for widespread lapses in the state&#8217;s safeguards against hacking.</p>
<p>In an email to colleagues, Robinson was vague about her reasons, mentioning some &#8220;personal family matters.&#8221; She was mum on the security concerns raised by California State Auditor Elaine Howle in both an audit in August and a hearing last month.</p>
<p>&#8220;It has been an honor to serve as your (chief information security officer) and to work with you all toward the advancement of information security and privacy programs in state government, as well as California’s overall cybersecurity posture,&#8221; Robinson wrote.</p>
<p>In February&#8217;s hearing, Howle <a href="https://calwatchdog.com/2016/03/13/state-auditor-renews-cybersecurity-warning/">doubled down</a> on an audit her office issued last year, which reported 73 of the 77 state agencies had inadequate or worse protections against hacking. Howle&#8217;s top three concerns were the systems protecting state&#8217;s judicial branch, the Board of Equalization and the Public Utilities Commission.</p>
<p>While Howle told the Assembly Committee on Privacy and Consumer Protection and Select Committee on Cybersecurity that the concerns from the summer remained largely unchanged, Robinson contended that Howle had exaggerated the problems.</p>
<p>A spokesman for Gov. Jerry Brown administration told CalWatchdog that the administration would work to fill the position &#8220;as quickly as possible.&#8221;</p>
<p>Robinson was promoted to the post in May 2013.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://calwatchdog.com/2016/03/16/states-top-cyberdefender-steps-months-criticism-security-lapses/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">87332</post-id>	</item>
		<item>
		<title>State auditor warns government agencies in danger of hacking</title>
		<link>https://calwatchdog.com/2016/03/13/state-auditor-renews-cybersecurity-warning/</link>
					<comments>https://calwatchdog.com/2016/03/13/state-auditor-renews-cybersecurity-warning/#comments</comments>
		
		<dc:creator><![CDATA[Chris Reed]]></dc:creator>
		<pubDate>Sun, 13 Mar 2016 12:33:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Inside Government]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[jacqui irwin]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Department of Technology]]></category>
		<category><![CDATA[Board of Equalization]]></category>
		<category><![CDATA[Chris Reed]]></category>
		<category><![CDATA[Elaine Howle]]></category>
		<category><![CDATA[PUC]]></category>
		<category><![CDATA[state auditor]]></category>
		<category><![CDATA[Brown administration]]></category>
		<guid isPermaLink="false">http://calwatchdog.com/?p=87271</guid>

					<description><![CDATA[State Auditor Elaine Howle, who issued a report last year warning of cybersecurity problems at dozens of state agencies, says the problems remain mostly unaddressed. Testifying at a recent hearing]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignnone size-medium wp-image-50515" src="http://calwatchdog.com/wp-content/uploads/2013/09/howle-300x190.jpg" alt="howle" width="300" height="190" align="right" hspace="20" srcset="https://calwatchdog.com/wp-content/uploads/2013/09/howle-300x190.jpg 300w, https://calwatchdog.com/wp-content/uploads/2013/09/howle.jpg 338w" sizes="(max-width: 300px) 100vw, 300px" />State Auditor Elaine Howle, who issued a <a target="_blank">report</a> last year warning of cybersecurity problems at dozens of state agencies, says the problems remain mostly unaddressed.</p>
<p>Testifying at a recent hearing of the Assembly Committee on Privacy and Consumer Protection and Select Committee on Cybersecurity, Howle said 73 of the 77 agencies she reviewed had inadequate or worse safeguards against hacking. Her three biggest concerns: the state&#8217;s court system, the Board of Equalization and the California Public Utilities Commission.</p>
<p>Howle&#8217;s remarks were countered by a representative of the Brown administration. The state Department of Technology&#8217;s chief information security officer, Michele Robinson, said Howle had exaggerated the state&#8217;s problems.</p>
