NPPD CONFERENCE CALL ON CYBER E.O.

NPPD CONFERENCE CALL ON CYBER E.O.

FROM:                    National Protection and Programs Directorate

SUBJECT:                 Conference Call to discuss the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

DISTRIBUTION:     Intended for Widest Distribution

 

Today President Trump signed an Executive Order reaffirming the important role the Department of Homeland Security plays in strengthening the security and resilience of federal networks and our nation’s critical infrastructure from malicious cyber activity. The Executive Order, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, builds upon DHS’s existing authorities and capabilities, and initiates action on three fronts:

 

1.        Securing the networks federal agencies operate on behalf of the American people

2.        Working with industry to protect critical infrastructure that maintains our way of life, and

3.        Promoting an open, interoperable, reliable and secure Internet for the Nation.

 

The Executive Order recognizes the importance of continuing our strong partnership between government and industry to address shared challenges and taking active steps to reduce the risk to critical infrastructure from cyber incidents. As government leaders and private sector owners and operators of critical infrastructure who have been and will continue to be key to our success in cybersecurity, we invite you to join a conference call on Friday, May 12 at 2:00 p.m. ET to provide you with further details and information. Below is the conference call information:

Conference Call to discuss the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Friday, May 12, 2017

2:00 p.m. ET

Dial-In:1-888-889-4460

Participant passcode: 9074869#

The Conference line will open 30 minutes prior to the scheduled start time of the call.

 

Thank you for your consideration in participating in this conference call. We look forward to working with you to help implement the President’s policy and are available to answer any questions you may have.

Vladimir Skoric

Director, Strategic Outreach, Financial Crimes Unit at BMO

7y

Mike, sad that I missed this. Is there a readout from the call available? Or was it by any chance recorded for dissemination to the public?

Would love to hear more senior leaders plug their existing programs when audience members ask soft ball questions... CISCP, ISACs, ISAOs... Etc. Easy wins with existing programs/sharing bodies. These programs can really excel with the right attention and investment.

Don Gauger

Artist, Writer, Scientist, and Technical Consultant

7y

Michael -- thank you for posting, it was a valuable briefing; I suggest sharing the post for accessing this conference call's recording for those who heard late.

Like
Reply
Dr. Alexis P.

| #DrPrivacy | FSU Law Grad | Data Privacy Advocate | Global Cybersecurity & Compliance Leader | Mentor | Educator | Research Fellow | Privacy Expert GDPR, CCPA, LGPD, and HIPAA |

7y

Thanks for sharing .. Cybersecurity is a all hands on deck approach to addressing these issues

Like
Reply
Michael A. Echols MBA CISSP

CEO, Founder @ MAX Cybersecurity | 8a Certified

7y

The days of hoarding information are over........................ this is a team sport.

To view or add a comment, sign in

More articles by Michael A. Echols MBA CISSP

  • Krebs Firing - Model for Cyber Maturity

    Krebs Firing - Model for Cyber Maturity

    The politically based removal of the most visible cybersecurity leader in the nation degrades national cyber…

    8 Comments
  • Cyber Diamonds in the Hood

    Cyber Diamonds in the Hood

    It is Black History Month in the United States. This moment should be a time to remember how vital leadership and…

    8 Comments
  • Will Saudi Arabia Have Me Killed

    Will Saudi Arabia Have Me Killed

    The article's title is a little facetious, but a real question none the less. You see, my goal is to become a trusted…

    13 Comments
  • Humans are the Greatest Cyber Risk to Democracy

    Humans are the Greatest Cyber Risk to Democracy

    Democracy is the Holy Grail and the freedom of each citizen determines its health. If one was to view the voting system…

    30 Comments
  • Government: Not Coming To Save You

    Government: Not Coming To Save You

    Greatest Threat to Our Freedom The billions of documents and records that have been stolen by hackers are just a storm…

    9 Comments
  • Max Services Provides Quality Assurance for Power Restoration

    Max Services Provides Quality Assurance for Power Restoration

    Employs Puerto Rico's Brightest Unemployed Engineers Posted: Dec 20, 2017 9:18 PM EST SAN JUAN, PR, USA, December 20…

    7 Comments
  • Equifax Breach Preventable

    Equifax Breach Preventable

    I have been working with Trend Micro on their Zero Day Initiative. This is how I became aware of some points that…

    8 Comments
  • N.C. Officials Get CyberSafe Certified - Cybersecurity is Team Support

    N.C. Officials Get CyberSafe Certified - Cybersecurity is Team Support

    PRESS RELEASE On Friday August 18, 2017 up to 40 Durham, North Carolina City Officials including first responders will…

  • Planning for Cyber Success (Winter Meeting)

    Planning for Cyber Success (Winter Meeting)

    Please see attached an invitation to the Winter meeting of the International Association of Certified ISAOs. It will be…

    1 Comment
  • ISAOs Make the World More Resilient

    ISAOs Make the World More Resilient

    In our zest to get arms around the challenges of cybersecurity sometimes we miss the opportunities to reach our desired…

    1 Comment

Insights from the community

Others also viewed

Explore topics