“Cybersecurity: Threats to Communications Networks and Private-Sector Responses” – Part 7

Testimony of Bill Conner, President and CEO of Entrust

Before the Subcommittee on Communications and Technology
of the Energy and Commerce Committee
U.S. House of Representatives

Part 7

Malware Hitting Home

Let me give you a real-life example. Plano, Texas-based Hilary Machinery, one of the largest machine tool distributor service organizations in the southwest, had $800,000 drained from its bank accounts in two days. It wasn’t the company’s financial institution that […]

“Cybersecurity: Threats to Communications Networks and Private-Sector Responses” – Part 6

Testimony of Bill Conner, President and CEO of Entrust

Before the Subcommittee on Communications and Technology
of the Energy and Commerce Committee
U.S. House of Representatives

Part 6

Diagramming Advanced Malware

With that in mind, here is one example of a real-world threat that we have encountered that has not received as much attention as data breaches. It is, however, one of the biggest cybercrimes and threats today. The threat […]

“Cybersecurity: Threats to Communications Networks and Private-Sector Responses” – Part 5

Testimony of Bill Conner, President and CEO of Entrust

Before the Subcommittee on Communications and Technology
of the Energy and Commerce Committee
U.S. House of Representatives

Part 5

Shortcomings of FFIEC Guidelines

Let me give you a specific example. The Federal Financial Institutions Examination Council (FFIEC) recently updated its guidance for financial institutions offering Internet-based products and services. Unfortunately, these guidelines only hit at the minimum level of security and […]

“Cybersecurity: Threats to Communications Networks and Private-Sector Responses” – Part 4

Testimony of Bill Conner, President and CEO of Entrust

Before the Subcommittee on Communications and Technology
of the Energy and Commerce Committee
U.S. House of Representatives

Part 4

Moore’s Law

To put this all in context, hardware technology follows Moore’s Law, which states that capacity doubles and cost halves every 18 months. In the new cyber world, software tools are changing in days, not years, and in many cases hours or […]

“Cybersecurity: Threats to Communications Networks and Private-Sector Responses” – Part 3

Testimony of Bill Conner, President and CEO of Entrust

Before the Subcommittee on Communications and Technology
of the Energy and Commerce Committee
U.S. House of Representatives

Part 3

The Zone Defense

Sadly, the football season is officially over. However, it seems to me that cyber defense is much like playing defense in football — you don’t know what play the other team is calling, therefore, you need to defend against […]