"Those are systems that affect a lot of customers, they are usually connected to the outside world, either through the Internet or through other networks, and there [are] quite a few reasons why an attacker would want to get inside those networks and affect those assets," said
"We're now seeing threats that might target infrastructure, that might target power systems," Hansmann said. "We've already seen threats targeting a specific research device, we've seen threats that targeted specific medical devices, so anybody using specialized equipment does have to deal with targeted threats."
"Tracking information is a critical component across the board. It's ubiquitous in today's environment, so ensuring that that information remains confidential and is not subject to manipulation by hostile third parties is a critical aspect and a critical subset of the security challenges we're seeing today," he said.
Emergency Management attended the
"For a while, public agencies wanted to have their data behind their firewalls," said
Securing GIS and other information assets is taking on growing importance as these resources play an expanding role in facilitating communication during emergencies. As agencies and regions open GIS and other decision-making resources to a wider user base, security demands expand with them.
"When you've got something like 9/11, Benghazi [or the] Boston Marathon bombings, if you have any kind of delay in making a decision, or if you don't have the right people involved that are making the decision, that's going to create a slew of issues, worst case being deaths of innocent civilians," said
(c)2014 Emergency Management
Visit Emergency Management at www.emergencymgmt.com
Distributed by MCT Information Services