<p>But lawmakers didn&#8217;t appear to accept Robinson&#8217;s defense of the state&#8217;s efforts. Assemblywoman Jacqui Irwin, D-Thousand Oaks, <a href="http://www.kcra.com/news/california-lawmakers-slam-officials-for-technology-gaps/38175862" target="_blank" rel="noopener">told</a> Sacramento TV station KCRA after the hearing that she considered Howle&#8217;s warnings &#8220;very disturbing. &#8230;  We have 160 departments that are holding your private information. So Social Security numbers, addresses, medical information &#8212; yes, there is a risk for the typical Californian.&#8221;</p>
<p>Here is the key summary of Howle&#8217;s 2015 audit:</p>
<blockquote><p>In the past few years, retailers, financial institutions, and government agencies have increasingly fallen victim to cyber attacks. Most recently, in June 2015 the federal Office of Personnel Management announced that a cybersecurity intrusion had potentially exposed the personal information of approximately 20 million current and former federal employees and other individuals. Given the size of California&#8217;s economy and the value of its information, the state presents a prime target for similar information security breaches. Its government agencies maintain an extensive range of confidential and sensitive data, including Social Security numbers, health records, and income tax information. If unauthorized parties were to gain access to this information, the costs both to the state and to the individuals involved could be enormous. However, despite the need to safeguard the state&#8217;s information systems, our review found that many state entities have weaknesses in their controls over information security. These weaknesses leave some of the state&#8217;s sensitive data vulnerable to unauthorized use, disclosure, or disruption.</p></blockquote>
<p>But Howle didn&#8217;t just offer this general conclusion. She also specifically criticized the Brown administration:</p>
<blockquote><p>Despite the pervasiveness and seriousness of the issues we identified, the technology department has failed to take sufficient action to ensure that reporting entities address these deficiencies. In fact, until our audit, it was not aware that many reporting entities had not complied with its requirements. To determine whether reporting entities have met the security standards, the technology department relies on a self-certification form it developed that the reporting entities must submit each year. However, the poor design of this form may have contributed to many reporting entities incorrectly reporting that they were in full compliance with the security standards when they were not. Specifically, we received complete survey responses from 41 reporting entities that self-certified to the technology department that they were in compliance with all of the security standards in 2014. However, when these 41 reporting entities responded to our detailed survey questions related to specific security standards, 37 indicated that they had not achieved full compliance in 2014. &#8230; The technology department was unaware of vulnerabilities in these reporting entities&#8217; information security controls; thus, it did nothing to help remediate those deficiencies.</p></blockquote>
<p>According to KCRA, a state task force created last year could turn in the first draft of a state government cybersecurity initiative this month.</p>
<p>The Howle audit knocking the state government&#8217;s failure to worry enough about hackers was one of six harsh reports she issued in a three-month span last summer, as CalWatchdog <a href="http://calwatchdog.com/2015/09/25/ca-auditor-six-harsh-reports-three-months-2/" target="_blank">reported</a>. Perhaps the most alarming report found that the state did a poor job tracking mentally ill gun owners, despite a previous 2013 audit that warned about the shortcomings of the state&#8217;s efforts.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://calwatchdog.com/2016/03/13/state-auditor-renews-cybersecurity-warning/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">87271</post-id>	</item>
		<item>
		<title>California state agencies easy targets for hackers</title>
		<link>https://calwatchdog.com/2015/09/02/memo-hackers-easy-targets-calif-state-agencies/</link>
					<comments>https://calwatchdog.com/2015/09/02/memo-hackers-easy-targets-calif-state-agencies/#comments</comments>
		
		<dc:creator><![CDATA[Steve Miller]]></dc:creator>
		<pubDate>Wed, 02 Sep 2015 13:14:04 +0000</pubDate>
