A well-articulated OASIS press release would help.|
One can expect many mainstream business organizations
to do something similar this coming week.
Ignorance comes with the turf. During my years at
the FCC, well before social media, letters by the
thousands were received about alleged government
monitoring from radio devices planted in people's heads.
The K-street non-profits who have tight bindings with
press contacts have whipped up the paranoia and
proliferated misinformation for funding and raison d'être.
They will move on.
Our energies are best devoted to engaging in
technical communities worldwide to apply the CTI
tools to major infrastructures and new developments
such as mobile, health, IoT, NFV, and provide the
mappings to significant IA platforms such as the
Critical Security Controls. Exciting times.
On 2015-12-19 10:53 PM, Jordan, Bret
I just spent some time start flame wars on Facebook over this...
How fun... It is amazing how grossly inaccurate and ill educated
people are on this topic. The internet is a breading ground for
false knowledge and sensationalism. Everyone in this group needs
to make some posts to social media talking about what this will
do. We need to help overcome the title wave of false knowledge.
Security Architecture and
Standards | Office of the
Blue Coat Systems
63B4 FC53 680A 6B7D 1447
F2C0 74F8 ACAE 7415 0050
cryptography vihv vivc ce
xhrnrw, however, the only
thing that can not be
unscrambled is an egg."
Well this site www.stopcyberthreats.com
which was setup by the Financial service roundtable as
a counter balance to the privacy lobby.
It has some solid counterpoints to those concerns
Sent from my Windows Phone
Hi everyone - I just feel like I need to
make a comment about this...
This act has received a lot of bad press and has been
twisted around and reported on very inaccurately by a
number of news outlets
This is just my two cents but I feel quite strongly
that we all have a duty as a community in the CTI
space to try to communicate, wherever appropriate and
possible, the real risks that motivate the liability
protections in this act and how threat information
sharing actually works in practice. The way many of
these news articles are written makes this act sound
like a horrible blow to individual privacy, when it is
nothing of the sort.
Just food for thought;
Product Architect, Security Intelligence, IBM Security
Without data, all you are is just another person with
an opinion - Unknown
---12/18/2015 04:19:53 PM---Hi Rich, Congratulations
to you and your colleagues
From: Tony Rutkowski <firstname.lastname@example.org>
To: Rich Struse <email@example.com>,
Date: 12/18/2015 04:19 PM
Subject: [cti] Cybersecurity Act of 2015
Sent by: <firstname.lastname@example.org>
Congratulations to you and your colleagues
at DHS, MITRE, DOD, and all who helped create
the ecosystem that allowed these provisions
to become law.
Because the provisions are so difficult to
parse in their native format, I've extracted
them and provided a more readable version.
I'm working on a fully hyperlinked version.
This Act definitely makes TC CTI a major
centerpiece for what is now the organic
law of the U.S.
[attachment "Cybersecurity_Act_of_2015.pdf" deleted by
To unsubscribe from this mail list, you must leave the
OASIS TC that
generates this mail. Follow this link to all your TCs
in OASIS at:
Standards & Regulatory Affairs
+1 703 999 8270