Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 4 October, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Obama publishes directive for cyber attack response

by The Gurus
July 27, 2016
in Top 10 Stories
Share on FacebookShare on Twitter

President Obama on Tuesday published a long-awaited directive clarifying how the federal government should respond to a cyber attack.
The directive issues a set of principles for guiding the federal response and lays out which government agencies would be responsible in the event of a “significant cyber incident,” which is broadly defined as an attack likely to result in demonstrable harm to national security interests, foreign relations, the US economy, public confidence, civil liberties or the public health or safety of the American people.
In the event of a significant cyber attack, the FBI and the National Cyber Investigative Joint Task Force would take the lead in “threat response activities.” That refers to law enforcement and national security investigative work like collective evidence. The Department of Homeland Security will be in charge of “asset response activities,” which includes providing technical assistance to the affected entities to protect their assets and mitigate the impact of the attack. Lastly, the Office of the Director of National Intelligence is the lead agency for intelligence support.
 
Original Source: ZDNet
View the full story here

FacebookTweetLinkedIn
Tags: cyber attack responseDepartment of Homeland SecurityDirectiveFBIfederal governmentgovernment agenciesIntelligencejoint task forcenational cyber investigative joint task forceObamaobama administration
ShareTweet
Previous Post

Zero day hole can pwn millions of LastPass users, all that's needed is a malicious site

Next Post

Osram Smart Light Bulb Security Flaw Could Let Hackers Run Riot

Recent News

Cybersecurity has become the fastest growing start-up sector in UK

UK SME cyber threat concerns on the rise in last 12 months as a quarter admit to being breached

October 3, 2023

The State of Cybersecurity: Cyber skills gap leaves business vulnerable to attacks, new research reveals

October 3, 2023
threat hunting

Threat Hunting with MITRE ATT&CK

October 2, 2023
Guide to ransomware and how to detect it

Guide to ransomware and how to detect it

September 28, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information