				<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[CalTech]]></category>
		<category><![CDATA[Department of Technology]]></category>
		<category><![CDATA[Department of Corrections]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Autumn Burke]]></category>
		<guid isPermaLink="false">http://calwatchdog.com/?p=82819</guid>

					<description><![CDATA[This is how the state government handles a department that has continually received sub-par evaluations: add employees, boost wages 17 percent and total spending on salaries by 36 percent. And]]></description>
										<content:encoded><![CDATA[<p><a href="http://calwatchdog.com/wp-content/uploads/2015/08/CalTech-1.png"><img decoding="async" class="alignright size-full wp-image-82860" src="http://calwatchdog.com/wp-content/uploads/2015/08/CalTech-1.png" alt="CalTech (1)" width="175" height="175" /></a>This is how the state government handles a department that has continually received sub-par evaluations: add employees, boost wages 17 percent and total spending on salaries by 36 percent.</p>
<p><span style="font-weight: 400;">And as for retirement benefits, increase those by 79 percent total, or 53 percent per individual employee.</span></p>
<p><span style="font-weight: 400;">These are figures for the California Department of Technology, which again finds itself the butt of a fault-finding </span><a href="https://www.auditor.ca.gov/pdfs/reports/2015-611.pdf" target="_blank" rel="noopener"><span style="font-weight: 400;">audit</span></a><span style="font-weight: 400;">. </span></p>
<p><span style="font-weight: 400;">The report is one big bad report card. It notes that 73 of 77 state departments have not met standard safeguards for their information, for which the department is supposed to be the guardian.</span></p>
<h3>Prone to Hackers</h3>
<p><span style="font-weight: 400;">The newly discovered trouble involves the security of state-held information, including the news that the state’s data centers are subject to thousands of hacker attempts every month.</span></p>
<p><span style="font-weight: 400;">“The California Department of Technology does not provide adequate oversight or guidance to state entities under the direct authority of the governor (reporting entities) for which it has purview,” the audit finds.</span></p>
<p><span style="font-weight: 400;">Auditors were so troubled by lapses in information security at the state’s Department of Corrections that they issued a separate memo to that agency outlining the problems &#8212; the details of which were “too sensitive to release publicly.”</span></p>
<p><span style="font-weight: 400;"><a href="http://calwatchdog.com/wp-content/uploads/2015/08/hackers.jpg"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-82876" src="http://calwatchdog.com/wp-content/uploads/2015/08/hackers-300x171.jpg" alt="hackers" width="300" height="171" srcset="https://calwatchdog.com/wp-content/uploads/2015/08/hackers-300x171.jpg 300w, https://calwatchdog.com/wp-content/uploads/2015/08/hackers.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" /></a>State agencies possess reams of information, from the bank account numbers on income tax forms to the birth dates of victims of crime and the Social Security numbers of people applying for food stamps. </span></p>
<p><span style="font-weight: 400;">The Department of Motor Vehicles alone holds </span><span style="font-weight: 400;">more than</span> <a href="http://www.leginfo.ca.gov/pub/15-16/bill/asm/ab_0251-0300/ab_259_cfa_20150817_104440_sen_comm.html" target="_blank" rel="noopener"><span style="font-weight: 400;">27 million records</span></a><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">There are committees (“the Select Committee on Cybersecurity” in the statehouse) and task forces (the “California Cybersecurity Task Force”) in place to help protect data and info from intruders. But it’s the tech department that has responsibility for ensuring departments’ info is secured. To do so, it requires three annual reports. Last year it even offered a one-day seminar to teach info management people what’s up with data safeguarding.</span></p>
<h3>Who&#8217;s at Fault?</h3>
<p><span style="font-weight: 400;">In one regard, it’s not all on the department; the report found that 90 percent of select departments queried said that they had met the mandates for security when they really hadn’t.</span></p>
