Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Obama and Cameron: Arm in Arm on CyberSecurity

19/01/2015 by Sharon Shahzad

W1siziisijiwmtuvmdevmtkvmtyvnduvmdkvmza0l0jhcmfja19pymftyv9hbmrfrgf2awrfq2ffmda3lmpwzyjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

During their bilateral meetings in Washington, D.C. this week, President Obama and UK Prime Minister David Cameron have agreed to further strengthen and deepen the cybersecurity cooperation between their two countries, with a range of collaborative cyber-initiatives that include staging “war games” to test bank readiness.

The news comes in the wake of Obama unveiling a sweeping proposal on data breaches, hacking and information sharing; and after Cameron caused a stir by advocating a prohibition on encrypted communications.

Both world leaders addressed the surveillance piece during a joint press conference from the White House’s Oval Office on Friday, with Cameron reiterating the need to be able to intercept suspected terrorist communications (only in extremis and only with a warrant signed by the Home Office secretary).

Obama took a more lukewarm tactic, noting only the need to balance privacy needs with the US’s “ability to operate in cyberspace” with a rational, consistent framework. He also noted the role of tech companies, who would be called upon to establish back doors into customer accounts if governments were allowed to snoop inside encrypted communications. Businesses would need to be able to fulfill their pledges to their customers, Obama noted.

As far as the war games, the initial joint exercise will focus on the financial sector, with a program running over the coming year.  The first war game of the set will target the City of London and Wall Street, and involve the Bank of England and commercial banks, which will be followed by "further exercises to test critical national infrastructure,” according to Downing Street.

The UK’s GCHQ and MI5 meanwhile will work with the US National Security Agency and the FBI to create “a joint cyber cell,” with an operating presence in each country.  The cell will have colocated staff from each agency.

“[We] agree that the cyber-threat is one of the most serious economic and national security challenges that our nations face,” the White House said, in a statement. “Every day, foreign governments, criminals and hackers are attempting to probe, intrude into and attack government and private sector systems in both of our countries.”

In their joint statement on cybersecurity, both leaders agreed overall to bolster efforts to enhance the cybersecurity of critical infrastructure in both countries, strengthen threat information sharing and intelligence cooperation on cyber issues, and support new educational exchanges between U.S. and British cybersecurity scholars and researchers.

This article has been extracted from http://www.infosecurity-magazine.com, please click on this link to read the article in full http://www.infosecurity-magazine.com/news/obama-and-cameron-cybersecurity/

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, IT Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...