Contact: Tony Sager
WASHINGTON DC, October 31, 2012 - The Consortium for Cybersecurity Action (CCA), a newly-formed international consortium of government agencies and private organizations from around the world, will host a Conference Call to promote the most effective approaches to cybersecurity and support 11 key developments that are shaping events.
The Conference Call is scheduled for Monday, November 5th at 11:00 a.m. EST. Dial-in instructions:
Domestic (Dial-in): 877-268-9432
International (Dial-in): 817-755-8752
Conference Call ID# 63979758
The briefing will feature analysis by the world's top security experts of 11 major "headlines" about efforts to prevent and thwart cyber attacks. The experts will also discuss the most effective ways for organizations to implement the newly updated Critical Controls, a prioritized, risk-based set of information security measures to defend against myriad internal and external threats.
The major cybersecurity headlines for discussion are:
The CCA will serve as an ongoing mechanism to bring together community expertise on attacks and threats; identify and prioritize the most effective defensive controls (based on performance in stopping attacks); identify tools and processes to support implementation; encourage and support adoption of the Critical Controls by organizations, standards bodies, and governments; and enable the world community to share cyber defense information and effective practices.
The Critical Controls are specific guidelines that CISOs, CIOs, IGs, systems administrators, and information security personnel can use to both manage and measure the effectiveness of their defenses. They are designed to complement existing standards, frameworks, compliance schemes, etc. by bringing priority and focus to the most critical threat and highest payoff defenses, while providing a common baseline for action against the risks that we all face.
|American Express||Australian Government - Innovations|
|Booz Allen Hamilton||Citibank|
|Core Security||Centre for the Protection of National Infrastructure|
|Department of Defense Cyber Crime Center||Department of Homeland Security|
|Defense Information Systems Agency||Department of Defense|
|nCircle||National Security Agency|