News

10:38 AM
Reuters
Reuters
News
Connect Directly
RSS
E-Mail
50%
50%

As Cyber Threats Build Against U.S., CEOs Ask For 'Light Touch'

Corporate leaders from the defense, technology, energy and banking industries told President Barack Obama on Wednesday they agreed cyber attacks were a top security threat but that they were looking for a "light touch" from the government in response to the risk.

Corporate leaders from the defense, technology, energy and banking industries told President Barack Obama on Wednesday they agreed cyber attacks were a top security threat but that they were looking for a "light touch" from the government in response to the risk.

Obama and his top security advisers met with chief executives from 13 companies in the White House Situation Room to talk about how the government and private sector could improve U.S. cyber security, including the need for legislation.

The White House has elevated the issue after efforts to improve U.S. cyber defenses through new laws failed in Congress last year.

"I think we all agreed - and that included the administration and the president - that we want as light a government touch on this as possible," Honeywell International's David Cote told CNBC after the meeting.

"Flexibility is important, because this is the kind of threat that changes very quickly," he said.

The meeting came a day after U.S. intelligence leaders said for the first time that cyber attacks and cyber espionage had supplanted terrorism as the top security threat facing the United States.

Obama signed an executive order last month to encourage information-sharing, which most business leaders welcome, and voluntary security standards, which have been a point of contention.

But the executive action is not as strong as law and Obama has urged Congress to try again on legislation. "There are ways that we can harden our critical infrastructure, our financial sector," Obama said in an interview with ABC earlier on Wednesday. "They need to get this done."

Obama took the unusual step of meeting with corporate executives in the Situation Room, the secure site in the West Wing basement where the president meets with national security advisers during crises.

The meeting included Randall Stephenson of AT&T, Wes Bush of Northrop Grumman, Rex Tillerson of Exxon Mobil , Jamie Dimon of JPMorgan Chase & Co, Brian Moynihan of Bank of America, and Nicholas Akins of American Electric Power Co..

"The threat is real ... there is a consistent, persistent threat here that we need to be concerned about as a country," Cote told reporters after the meeting.

This week, U.S. authorities said they were investigating reports that Obama's own family had been hit by hacking.

The president said in the ABC interview that he did not know whether reports were true that hackers had posted financial and personal information online about his wife, Michelle, along with other high-profile Americans.

"It would not shock me if some information ... among people who presumably have pretty good safeguards against it, still gets out," he said.

Copyright 2013 by Reuters. All rights reserved.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Byurcan
50%
50%
Byurcan,
User Rank: Author
3/14/2013 | 5:56:45 PM
re: As Cyber Threats Build Against U.S., CEOs Ask For 'Light Touch'
Interested to find out why they want a "light touch" as possible, and exactly what that would mean for how much the government is involved?
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Here is what the client expects us to develop...
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.