SlideShare a Scribd company logo
1 of 18
© 2016 Risk Masters International LLC. All rights reserved. 1
UNESCO
Global Citizenship Education
&
Cyber Civil Defense
© 2016 Risk Masters International LLC. All rights reserved. 2
 “Education gives us a profound understanding that we are tied
together as citizens of the global community, and that our
challenges are interconnected.” Ban Ki-moon, UN Secretary-
General
 Nurturing respect for all, building a sense of belonging to a
common humanity and helping learners become active and
responsible global citizens
 …develop and apply critical skills for civic literacy, e.g.
critical inquiry, information technology, media literacy, critical
thinking, decision-making, problem solving, negotiation, peace
building and personal and social responsibility;
From UNESCO’s GCE – Topics and Learning Objectives, 2015
What is Global Citizenship Education?
© 2016 Risk Masters International LLC. All rights reserved. 3
GCE: Core Concepts
© 2016 Risk Masters International LLC. All rights reserved. 4
Looking at Some Prominent Hacks & Experiences
WSJ, Sept 8, 2016
The suspects often gained access to email accounts by
calling the help lines at internet service companies.
Although court documents didn’t name the victims, they
include CIA Director John Brennan and then Deputy
FBI Director Mark Giuliano, according to officials close
to the case.
On May 26, 2015, the IRS announced it had
discovered that cyber criminals — using taxpayer
information stolen elsewhere — accessed the Get
Transcript application onIRS.gov. Forbes, Feb. 28, 2016
Washington Post, March 3, 2016
© 2016 Risk Masters International LLC. All rights reserved. 5
Most frequently used
passwords in MySpace
according to
LeakedSource
MySpace: 164,000,000 records stolen
© 2016 Risk Masters International LLC. All rights reserved. 6
Reported Breaches in Fin. Services since 2006
 It is often reported that as
much as 85%-95% of all
successful penetrations
can be attributed to
behaviors rather than
sophisticated technical
hacking.
 In this study of all
reported Financial
Services breaches since
2006, only 25.3% are due
to Hacking.
© 2016 Risk Masters International LLC. All rights reserved. 7
Company or
Organization
Records
Stolen
Stolen
IDs
Supply
Chain
Other
Anthem 80,000,000
Target 70,000,000
Home Depot 109,000,000 Network Design issues
Ebay 145,000,000
MySpace 164,000,000
JPM/Chase 83,000,000 No Hackers got lists of programs and
exploited vulnerabilities
IRS 200,000 Security Design issues
Heartland 130,000,000 No Coding Issues: SQL Injection
Wells Fargo 2,000,000 Insiders; Consumer Fraud
NSA n/m No Insider; Security Design issues
Notable “Hacks”
With the exception of the JPM/Chase “hack”, the combination of civilian and
professional security education might have mitigated both risk and exposure.
© 2016 Risk Masters International LLC. All rights reserved. 8
How Easy is it to “Hack”?
© 2016 Risk Masters International LLC. All rights reserved. 9
How Easy it is to Fix?
…of the MasterCard merchants that have adopted
chip technology, fraud from counterfeit cards has
dropped by 54% WSJ CIO Journal
Do You Do This?
 Never log in to a sensitive
site by clicking a link in any
message, webpage, or
document. Type the link.
 If you receive a
communication from a bank
or credit card company, call
them back at the number on
the back of your
ATM/debit/credit card.
 Never read email -- or use
sensitive websites -- on a
device that does not have
security software with
updates being applied
regularly and automatically.
Over a dozen corporate heavyweights are teaming
up to fight "phishing," the use of the Internet by
crooks to filch personal data such as bank-account
numbers and user passwords. The companies,
which include International Business Machines
Corp., Fidelity Investments and Tenet
Healthcare Corp, WSJ CIO Journal, June 15, 2004
© 2016 Risk Masters International LLC. All rights reserved. 10
 Not engaging forensic experts
 Not engaging outside council
 Ambiguous decision making process
 No communications plan
 Ambiguous communications
 Waiting for perfect information before taking action
 Micromanaging the breach
 No remediation plans
 Not providing remedies to consumers and customers
 Not practicing
Source: CSO Online, Nov 13, 2013
Common Hack-Response Errors:
These have been standard
practices of Business
Continuity Planning for
more than 40 years
© 2016 Risk Masters International LLC. All rights reserved. 11
A Call for Cyber Civil Defense
© 2016 Risk Masters International LLC. All rights reserved. 12
It would aid our cyber warriors to no end, however, if we supported their
efforts by doing the simple, responsible things to make our IT infrastructure
less vulnerable to disruption.
Or, to adapt a slogan once quite popular on the Berkeley scene: “What if They
Gave a Cyber War and Nobody Had Anything to Break?”
Amrit William
CTO Cloud Passage
Formerly CTO at IBM
Educate the public and national leadership. The U.S. populace has been
successfully mobilized in the past to respond to public safety concerns ranging
from preventing forest fires to drunk driving. But today’s pervasive lack of
awareness of the growing risks to computer networks undercuts any serious
effort to mobilize the appropriate national response.
Lt. General David W. Barno, USA (Ret.), and Dr. Nora Bensahel
Distinguished Practitioners in Residence
School of International Service at American University.
The Need for Cyber Civil Education
© 2016 Risk Masters International LLC. All rights reserved. 13
Cyber
Civil Defense
Cyber
Resilience
 Actions by individuals, businesses, public sector
organizations and other targets for potential cyber
warfare attacks taken to minimize the potential for
damage to themselves and society.
Cyber Civil Defense
Cyber
Security
Cyber Warriors Organizations
Nations &
Society
© 2016 Risk Masters International LLC. All rights reserved. 14
Cyber Civil Defense & Norms are Happening
WSJ CIO Journal, Sept 14, 2016
Sept 13,2016
WSJ, Sept 14, 2016
© 2016 Risk Masters International LLC. All rights reserved. 15
 Education at many levels is required to transform our
Hobbesian Cyber-World into an ordered, safe and free
Cyber-Society
 The UNESCO Global Citizenship Education
program, working together with UCLA and the
Boston Global Forum, provide a platform for
developing and implementing key program concepts
A Call for Action
© 2016 Risk Masters International LLC. All rights reserved. 16
Q & A
Thank you for your attention.
© 2016 Risk Masters International LLC. All rights reserved. 17
RMI
Chatham House Rules
© 2016 Risk Masters International LLC. All rights reserved. 18
You Have Been Warned
1 1