<p><span style="font-weight: 400;">Still, when four in 10 departments reported they had not achieved full compliance, “we expected that the technology department would have followed up. … However, when we reviewed the 2014 correspondence between the technology department and a selection of eight noncompliant reporting entities, we found that the technology department did not conduct any follow‑up.”</span></p>
<p><span style="font-weight: 400;">In addition, there are no policies on how to enforce the security requirements.</span></p>
<p><span style="font-weight: 400;">One more interesting element of the audit: Twenty agencies declined to be monitored or assessed and were therefore not measured for cybersecurity compliance. Among them were the Office of the Inspector General, California Department of Resources Recycling and Recovery and the Public Employees’ Retirement System.</span></p>
<p><span style="font-weight: 400;">The auditing team recommends that state lawmakers require the tech department to do an independent, comprehensive security assessment of each reporting entity at least every other year.</span></p>
<p><span style="font-weight: 400;">Auditors also ask legislators to allow the department to ask for money upon any finding of security flaws. The technology department should follow up on any troubled agency and how that agency intends to make its information more secure, the report says.</span></p>
<p><span style="font-weight: 400;">Then a final scold from the auditors: “As a result of the outstanding weaknesses in reporting entities&#8217; information system controls and the technology department&#8217;s failure to provide effective oversight and assist noncompliant entities in meeting the security standards, we determined that some of the state&#8217;s information, and its critical information systems, are potentially vulnerable and continue to pose an area of significant risk to the state.”</span></p>
<p><span style="font-weight: 400;">The Department of Technology didn’t answer questions, but gave the</span><a href="http://www.dailyherald.com/article/20150825/business/308259843/" target="_blank" rel="noopener"> <span style="font-weight: 400;">Associated Press a written statement</span></a><span style="font-weight: 400;">, saying that it is committed to improving oversight and to &#8220;improving the state&#8217;s overall information security posture.&#8221;</span></p>
<h3>A Continuing Pattern</h3>
<p><span style="font-weight: 400;">The report is the second</span><a href="http://calwatchdog.com/2015/03/22/auditor-scolds-state-on-state-computer-disasters/"> <span style="font-weight: 400;">in the last six months</span></a><span style="font-weight: 400;"> to beat down the department. The last one upbraided tech department officials for wasting tens of millions of dollars due to computer troubles and aborted projects that cost taxpayers up to $1 billion.</span></p>
<p><span style="font-weight: 400;">Some lawmakers are trying to throw more money at the agency.</span></p>
<p><span style="font-weight: 400;">One measure would allow the technology department to size up contractors with an evaluation scorecard that would cost  $350,000.</span></p>
<p><span style="font-weight: 400;">“There is no guarantee that they will implement the evaluation system in a long term capacity,” Assemblywoman Autumn Burke, D-Los Angeles, told a Senate committee earlier this month. “In fact, a simple change of leadership with CalTech could put the evaluation system in jeopardy.”</span></p>
<p><span style="font-weight: 400;">Also noted in the conversation was something as scary as a data breach: “Currently the state has 44 IT projects under development that are reported to cost more than $4 billion,” Burke told her colleagues.</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://calwatchdog.com/2015/09/02/memo-hackers-easy-targets-calif-state-agencies/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">82819</post-id>	</item>
		<item>
		<title>Obama heads Stanford Summit on cybersecurity</title>
		<link>https://calwatchdog.com/2015/02/11/obama-heads-stanford-summit-on-cybersecurity/</link>
					<comments>https://calwatchdog.com/2015/02/11/obama-heads-stanford-summit-on-cybersecurity/#comments</comments>
		
