vimarsana.com

Plus, how big business goes about recruiting hackers at def con. And i will joined by bruce schneider. All of that on this very special bloomberg west. We begin with new details in the investigation of the hack of the pentagon emails. The Washington Post reporting Russian Hackers were behind the breach of the email system. This is the latest in a string of major hacks over the last couple of years. November 2013, one of the biggest retail breaches in history. Russian hackers are believed to gain access to 40 million credit cards at target. July 2014, 83 million personal and smaller business accounts compromised. Three months later, home depot 56 million credit and debit cards and email addresses stolen. Fast forward to november 2014, sony pictures, employee emails and data released. 15 million spent investigating the breach by sony and its believe north korea took responsibility. Chinese hackers took data from 88 million accounts from anthem. The office of personnel management, the Social Security numbers of Government Employees were stolen. Chinese hackers are expected to be responsible. Def con is about much more than Cyber Security. The federal trade commission is also here. They want to tackle robocalls. They are trying to drum up interest to combat those pesky automated calls. Joining me is the ftc commissioner. Thank you for joining us. You have spent a lot of time with this community. Why is the ftc reaching out to hackers . Terrell the ftc is the premier protection agency. As consumers are using technology that is connected, we have to be vigilant about protecting their privacy and data security. We worked with the Hacker Community to understand how their research is affecting consumers. Emily how can you fight robocalls . Terrell those are the automated phone calls you get even if you are not on the do not call list. It is hard for us to combat these robos. What we are doing is giving context and hackers and technologists to give solutions for consumers. Our humanity strikes back contest is a fun one. It will develop new tools that people can use to block calls and to refer them to bring cases. Emily why should a hacker or talented Cyber Security person go work for the u. S. Government rather than a hot tech company like facebook or google . Terrell Public Service is a pretty good selling point. What i find is a lot of the Hacker Community is really motivated by the same ethos we are. Consumers have adequate information, that they are not being misled and very well aligned with the community. We get great reception when we are here talking to people. Emily the ftc opened an investigation into snapchat looking into privacy policy. How well do you think companies are protecting us . Terrell we look carefully at all the Technology People are using. The snapchat case involves an app where information will disappear but it turned out it was easy to capture them. That is what our cases about. We also have cases against facebook and google and others really looking carefully at the privacy promises they are making to consumers and whether they are upholding them. That is where the technologists come in. We need people to understand the code, the practices and to help us understand. Emily the ftc decided not to take a closer look at an antitrust perspective but at the same time the eu has a big investigation into google and Research Practices in europe. Should you take another look at google . Terrell that case was closed before i joined the commission. I think it would be highly unusual for the commission to go back and reopen a case. Emily what about apple music . There is reports you are considering opening investigation into apple music. Do you believe it is anticompetitive and if so how . Terrell i cannot comment on any pending cases. What is most concerning to you as the person running the ftc . Terrell i spent some time this morning in the village where hackers are looking at a bunch of devices consumers have from television to refrigerators and baby monitors. We study a growing sector that is bringing a lot of innovation to consumers. A wide range of practices. That is concerning to me as a consumer and federal trade commissioner. I think we need to have better security practices around these devices. What im seeing at this conference is a lot of hackers who know how to break into consumers Home Networks using these devices. Emily all right, thank you so much for joining us. Well, they may be hackers at def con but their future employers have been close by. Everyone from snapchat to the u. S. Government are here hoping to sign up talent, including Companies Like nike. It is not easy. There are more than 209,000 unfilled Cyber Security jobs in the United States and demand is expected to rise 53 through 2018. We asked recruiters what it takes to catch their eye. We have over 200 positions available for Cyber Security analysts and are really excited by the number of people we see here and the talent we can get to work for us. I always look for frontline technicians. They can be trusted advisors to our customers. Those that are so fascinated about security and are willing to learn. We have grown 300 in the last five years in this area so we know have to pay market rates. It is very easy to meet somebody in the beginning of their career and passionate about that. They are all here. If we are not here, all the other companies have the opportunity to get them and we think we are the better home. Emily coming up, car hacking how big a deal is it . How big of an opportunity is it . Why we are wasting 7 billion on the tsa according to one traffic security expert. My interview is coming up. We will leave you with this memorable hack. Your skateboard is no longer safe. Yes, that skateboard was hacked. Emily welcome back to a special edition of bloomberg west live from def con. Cars turning into computers and hackers are trying to find flaws. Hackers tried to take control of a car and a managed to succeed but only after connecting a laptop to the car directly. So, what does it mean for carmakers . How do Security Companies respond . Im joined by shawn henry. Thank you for joining us. When shawn joined me, he asked me if my phone was secure and i thought it was. Should i be worried about getting hacked . Shawn you have a lot of people here that are adventurous and innovative and always looking for new and interesting ways to get into different components. When you talk about tesla and the vehicles, as more and more devices become connected, the attack comes wider. Those who have malicious intent are trying to find ways to get into access them. Emily how concerned should we be about car hacking . Shawn as everything begins to get connected, we are talking about refrigerators being connected, medical devices. Cars are the next phase. Anything that has a wireless component to the internet potentially is able to be accessed. Those with malicious intent will look for vulnerabilities. Emily they are looking to build cars that are on hackable. Is this an area that should have interest . Shawn we dont think you can prevent all hacks. Adversaries are looking for those vulnerabilities to exploit. If you detect the attack, you can mitigate the consequences. When adversaries have access to a device undetected, that is when the malicious activity occurs. Emily what is the next big attack . Shawn Industrial Control Systems that control our infrastructure like water, sewer, etc. These are the digital interfaces that allow human beings to control the big turbines, the generators. I think we know there are