{"id":1471,"date":"2018-03-10T01:32:03","date_gmt":"2018-03-10T01:32:03","guid":{"rendered":"http:\/\/www.blackopspartners.com\/?p=1471"},"modified":"2018-03-10T01:32:03","modified_gmt":"2018-03-10T01:32:03","slug":"cyberspace-new-battlespace","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/cyberspace-new-battlespace\/","title":{"rendered":"Cyberspace is the new battlespace"},"content":{"rendered":"

\u201cCyberattacks on and within our nation occur daily, hourly, and by the minute. Scores of them have occurred since I walked into this building a few minutes ago. No one is immune. The cyber threat to our nation is going to get worse before it gets better,\u201d former Secretary of Homeland Security Jeh Johnson said Wednesday, 7 March 2018, at the Boston Conference on Cybersecurity. \u201cBad cyber actors, ranging from nation-states, cybercriminals, hacktivists and those who engage in the growing Ransomware industry\u2014are increasingly aggressive, ingenious, and tenacious. Those of us on defense struggle to keep\u00a0up.\u201d<\/p>\n

Former Secretary of Homeland Security Jeh Johnson delivered this talk on Wednesday, 7 March 2018, at the Boston Conference on Cybersecurity<\/a>:<\/p>\n

Given my prior experience at the Defense Department, I came to the Department of Homeland Security with a counterterrorism orientation. I said many times that counterterrorism is the reason DHS was created, and it had to remain the cornerstone of the Department\u2019s mission. I quickly came to realize that a building can have more than one cornerstone, and that cybersecurity must constitute\u00a0another.<\/p>\n

Cyberattacks on and within our nation occur daily, hourly, and by the minute. Scores of them have occurred since I walked into this building a few minutes ago. No one is immune. The cyber threat to our nation is going to get worse before it gets\u00a0better.<\/p>\n

Bad cyber actors, ranging from nation-states, cybercriminals, hacktivists and those who engage in the growing Ransomware industry\u2014are increasingly aggressive, ingenious, and tenacious. Those of us on defense struggle to keep\u00a0up.<\/p>\n

Cyberspace is the new\u00a0battlespace.<\/p>\n

History will record that the Obama administration, at the personal insistence of the president, made tangible improvements to our nation\u2019s and the U.S. government\u2019s cybersecurity. At DHS, we established automated real-time information sharing with the private sector, and deployed the new EINSTEIN 3A system across all civilian agencies of the U.S.government. President Obama issued Presidential Policy Directive 41, clarifying the roles of the various federal agencies in cybersecurity. In September 2015, we secured from the Chinese government its agreement to abstain from cyber-enabled theft of trade secrets for competitive advantage\u2014an agreement that experts say the Chinese appear to have largely adhered to. We worked with Congress to enact the Cybersecurity Act of\u00a02015.<\/p>\n

But there is much more to\u00a0do.<\/p>\n

In 2012, my former boss, Secretary of Defense Leon Panetta, gave a speech at the Intrepid Sea, Air & Space Museum in New York City in which he predicted a \u201ccyber Pearl Harbor.\u201d At the time, I thought Leon was being a little overly dramatic in his language. Now, six years later, I realize Leon could have been\u00a0right.<\/p>\n

 <\/p><\/blockquote>\n

Read more at Homeland Security Newswire<\/a>.<\/em><\/span><\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

\u201cCyberattacks on and within our nation occur daily, hourly, and by the minute. Scores of them have occurred since I walked into this building a few minutes ago. No one is immune. The cyber threat to our nation is going to get worse before it gets better,\u201d former Secretary of Homeland Security Jeh Johnson said […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1471"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=1471"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1471\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=1471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=1471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=1471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}