		<dc:creator><![CDATA[John Seiler]]></dc:creator>
		<pubDate>Thu, 12 Feb 2015 00:49:43 +0000</pubDate>
				<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Rights and Liberties]]></category>
		<category><![CDATA[John Seiler]]></category>
		<category><![CDATA[President Obama]]></category>
		<category><![CDATA[Tim Cook]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Summit on Cybersecurity and Consumer Protection]]></category>
		<category><![CDATA[Apple]]></category>
		<guid isPermaLink="false">http://calwatchdog.com/?p=73732</guid>

					<description><![CDATA[On Friday, President Obama travels to Stanford University to give the keynote address on a topic much in the news: cybersecurity. Last week, Anthem Blue Cross was hacked and data]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-medium wp-image-73738" src="http://calwatchdog.com/wp-content/uploads/2015/02/obama-cybersecurity-summit-300x132.jpg" alt="obama cybersecurity summit" width="300" height="132" srcset="https://calwatchdog.com/wp-content/uploads/2015/02/obama-cybersecurity-summit-300x132.jpg 300w, https://calwatchdog.com/wp-content/uploads/2015/02/obama-cybersecurity-summit-1024x449.jpg 1024w, https://calwatchdog.com/wp-content/uploads/2015/02/obama-cybersecurity-summit.jpg 1085w" sizes="(max-width: 300px) 100vw, 300px" />On Friday, President Obama travels to Stanford University to give the keynote address on a topic much in the news: cybersecurity. Last week, Anthem Blue Cross was <a href="http://calwatchdog.com/2015/02/05/calpers-reacts-to-anthem-security-breach/">hacked </a>and data stolen. Previous data breaches have hit Target and Home Depot.</p>
<p>He&#8217;ll talk at the White House <a href="http://www.whitehouse.gov/issues/foreign-policy/cybersecurity/summit" target="_blank" rel="noopener">Summit on Cybersecurity and Consumer Protection</a>. According to <a href="http://news.stanford.edu/news/2015/february/cyber-summit-obama-020915.html" target="_blank" rel="noopener">Stanford News</a>, participants include other government leaders, law-enforcement officials, consumer advocates, students and executives from finance, technology, security and communications companies.</p>
<p>Most watched will be the president&#8217;s remarks on information security and the reaction of top Silicon Valley executives, Jim Harper told CalWatchdog.com; he’s a senior fellow in information studies at the Cato Institute. He said that, because the president now is a lame duck and doesn&#8217;t face re-election, he might not &#8220;feel he has to be too strong on cybersecurity&#8221; by his own government.</p>
<p>It&#8217;s been less than two years since National Security contract employee <a href="http://www.biography.com/people/edward-snowden-21262897" target="_blank" rel="noopener">Edward Snowden</a> exposed how the NSA essentially scoops up almost all data in America. Yet neither the president nor Congress has advanced any substantial changes in policy.</p>
<p>&#8220;Obama has essentially allowed the NSA free rein,&#8221; Harper said. &#8220;And what the NSA has done is a major setback for Silicon Valley&#8221; because potential customers, especially overseas, can&#8217;t be sure American services aren&#8217;t bugged by the NSA from the start. That situation encourages business moving to the foreign competition.</p>
<p>Harper said he expects &#8220;some of the speeches from Silicon Valley will give him a piece of their mind&#8221; on the security issue. Most watched will be the comments of Tim Cook, the CEO of Apple Inc., the Valley&#8217;s most glittering and profitable company.</p>
<p>And because of the president&#8217;s problem with government spying on data, Harper added, anything he says about private security networks will be questioned.</p>
<h3>FCC regulations</h3>
<p>The president&#8217;s visit also comes as his appointees on the Federal Communications Commission seek heavier regulation of the Internet through what is called &#8220;Net Neutrality&#8221; or the &#8220;Open Internet.&#8221; It&#8217;s a topic he also might address.</p>
<p>According to<a href="http://www.fcc.gov/openinternet" target="_blank" rel="noopener"> the FCC&#8217;s website</a>, &#8220;Under this principle, consumers can make their own choices about what applications and services to use and are free to decide what lawful content they want to access, create, or share with others. This openness promotes competition and enables investment and innovation.&#8221;</p>
