Enhancing And Implementing The Cybersecurity Elements Of The Sector Specific Plans

Mr. Larry Clinton, President, Internet Security Alliance, 2500 Wilson Blvd. Arlington, VA 22201-3834, 10/31/2007 Good Morning, I am Larry Clinton, President & CEO of the Internet Security Alliance (ISAlliance). I also am a member of the DHS’s Communications Sector Coordinating Council, the Critical Infrastructure Partnership Advisory Council and serve as an Officer on the IT Sector Coordinating Council. […]

The Communication Sector Coordinating Council And Cyber Security

J. Michael Hickey, Vice President – Government Affairs, National Security Policy, Verizon, 10/31/2007 Overview: Mr. Chairman and Members of the Subcommittee, my name is Mike Hickey and I thank you for the opportunity to testify before you on measures we have taken to address cybersecurity in the Communications Sector Specific Plan. I serve as Vice President of Government […]

COMPUTER VIRUSES: The Disease, The detection, And The Prescription For Protection

Subcommittee on Telecommunications and the Internet, 11/6/2003 Mr. John W. Thompson, Chairman & Chief Executive Officer, Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA, 95014 Chairman Upton, Ranking Member Markey, members of the Subcommittee, thank you for the opportunity to provide testimony today on computer Viruses. This is a timely and important topic and on behalf of Symantec, […]

COMPUTER VIRUSES: The Disease, The Detection, And The Prescription For Protection

Testimony of Richard D. Pethia Director, CERT® Coordination Center Software Engineering Institute Carnegie Mellon University, Pittsburgh, PA 15213 Before the Subcommittee on Telecommunications and the Internet Energy & Commerce Committee, 11/06/2003 Introduction Mr. Chairman and Members of the Subcommittee: My name is Rich Pethia. I am the director of the CERT® Coordination Center (CERT/CC). Thank you for […]

C-Span Cyber Security Policy Briefing

Internet security executives spoke about programs designed to provide better information security. Among the topics they addressed were providing effective warnings of security threats, corporate responsibility for information security, training and certification programs, and designing information sharing systems on a global basis. Following their remarks they answered questions from reporters in the audience. To view […]