[iwar] [fc:Cybersecurity.panel.to.build.Web.forum]

From: Fred Cohen (fc@all.net)
Date: 2001-11-04 20:24:04


Return-Path: <sentto-279987-3759-1004934214-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 04 Nov 2001 20:25:07 -0800 (PST)
Received: (qmail 1988 invoked by uid 510); 5 Nov 2001 04:22:41 -0000
Received: from n20.groups.yahoo.com (216.115.96.70) by 204.181.12.215 with SMTP; 5 Nov 2001 04:22:41 -0000
X-eGroups-Return: sentto-279987-3759-1004934214-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.1.224] by n20.groups.yahoo.com with NNFMP; 05 Nov 2001 04:21:58 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 5 Nov 2001 04:23:34 -0000
Received: (qmail 29535 invoked from network); 5 Nov 2001 04:23:33 -0000
Received: from unknown (216.115.97.171) by m6.grp.snv.yahoo.com with QMQP; 5 Nov 2001 04:23:33 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 5 Nov 2001 04:23:33 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA54O4d02048 for iwar@onelist.com; Sun, 4 Nov 2001 20:24:04 -0800
Message-Id: <200111050424.fA54O4d02048@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sun, 4 Nov 2001 20:24:04 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Cybersecurity.panel.to.build.Web.forum]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Cybersecurity panel to build Web forum

By Diane Frank, Federal Computer Week, 11/1/2001
<a href="http://www.fcw.com/fcw/articles/2001/1029/web-chat-11-01-01.asp">http://www.fcw.com/fcw/articles/2001/1029/web-chat-11-01-01.asp>

The Bush administration's new Critical Infrastructure Protection Board
is already considering several ways in which industry can be involved in
the federal cybersecurity effort, including a new Web site to promote
new ideas and solutions, an official said Wednesday.

The new board, established in October by executive order, oversees the
cyber and physical protection of information systems that support the
nation's critical infrastructure, such as telecommunications and
electric power.

One of the standing committees, led by the Office of Science and
Technology Policy and focused entirely on research and development, will
coordinate the many cybersecurity research programs under way across
government. In this arena, the government will be working closely with
industry and academia to "come up with good solutions," said Paul Kurtz,
director of critical infrastructure protection at the National Security
Council.

But innovative solutions developed outside the federal R&amp;D community
will be welcome. In fact, the board hopes to establish a Web site within
the next month where agencies can learn about the latest cybersecurity
developments, Kurtz said in a Web chat.

"One of the purposes of the critical infrastructure board is to offer a
conduit through which the ideas, products and resources available in the
private sector can be passed to the whole range of government agencies,"
he said.

Rep. Sherwood Boehlert (R-N.Y.), chairman of the House Science
Committee, hosted the Web chat to bring together government and industry
security experts in an open forum. The committee will keep cybersecurity
as a priority on its agenda, he said in the chat.  Advertisement

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST