The Washington Post is reporting that a flash drive containing malicious code was the source behind a major breach of U.S. military computers in 2008. The drive was “inserted into a U.S. military laptop on a post in the Middle East,” according to the article.
Revelations of the breach’s root cause further underscore the challenges facing federal government to identify vulnerabilities and defend against cyberattacks.
On November 3-5, experts from government, industry and academia are set to discuss these issues, and more, during the 2010 Cyber Security Readiness Summit.
Attendees will learn best practices for:
- Cultivating a complete approach to government cyber security readiness: people, culture, language, governance, policy
- Using the most economical, efficient and reliable means for developing an information security infrastructure and protecting critical networks and systems
- Developing cyber talent including best practices for identifying, attracting and retaining the cyber workforce
- Enhancing information sharing and developing the foundation for cooperation
- Ensuring proper training of all personnel to improve compliance
- overcoming siloed systems
- discovering the costs and benefits of available tools and technologies