<p>Critics charge Net Neutrality would mean <a href="http://www.realclearpolicy.com/2014/11/24/net_neutrality_takes_us_back_to_the_1930s_23183.html" target="_blank" rel="noopener">1930s-era telephone regulations</a> applied to the Internet, with heavy handed government involvement stifling innovation.</p>
<p>Harper said Obama now is &#8220;at the mercy of the bureaucrats&#8221; he appointed. And because the president is a lame duck, he doesn&#8217;t have a compelling reason to go against the FCC.</p>
<p>The Federal Election Commission also is getting into the act. The Washington Examiner reported today, &#8220;Claiming that thousands of public comments condemning &#8216;dark money&#8217; in politics can’t be ignored, the Democrat-chaired Federal Election Commission on Wednesday appeared ready to open the door to new regulations on donors, bloggers and others who use the Internet to influence policy and campaigns.&#8221;</p>
<h3>Silicon Valley</h3>
<p>Silicon Valley remains the driving engine of California&#8217;s economy, as well as much of the U.S. and world economies. So the reactions of tech luminaries to the president&#8217;s words will be telling on how the industry, which has been increasingly active in politics, will be reacting to Obama administration actions.</p>
<p>Just last October, Apple offered stronger encryption on its communications, bringing down a condemnation from the Obama administration.</p>
<p><a href="http://www.theguardian.com/technology/2014/oct/17/apple-defies-fbi-encryption-mac-osx" target="_blank" rel="noopener">Reported the Guardian</a>, &#8220;The latest version of Apple’s operating system for desktop and laptop computers, Mac OS X 10.10 &#8216;Yosemite,&#8217; encourages users to turn on the company’s FileVault disk encryption, as the company hardens its pro-security stance. &#8230; The FBI’s director, James Comey, <a class=" u-underline" href="http://www.theguardian.com/us-news/2014/oct/16/fbi-director-attacks-tech-companies-encryption" data-link-name="in body link" data-component="in-body-link" target="_blank" rel="noopener">decried the company’s decision to offer similar tools</a> on mobile devices running iOS 8.&#8221;</p>
<p>Google quickly followed suit with its Android operating system.</p>
<h3>Speakers</h3>
<p>According to the <a href="http://www.whitehouse.gov/issues/foreign-policy/cybersecurity/summit" target="_blank" rel="noopener">White House agenda</a>, in addition to Cook, those in the private sector scheduled to speak or on panels include:</p>
<ul>
<li>Stanford President John Hennessy;</li>
<li>Michael Brown, CEO, Symantec;</li>
<li>Lorrie Faith Cranor, Professor, Carnegie Mellon University and Advisory Board <span style="line-height: 1.5;">Member, Electronic Frontier Foundation;</span></li>
<li>Stina Ehrensvard, CEO and Founder, Yubikey;</li>
<li>Mark Kelsey, CEO, LexisNexis;</li>
<li>Scott Charney, Corporate VP Trustworthy Computing, Microsoft;</li>
<li>Eric Grosse, VP for Security Engineering, Google;</li>
<li>Melody Hildebrandt, Global head of cyber security, Palantir;</li>
<li>Alex Stamos, Chief Information Security Officer, Yahoo;</li>
<li>Joe Sullivan, Chief Information Security Officer, Facebook.</li>
</ul>
<p>In addition to the president, government speakers include:</p>
<ul>
<li>Lisa Monaco, National Security Council;</li>
<li>Jeff Zients, National Economic Council;</li>
<li>Administrator Maria Contreras-Sweet, U.S. Small Business Administration;</li>
<li>Alejandro Mayorkas, Deputy Secretary, U.S. Department of Homeland Security;</li>
<li>Matt Olsen, Former Director<span class="s1">,</span> National Counterterrorism Center;</li>
<li>Joseph Demarest, Federal Bureau of Investigation;</li>
<li>Ed Lowery, U.S. Secret Service;</li>
<li>Jamie Saunders, Director National Cyber Crime Unit, United Kingdom National Crime Agency;</li>
<li>Bilal Sen, United Nations Office of Drug and Crime.</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://calwatchdog.com/2015/02/11/obama-heads-stanford-summit-on-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">73732</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: calwatchdog.com @ 2026-04-14 13:24:24 by W3 Total Cache
-->