Broadband.gov
Federal Communications Commission



Input Sought on Sept. 30 Cyber Security Workshop

September 8th, 2009 by Jennifer Manner - Deputy Bureau Chief, Public Safety and Homeland Security Bureau

Jennifer Manner BBAs part of the Broadband Plan NOI, we specifically sought comments on cyber security.  In an effort to gather more data on this issue, we will hold a Cyber Security Workshop on September 30th.  While the Workshop will be here in D.C., it will of course be accessible on the web.  I am really excited to have folks join us as we and the panelists discuss the prevention and detection of cyber attacks and the restoration process in the event of an attack.  As we are still planning the workshop, I would be very interested in hearing from you what issues you think we should cover.  I look forward to reading your comments here.

5 Responses to “Input Sought on Sept. 30 Cyber Security Workshop”

  1. Maxim Weinstein, StopBadware.org says:

    I'm very interested in what role, if any, broadband service providers should be expected and/or allowed to play in addressing the spread of malware. Can/should ISPs be allowed to monitor traffic (even if it means deep packet/content inspection) for malware and block such traffic? If so, how can they be held accountable for user privacy and how can they ensure they aren't blocking legitimate traffic? Can/should ISPs suspend user accounts that are generating bot traffic? If so, how can this be done in a way that is effective but also fair to the customer?

    StopBadware's stance is that broadband service providers are in a unique position to help curtail malware, but any approach that has the potential to affect user privacy, security, or availability must be combined with user education, transparency, responsiveness, and accountability.

  2. Guest says:

    The session should focus on coordination between entities in the government and private sector, as well as coordination amongst entities within each of those sectors. It is crucial for the Commission to ensure both the public and private sectors are on the same page when it comes to cybersecurity.

  3. Jennifer Manner says:

    Thank you. I appreciate your input.

  4. Neil at WPI says:

    Don't forget to address how they are going to communicate. Cell phones may be a good idea when there is not a national crisis but as soon as we experience a natural or man made disaster our ability to communicate is drastically reduced this way. We also need to address where the back up site is for coordinated response. If the metropolitan area has experienced a disaster where do the responders respond physically. What location can host them best and provide online connection, housing, food, health care and do this for hundreds if not thousands? With a local airport or helipad? Cyber security does not exist inside a silo, we need others to help us. who are these others?

  5. Logan Kleier says:

    I would encourage the FCC to examine issues related to human capital in cybersecurity. The current agenda seems to emphasize the use of tools. Tools are necessary but not sufficient to create a security culture.

    As the CISO for the City of Portland, OR, I regularly see the challenges of creating this security culture. It is my experience that the commitment to human capital is often variable and subject to the changes at the top of any organization, such as the CTO or CFO. Various public and private entities seem to have variable interest in sufficiently staffing a security organization to respond to cybersecurity threats.

    This is often compounded by the mistaken belief that all IT skills are created equal. For example, the concept that strong networking or system administration skills are highly correlated with strong information security skills is a misnomer. Again, this is necessary, but not sufficient. Information security has its own vernacular and concerns that are somewhat independent from network administration or server administration. Lumping tools and people together to accomplish a fairly distinct job function only creates a false sense of security in cyberspace.

    I'd happy to talk more about the City's challenges as it relates to fostering this culture internally as well as reaching out to other organizations, state or federal, to enhance cybersecurity cooperation.

Leave a Reply



Capture The Phone Numbers Using Your Camera Phone

If you have a camera and a 2D matrix code reader on your mobile phone, you can capture the FCC Phone numbers right to your phone by following these three easy steps:
Step 1: Take a photograph of one of the codes below using the camera on your mobile phone.
Step 2: Use your phone's Datamatrix or QR Code reader to decode the information on the photograph. Please note, these code readers are device specific and are available to download on the internet.
Step 3: Store the decoded address information to your phone's address book and use it with your Maps or GPS application.

Datamatrix and QR FCC Phones