More Related Content

What's hot

Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentationsvito
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Abzetdin Adamov
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for CyberwarfareAurin Sheikh
 
Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Kayode Yussuf
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Protecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintProtecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintShiva Bissessar
 
Leone ct#3 presentation 1
Leone ct#3 presentation 1Leone ct#3 presentation 1
Leone ct#3 presentation 1vincentleone
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityCareer Communications Group
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityShiva Bissessar
 

What's hot (20)

Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for Cyberwarfare
 
Case study 11
Case study 11Case study 11
Case study 11
 
Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...
 
Case study 13
Case study 13Case study 13
Case study 13
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Protecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintProtecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital Footprint
 
Leone ct#3 presentation 1
Leone ct#3 presentation 1Leone ct#3 presentation 1
Leone ct#3 presentation 1
 
Brooks18
Brooks18Brooks18
Brooks18
 
CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 
Cyber security issue part b
Cyber security issue  part b Cyber security issue  part b
Cyber security issue part b
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National Priority
 
Cyber-Terrorism
Cyber-TerrorismCyber-Terrorism
Cyber-Terrorism
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
 

Viewers also liked

Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityBoston Global Forum
 
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil DefenseBGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil DefenseBoston Global Forum
 
Competencias comunicativas
Competencias comunicativasCompetencias comunicativas
Competencias comunicativasRochy Montenegro
 
Problemas metodo simplex
Problemas metodo simplexProblemas metodo simplex
Problemas metodo simplexLeidyEnriquez
 
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...MIT Office of Sustainability
 
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability  Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability MIT Office of Sustainability
 
Smartboard tutorial lesson activity builder
Smartboard tutorial   lesson activity builderSmartboard tutorial   lesson activity builder
Smartboard tutorial lesson activity builderRene Torres Visso
 
Myths About Cloud Storage In Healthcare
Myths About Cloud Storage In HealthcareMyths About Cloud Storage In Healthcare
Myths About Cloud Storage In HealthcareTyrone Systems
 
Datamonitor FS Event, All Slides
Datamonitor FS Event, All SlidesDatamonitor FS Event, All Slides
Datamonitor FS Event, All SlidesChris Skinner
 

Viewers also liked (17)

Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
 
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil DefenseBGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
 
Lorena
LorenaLorena
Lorena
 
Topes para llantas
Topes para llantasTopes para llantas
Topes para llantas
 
Competencias comunicativas
Competencias comunicativasCompetencias comunicativas
Competencias comunicativas
 
Problemas metodo simplex
Problemas metodo simplexProblemas metodo simplex
Problemas metodo simplex
 
