Also in this playlist...
This transcript is automatically generated
Joining me now from Washington has what do governments that don't -- on cyber security CEO of white -- group and former navy seal officer.
John I had been easy thanks for being -- John.
So we are running as we know now we're attacking US banks and not.
Not US pentagon systems US banks do we yet know what they're Africa's apparently didn't steal money -- can -- customer information.
That's a good question Dennis first thanks for having me on I think there's a lot of different facets this attacks.
Point that the group the -- -- some freedom fighters are -- fighters as what they call themselves and -- hasn't been any information release -- what they -- after.
Other than disrupting the financial networks and I think that's an important point because disruption itself in these networks.
In it is in many cases more damaging -- actually stealing money because it induces.
Uncertainty into the lexicon of finance and got -- we all know that can that can pose real problems.
OK now the banks go to the National Security Agency and they say guys if the arriving at the foreign governments are attacking us we need your help in security.
Is this a good idea or is this make the banks in danger after -- responsibility themselves.
It's a great question I think there's a lot of different.
Ways to look at that problem I do think the public private partnership approach is going to be apps is so absolutely necessary.
In this new phenomenon of CIBER.
You have expertise in the private sector -- you have authorities in strategic resources in the government's side.
And -- needs to be a in a solution that combines both of those resources to make the overall network safer.
Now you know what I believe what -- -- problems because Microsoft windows dominates the world and it leaks like a -- so in the triangle of the vendor that makes the tax stuff.
The customer that uses it and government.
Where's the most important to responsibility -- in stopping this future of Pearl Harbor attack attack.
I think the most important aspect to look at is what application is a particular technology gonna be going to IE.
Is this is gonna control -- major power supply or a turbine in fact in October a major turbine company.
Had been hacked into and if that software is gonna go there than any -- regulations.
From the federal government to say if you're plugging acts device into the network.
He should have a minimum level of this security and at the same time the private sector needs to be incentivized to want to build solutions that meet those standards.
You know vendors and corporate customers have been kind of filling for a decade or more over who should pay the cost them more open -- -- system to the got no answers yet thanks for being let -- job.
Thank you Dennis.
Filter by section