Business, Cloud Computing, Cyber Security, Data Breach, Defense, Finance, IT Security, Security, Technology

Three Boardroom Questions Every Cybersecurity Entrepreneur Must Answer

The resignation of Target’s CEO last May, after cyber attackers accessed the payment records of 40 million shoppers and Q4 profit declined 46 percent from the year before, was a watershed moment. Corporate officers and directors now had a concrete example of how cyber threats can hit the bottom line – and of how they will be held accountable.

As cyber threats increase – a recent study noted that attacks rose 48 percent this year, with more than 100,000 cybersecurity incidents every day – company directors have responded. Security reviews by the board are becoming standard practice. CEOs are becoming fluent in the language of cybersecurity. CISOs – Chief Information Security Officers – are in high demand and may become directors themselves.

Read More

Cyber Security, Defense, IT Security, Security, Technology

Information Security–Survey Roundup: I Tell Ya, CISOs Just Get No Respect

Nearly three-quarters of the C-suite-level executives surveyed said chief information security officers shouldn’t be part of an organization’s leadership team. The survey from malware protection company ThreatTrack Security found 44% of respondents said the main role of the CISO is to be “accountable for organizational data breaches.”

“The CISO’s role has become increasingly complex and demanding, yet the value of their contributions aren’t fully understood or appreciated by peers,” said ThreatTrack Security CEO Julian Waits Sr. “Our research suggests that CISOs are often viewed simply as convenient scapegoats in the event of a headline-grabbing data breach, and they are significantly undervalued for the work they do every day to keep corporate data secure. This perception needs to change as CISOs and the teams that work with them, should be viewed as drivers for business protection and growth.”

Read More

Business, Cyber Security, cyber security legislation, Cybersecurity, Defense, E commerce, Education, Finance, Government, IT Security, Security, Technology

Reading the Tea Leaves on Cybersecurity Regulation

Buckle up, bankers: cybersecurity is about to be regulated. Evidence for this conjecture can be found in recent speeches by New York banking regulator Benjamin Lawsky, who announced in October thepossible imposition of new, strict cybersecurity rules for financial institutions. Banks could be required to appoint chief information security officers and to undergo quarterly tests for information system vulnerabilities under the regime.

Read More

U.S. State Department
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, E commerce, Education, Finance, Government, IT Security, Security, Technology

Auditors: State Department has History of Poor Cybersecurity as Top Cyber Security Conference in New York City Approaches

The State Department, which shut down its unclassified email system and cut off Internet access over the weekend to deal with a suspected online attack, has a history of weak cybersecurity, and it grew worse over the last four years, according to auditors.

Officials at Foggy Bottom are giving few details about the “activity of concern” — first reported by the Associated Press Sunday, but auditors have long warned about poor cybersecurity measures there. More than 100 different systems at State have shown consistently similar problems since September 2009, auditors said in an October report. Ineffective cyber risk management is “undoubtedly systemic in nature, requiring global measures in attempt to remedy this deficiency,” they added.

Read more

Knightmare on Wall Street Author Edgar Perez
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Education, Finance, Government, IT Security, Security, Technology

US-China Bilateral Dialogue on Cybersecurity to be Discussed by Knightmare on Wall Street’s Edgar Perez at Golden Networking’s Cyber Security World Conference 2015

According to research firm Novetta Solutions, Axiom, a part of the Chinese Intelligence Apparatus, is responsible for directing highly sophisticated cyber espionage operations against numerous Fortune 500 companies, journalists, environmental groups, pro-democracy groups, software companies, academic institutions, and government agencies worldwide for at least the last six years. In Novetta’s coordinated effort, they performed the first ever-private sponsored interdiction against a sophisticated state sponsored advanced threat group. Their efforts detected and cleaned 43,000 separate installations of Axiom tools, including 180 of their top tier implants.

The organization responsible for directing Axiom, according to NewsFactor, appears to be targeting specific industries, including electronics and integrated circuit manufacturers, networking equipment manufacturers, Internet-based services companies, software vendors (particularly in the Asia-Pacific region), law firms with an international or M&A footprint, telecom companies, manufacturing conglomerates, venture capital firms, energy companies, meteorological services companies, cloud computing providers and pharmaceutical manufacturers. Yet, a spokesperson for the Chinese embassy dismissed the report’s claims as “fictitious.”

Amidst mounting distrust, Edgar Perez (, author of Knightmare on Wall Street, will discuss the state of the cybersecurity dialogue between the United States and China at Cyber Security World Conference 2015 New York City ( This forum will provide a platform for information security authorities and innovative service providers to distill their latest research for hundreds of senior executives focused on protecting enterprise and government valuable assets. Cyber security experts will discuss topics such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Mr. Perez has been engaged to present at the Council on Foreign Relations, Vadym Hetman Kyiv National Economic University (Kiev), Quant Investment & HFT Summit APAC 2012 (Shanghai), U.S. Securities and Exchange Commission (Washington DC), CFA Singapore, Hong Kong Securities Institute, Courant Institute of Mathematical Sciences at New York University, University of International Business and Economics (Beijing), Hult International Business School (London and Shanghai) and Pace University (New York), among other public and private institutions.