Dafwebkon 2017
Dafwebkon 2017Dafwebkon 2017
Dafwebkon 2017
 
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
 
Welcoming Remarks: Director, Julie Newman
  Welcoming Remarks: Director, Julie Newman  Welcoming Remarks: Director, Julie Newman
Welcoming Remarks: Director, Julie Newman
 
Welcoming Remarks: EVPT, Israel Ruiz
  Welcoming Remarks: EVPT, Israel Ruiz  Welcoming Remarks: EVPT, Israel Ruiz
Welcoming Remarks: EVPT, Israel Ruiz
 
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability  Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
 
IMT SlideShare
IMT SlideShareIMT SlideShare
IMT SlideShare
 
A spring walk
A spring walkA spring walk
A spring walk
 
Alg2 lesson 6-5
Alg2 lesson 6-5Alg2 lesson 6-5
Alg2 lesson 6-5
 
Smartboard tutorial lesson activity builder
Smartboard tutorial   lesson activity builderSmartboard tutorial   lesson activity builder
Smartboard tutorial lesson activity builder
 
Myths About Cloud Storage In Healthcare
Myths About Cloud Storage In HealthcareMyths About Cloud Storage In Healthcare
Myths About Cloud Storage In Healthcare
 
Datamonitor FS Event, All Slides
Datamonitor FS Event, All SlidesDatamonitor FS Event, All Slides
Datamonitor FS Event, All Slides
 

Similar to Cyber Civil Defense - Risk Masters - Allan Cytryn

The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementThomas Ewert
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationNexon Asia Pacific
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityRow Murray
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Ethan S. Burger
 
he nonprofit organization that I have decided to discuss is Childr.docx
he nonprofit organization that I have decided to discuss is Childr.docxhe nonprofit organization that I have decided to discuss is Childr.docx
he nonprofit organization that I have decided to discuss is Childr.docxpooleavelina
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 

Similar to Cyber Civil Defense - Risk Masters - Allan Cytryn (20)

ISACA UW Handbook 2016
ISACA UW Handbook 2016ISACA UW Handbook 2016
ISACA UW Handbook 2016
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?
 
The Impact of Technology on the Profession
The Impact of Technology on the ProfessionThe Impact of Technology on the Profession
The Impact of Technology on the Profession
 
he nonprofit organization that I have decided to discuss is Childr.docx
he nonprofit organization that I have decided to discuss is Childr.docxhe nonprofit organization that I have decided to discuss is Childr.docx
he nonprofit organization that I have decided to discuss is Childr.docx
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 

More from Boston Global Forum

The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
The Artificial Intelligence Chronicle – Open to feedback  3-6-2020The Artificial Intelligence Chronicle – Open to feedback  3-6-2020
The Artificial Intelligence Chronicle – Open to feedback 3-6-2020Boston Global Forum
 
Hunermund causal inference in ml and ai
Hunermund   causal inference in ml and aiHunermund   causal inference in ml and ai
Hunermund causal inference in ml and aiBoston Global Forum
 
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common SenseDark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common SenseBoston Global Forum
 
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of MechanismsGeneralizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of MechanismsBoston Global Forum
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebeccaBoston Global Forum
 
MIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systemsMIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systemsBoston Global Forum
 
Professor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of DesignProfessor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of DesignBoston Global Forum
 
Aiws united-nation charter day lecture
Aiws united-nation charter day lectureAiws united-nation charter day lecture
Aiws united-nation charter day lectureBoston Global Forum
 
Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019Boston Global Forum
 
Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...Boston Global Forum
 
Catalog cho bgf g7 summit initaitive 2017
Catalog cho bgf  g7 summit initaitive 2017Catalog cho bgf  g7 summit initaitive 2017
Catalog cho bgf g7 summit initaitive 2017Boston Global Forum
 
Agenda of bgf g7 summit initiatve 2017
Agenda of bgf   g7 summit initiatve 2017Agenda of bgf   g7 summit initiatve 2017
Agenda of bgf g7 summit initiatve 2017Boston Global Forum
 
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...Boston Global Forum
 
Education for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for allEducation for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for allBoston Global Forum
 
Global Citizenship Education TOPICS AND LEARNING OBJECTIVES
Global Citizenship Education TOPICS AND LEARNING  OBJECTIVESGlobal Citizenship Education TOPICS AND LEARNING  OBJECTIVES
Global Citizenship Education TOPICS AND LEARNING OBJECTIVESBoston Global Forum
 

More from Boston Global Forum (20)