adversaries like terrorist groups that are interested in impacting Critical Infrastructure. Emily we keep hearing about this scenario where Critical Infrastructure will be attacked. It has not happened yet. Why not . Shawn i think it is more death by 1000 cuts. There was a report that said over 100 systems were impacted. I dont think we hear about that because the impact so far as been relatively small. When you stack these up against each other, they become dangerous and we will see one of those big attacks eventually. Emily can china take out our infrastructure right now . Shawn china has the capability and the access to Critical Infrastructure to have an impact. Whether it is the type of attack that is a digital 9 11, im not really sure but they have the ability to impact our lives. Emily how do you plan to spend the 100 million . Are they specific kinds of technologies . Shawn much of our technology is built inhouse. We will be continuing to reinvest in technology. It is important to constantly look for those new capabilities to bring smart people in, the biggest brains to help us continue our products and support companies that need the ability to detect these attacks. Emily what is the new frontier in Cyber Security . Where is the most innovation happening . Shawn it is about getting visibility into the networks. At crowd strike, we have a product that provides complete visibility into the endpoint so organizations can see what is happening around the corner. Actually seeing bits and pieces of an attack and put those together so we can predict when attacks are going to occur, when an adversary is starting to launch a hack. Emily all right, shawn henry, always great to have you here on the show. I will try to stay safe. Thank you. We were talking about dealmaking and who is doing business on the sidelines here. The fireeye president is saying the market is hot and that security is ripe for consolidation. Marty we are in a time in the marketplace where we have never been before. We have better funding than in the past. A couple of things will come out of that. You see a little bit of a bubble on the pricing of these things both in the private sector at some point in time it will constrict. Kevin it is like that in every market. You expand and constrict. The constriction will be inorganic acquisition. Emily what about going public . That is certainly on the radar for cisco. The company that can go public will. Marty i think we will see more ipos. There is a lot of money on the sidelines for Cyber Security. As a result, companies that fit the profile have the numbers and growth if they can get public, they will. Emily up next, why one security guru here says it is time to break up the nsa. Our interview with security technologist bruce schneier. A chinabacked hack gets even bigger. American airlines joins anthem. Emily remember this . A semiautomatic handgun strapped to a drone shoots on its own thanks to a clever hack. A youtube clip of this has gotten more than 3 million views since being posted a month ago. It is time now for the daily byte. Todays byte is one billion. A company is one of the Worlds Largest clearinghouses for travel reservations. They keep one billion travel records on file every year. People familiar with the investigation say the companies were hit in the same wave of attacks that targeted anthem and the u. S. Office of personnel management. The sabre and American Airlines attacks were not previously reported and are the broadest yet. Just how dangerous are these airline hacks . Can it happen again . The answer is yes according to our next guest. Bruce schneier is an expert and author of 12 security books. He says the tsas 95 failure rate does not justify their budget. Instead, the money should be spent on intelligence. Bruce is with me here at def con. You are quite the celebrity here. A lot of people very excited about the talk you gave. I want to start with airlines. Just how dangerous is this . Bruce we dont actually know. Airlines are not immune to hacking just like any other industry. We are seeing a lot of attacks against personal information whether it is by government or criminals. We are all vulnerable. Emily could they take down a plane . Bruce that is a different kind of thing entirely. There is Research Done for attacks on vehicles. Attacking planes remotely seems remote, but as things get computerized and then we dont know. Emily what about the tsa . You were very critical around them around 9 11. It does not sound like you are a fan. Bruce there have been tests where people try to bring weapons through checkpoints and the tsa has high failure rates. A high failure rate is not really a problem because as long as there is a decent chance you are caught, you will not try it. But if you know you can get through, the tsa is not doing their job. Pre9 11 is all we need. Tsa assumes we are guessing the plot. Investigation, intelligence and Emergency Response works regardless. Emily there has been quite a rift between the Hacking Community and the tsa and light what happened with edward snowden. How would breaking up the tsa work . The nsa work . Bruce the nsa has two missions. They have a mission to defend networks and to attack for networks. They are in conflict. When the same organization, you have one fighting the other. Separating those out would make us more secure. Emily the nsa is supposedly working on a computer that could see through anything. Decrypt anything. How optimistic are you . Bruce it is not stupid sciencefiction, but not anytime soon. Anything we know about quantum computing, in 50 years itll be something cool. Emily how would you rate the governments actual capabilities when it comes the cyber spying . Bruce the nsa has a bigger budget than anybody else. Because the way the net works, so much traffic goes through the United States and the nsas spying filters. They can do a lot, but they are not made of magic. They are still constrained by economics, by physics, by mathematics. While they can do a lot, they cannot do everything. Emily what is the biggest hack attack coming that we are not ready for . Bruce the thing about not being ready for is you dont know what it is. Hack attacks surprise you. My guess it is something we are not thinking about. As computers get embedded into everything your computers your cars, your thermostats they all become vulnerable. Emily how do we protect ourselves . Bruce this is something that requires Government Intervention and legislation. Nobody really has a vested interest. Its something government can help. Fortunately, government does not want to do that right now. Unfortunately emily bruce schneier, celebrity hacker an expert on all things security. Thank you for joining us. That does it for this special edition of bloomberg west live from def con in las vegas. I want to wish a very special happy birthday to my grandmother in philadelphia. She watches my show every single day from the very beginning. Im so grateful for that. I love you, grandma. Happy birthday. John im john heilemann. Mark im mark halperin. With all due respect to the republican candidates in last nights debate, only one of you can be the next ronald raven. Mark on the show tonight, everyone, but first breaking news the most significant thing to happen since last night republicans debate happened moments ago on fox news. Listen to jeb bush returning to his posture from a while ago and talking critically of donald trump. Mr. Bush this reminds me of barack obama, not as a candidate, but as president

© 2025 Vimarsana

vimarsana.com © 2020. All Rights Reserved.