Mr. Perez is widely regarded as the preeminent global expert in technology and investing. He is the author of Knightmare on Wall Street and The Speed Traders and has been interviewed on CNN, CNBC, FOX BUSINESS, Bloomberg TV, CNN en Español, BNN, CCTV China,,, Leaderonomics, GPW Media, Channel NewsAsia’s Business Tonight and Cents & Sensibilities. Mr. Perez has been globally featured on FXFactor, Columbia Business, OpenMarkets, Sohu,, Yicai, eastmoney, Caijing,, 360doc, AH Radio,, CITICS Futures, Tongxin Securities,,, Caixin, Futures Daily, Xinhua, CBN Newswire, Chinese Financial News,, International Finance News,,,, The Korea Times, The Korea Herald, The Star, The Malaysian Insider, BMF 89.9, iMoney Hong Kong, CNBC, Bloomberg Hedge Fund Brief, The Wall Street Journal, The New York Times, Dallas Morning News, Valor Econômico, FIXGlobal Trading, TODAY Online, Oriental Daily News and Business Times.

Mr. Perez was a vice president at Citigroup, a senior consultant at IBM, and a strategy consultant at McKinsey & Co. in New York City. Mr. Perez has an undergraduate degree from Universidad Nacional de Ingeniería, Lima, Peru (1994), a Master of Administration from Universidad ESAN, Lima, Peru (1997) and a Master of Business Administration from Columbia Business School, New York, with a dual major in Finance and Management (2002). He belongs to the Beta Gamma Sigma honor society. Mr. Perez resides in the New York City area and is an accomplished salsa and hustle dancer.

About Cyber Security World Conference 2015

On Friday, October 17, 2014, U.S. President Barack Obama signed an executive order to strengthen security measures for federal credit cards, and urged banks and retailers to follow suit in an effort to combat cyber theft and identity fraud. Several major corporations would take steps to make their own systems more secure and offer more customer protections as well.

These unprecedented steps came after many large companies including Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, JPMorgan Chase, Nasdaq OMX, Neiman Marcus, Target and Wal-mart had suffered high-profile cyber security breaches. It is not beyond the realm of possibilities to think that today the information of every American has already been compromised in any of these publicly disclosed attacks.

For instance, JPMorgan Chase, America’s largest bank with $2.39 trillion in assets, has revealed that about 76 million households and 7 million of small-business customers have been impacted by a cybersecurity attack in one of the most sweeping disclosed global breaches. Unknown attackers stole customers’ contact information, which included names, email addresses, phone numbers and addresses, affecting an amount equivalent to two-thirds of American households.

Renowned information security experts and innovative service providers will present at Cyber Security World Conference 2015 their latest thinking to hundreds of senior executives focused on protecting enterprises and governmental agencies. Topics that Cyber Security World Conference 2015 will discuss include:

  • Cyber Security Megatrends Security Professionals can’t Ignore Today
  • Designing and Managing Effective Information Security Programs
  • How Hackers Really Operate to Obtain Financial Data
  • Key Considerations about Security in the Internet of Things Age
  • Role of Cyber Security in the Overall Security of the United States
  • Security Risks brought by Mobile Computing
  • Strengthening the Security of Industry-wide Technology Infrastructure
  • The Enterprise Impact of Cyber Risk through the Shareholder Lens

Cyber Security World Conference 2015 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to

Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Education, Finance, Government, IT Security, Technology

ISE ETF Ventures Launches the ISE Cyber Securityâ„¢ Index (HXR)

NEW YORK–(BUSINESS WIRE)–Nov. 11, 2014– ISE ETF Ventures announced today the launch of the ISE Cyber SecurityTM Index (ticker: HXR), an index that allows investors to quickly take advantage of both event-driven news and long term economic trends in the cyber security and information technology space. The index, which is the first and only one focused specifically on publically-listed companies that develop or provide cyber security technology and related services, is licensed to PureFunds™ and will be the basis for an exchange traded fund (ETF).

Read More

Evan Dornbush, Chief Information Security Officer (CISO) and Cyber Security R&D Manager for TechGuard Security
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Education, Finance, Government, IT Security, Security, Technology

Evan Dornbush, Chief Information Security Officer for TechGuard Security, to Speak at Golden Networking’s Cyber Security World Conference 2014 New York City

Mr. Evan Dornbush, Chief Information Security Officer (CISO) and Cyber Security R&D Manager for TechGuard Security, LLC, will speak at Golden Networking’s Cyber Security World Conference 2014 New York City (, unique professional gathering where cybersecurity gurus are set to debate topics such as protecting individuals and companies against cyber-attacks, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Prior to TechGuard Security, Mr. Dornbush was the Senior Network Analyst at Vulnerability Research Labs (VRL) which was acquired by CSC. Mr. Dornbush worked for The United States Department of Defense (Granted TS//SCI) from January 2005 to March 2009, where he was a Computer Network Operator, Systems Engineer and Global Network Exploitation and Vulnerability Analyst.

Mr. Dornbush earned an M.S. and B.A. in Computer Science and a B.A. in Criminal Justice from The George Washington University in 2004, and was a DoD/NFS Cybercorps Scholarship Winner in 2003 and 2004.