The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
The Artificial Intelligence Chronicle – Open to feedback  3-6-2020The Artificial Intelligence Chronicle – Open to feedback  3-6-2020
The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
 
Hunermund causal inference in ml and ai
Hunermund   causal inference in ml and aiHunermund   causal inference in ml and ai
Hunermund causal inference in ml and ai
 
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common SenseDark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
 
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of MechanismsGeneralizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebecca
 
Marc Rotenberg AIWS
Marc Rotenberg AIWSMarc Rotenberg AIWS
Marc Rotenberg AIWS
 
MIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systemsMIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systems
 
Professor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of DesignProfessor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of Design
 
Aiws united-nation charter day lecture
Aiws united-nation charter day lectureAiws united-nation charter day lecture
Aiws united-nation charter day lecture
 
Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019
 
Agenda aiws g7 summit 2019
Agenda aiws g7 summit 2019Agenda aiws g7 summit 2019
Agenda aiws g7 summit 2019
 
Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...
 
Catalog cho bgf g7 summit initaitive 2017
Catalog cho bgf  g7 summit initaitive 2017Catalog cho bgf  g7 summit initaitive 2017
Catalog cho bgf g7 summit initaitive 2017
 
The digital battle
The digital battleThe digital battle
The digital battle
 
Agenda of bgf g7 summit initiatve 2017
Agenda of bgf   g7 summit initiatve 2017Agenda of bgf   g7 summit initiatve 2017
Agenda of bgf g7 summit initiatve 2017
 
Stride gender
Stride genderStride gender
Stride gender
 
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
 
Global Citizen Network
Global Citizen NetworkGlobal Citizen Network
Global Citizen Network
 
Education for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for allEducation for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for all
 
Global Citizenship Education TOPICS AND LEARNING OBJECTIVES
Global Citizenship Education TOPICS AND LEARNING  OBJECTIVESGlobal Citizenship Education TOPICS AND LEARNING  OBJECTIVES
Global Citizenship Education TOPICS AND LEARNING OBJECTIVES
 

Recently uploaded

13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.pptsilvialandin2
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Christina Parmionova
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012rehmti665
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...ankitnayak356677
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...Christina Parmionova
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Sonam Pathan
 
Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Christina Parmionova
 
Start Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnoolStart Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnoolSERUDS INDIA
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhellokittymaearciaga
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILChristina Parmionova
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 

Recently uploaded (20)

13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170
 
Model Town (Delhi) 9953330565 Escorts, Call Girls Services
Model Town (Delhi)  9953330565 Escorts, Call Girls ServicesModel Town (Delhi)  9953330565 Escorts, Call Girls Services
Model Town (Delhi) 9953330565 Escorts, Call Girls Services
 
Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.
 
Start Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnoolStart Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnool
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptx
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 

Cyber Civil Defense - Risk Masters - Allan Cytryn

  • 1. © 2016 Risk Masters International LLC. All rights reserved. 1 UNESCO Global Citizenship Education & Cyber Civil Defense
  • 2. © 2016 Risk Masters International LLC. All rights reserved. 2  “Education gives us a profound understanding that we are tied together as citizens of the global community, and that our challenges are interconnected.” Ban Ki-moon, UN Secretary- General  Nurturing respect for all, building a sense of belonging to a common humanity and helping learners become active and responsible global citizens  …develop and apply critical skills for civic literacy, e.g. critical inquiry, information technology, media literacy, critical thinking, decision-making, problem solving, negotiation, peace building and personal and social responsibility; From UNESCO’s GCE – Topics and Learning Objectives, 2015 What is Global Citizenship Education?
  • 3. © 2016 Risk Masters International LLC. All rights reserved. 3 GCE: Core Concepts
  • 4. © 2016 Risk Masters International LLC. All rights reserved. 4 Looking at Some Prominent Hacks & Experiences WSJ, Sept 8, 2016 The suspects often gained access to email accounts by calling the help lines at internet service companies. Although court documents didn’t name the victims, they include CIA Director John Brennan and then Deputy FBI Director Mark Giuliano, according to officials close to the case. On May 26, 2015, the IRS announced it had discovered that cyber criminals — using taxpayer information stolen elsewhere — accessed the Get Transcript application onIRS.gov. Forbes, Feb. 28, 2016 Washington Post, March 3, 2016
  • 5. © 2016 Risk Masters International LLC. All rights reserved. 5 Most frequently used passwords in MySpace according to LeakedSource MySpace: 164,000,000 records stolen
  • 6. © 2016 Risk Masters International LLC. All rights reserved. 6 Reported Breaches in Fin. Services since 2006  It is often reported that as much as 85%-95% of all successful penetrations can be attributed to behaviors rather than sophisticated technical hacking.  In this study of all reported Financial Services breaches since 2006, only 25.3% are due to Hacking.
  • 7. © 2016 Risk Masters International LLC. All rights reserved. 7 Company or Organization Records Stolen Stolen IDs Supply Chain Other Anthem 80,000,000 Target 70,000,000 Home Depot 109,000,000 Network Design issues Ebay 145,000,000 MySpace 164,000,000 JPM/Chase 83,000,000 No Hackers got lists of programs and exploited vulnerabilities IRS 200,000 Security Design issues Heartland 130,000,000 No Coding Issues: SQL Injection Wells Fargo 2,000,000 Insiders; Consumer Fraud NSA n/m No Insider; Security Design issues Notable “Hacks” With the exception of the JPM/Chase “hack”, the combination of civilian and professional security education might have mitigated both risk and exposure.
  • 8. © 2016 Risk Masters International LLC. All rights reserved. 8 How Easy is it to “Hack”?
  • 9. © 2016 Risk Masters International LLC. All rights reserved. 9 How Easy it is to Fix? …of the MasterCard merchants that have adopted chip technology, fraud from counterfeit cards has dropped by 54% WSJ CIO Journal Do You Do This?  Never log in to a sensitive site by clicking a link in any message, webpage, or document. Type the link.  If you receive a communication from a bank or credit card company, call them back at the number on the back of your ATM/debit/credit card.  Never read email -- or use sensitive websites -- on a device that does not have security software with updates being applied regularly and automatically. Over a dozen corporate heavyweights are teaming up to fight "phishing," the use of the Internet by crooks to filch personal data such as bank-account numbers and user passwords. The companies, which include International Business Machines Corp., Fidelity Investments and Tenet Healthcare Corp, WSJ CIO Journal, June 15, 2004
  • 10. © 2016 Risk Masters International LLC. All rights reserved. 10  Not engaging forensic experts  Not engaging outside council  Ambiguous decision making process  No communications plan  Ambiguous communications  Waiting for perfect information before taking action  Micromanaging the breach  No remediation plans  Not providing remedies to consumers and customers  Not practicing Source: CSO Online, Nov 13, 2013 Common Hack-Response Errors: These have been standard practices of Business Continuity Planning for more than 40 years
  • 11. © 2016 Risk Masters International LLC. All rights reserved. 11 A Call for Cyber Civil Defense
  • 12. © 2016 Risk Masters International LLC. All rights reserved. 12 It would aid our cyber warriors to no end, however, if we supported their efforts by doing the simple, responsible things to make our IT infrastructure less vulnerable to disruption. Or, to adapt a slogan once quite popular on the Berkeley scene: “What if They Gave a Cyber War and Nobody Had Anything to Break?” Amrit William CTO Cloud Passage Formerly CTO at IBM Educate the public and national leadership. The U.S. populace has been successfully mobilized in the past to respond to public safety concerns ranging from preventing forest fires to drunk driving. But today’s pervasive lack of awareness of the growing risks to computer networks undercuts any serious effort to mobilize the appropriate national response. Lt. General David W. Barno, USA (Ret.), and Dr. Nora Bensahel Distinguished Practitioners in Residence School of International Service at American University. The Need for Cyber Civil Education
  • 13. © 2016 Risk Masters International LLC. All rights reserved. 13 Cyber Civil Defense Cyber Resilience  Actions by individuals, businesses, public sector organizations and other targets for potential cyber warfare attacks taken to minimize the potential for damage to themselves and society. Cyber Civil Defense Cyber Security Cyber Warriors Organizations Nations & Society
  • 14. © 2016 Risk Masters International LLC. All rights reserved. 14 Cyber Civil Defense & Norms are Happening WSJ CIO Journal, Sept 14, 2016 Sept 13,2016 WSJ, Sept 14, 2016
  • 15. © 2016 Risk Masters International LLC. All rights reserved. 15  Education at many levels is required to transform our Hobbesian Cyber-World into an ordered, safe and free Cyber-Society  The UNESCO Global Citizenship Education program, working together with UCLA and the Boston Global Forum, provide a platform for developing and implementing key program concepts A Call for Action
  • 16. © 2016 Risk Masters International LLC. All rights reserved. 16 Q & A Thank you for your attention.
  • 17. © 2016 Risk Masters International LLC. All rights reserved. 17 RMI Chatham House Rules
  • 18. © 2016 Risk Masters International LLC. All rights reserved. 18 You Have Been Warned 1 1