Return-Path: <sentto-279987-3759-1004934214-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 04 Nov 2001 20:25:07 -0800 (PST) Received: (qmail 1988 invoked by uid 510); 5 Nov 2001 04:22:41 -0000 Received: from n20.groups.yahoo.com (216.115.96.70) by 204.181.12.215 with SMTP; 5 Nov 2001 04:22:41 -0000 X-eGroups-Return: sentto-279987-3759-1004934214-fc=all.net@returns.groups.yahoo.com Received: from [10.1.1.224] by n20.groups.yahoo.com with NNFMP; 05 Nov 2001 04:21:58 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 5 Nov 2001 04:23:34 -0000 Received: (qmail 29535 invoked from network); 5 Nov 2001 04:23:33 -0000 Received: from unknown (216.115.97.171) by m6.grp.snv.yahoo.com with QMQP; 5 Nov 2001 04:23:33 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 5 Nov 2001 04:23:33 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA54O4d02048 for iwar@onelist.com; Sun, 4 Nov 2001 20:24:04 -0800 Message-Id: <200111050424.fA54O4d02048@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sun, 4 Nov 2001 20:24:04 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Cybersecurity.panel.to.build.Web.forum] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cybersecurity panel to build Web forum By Diane Frank, Federal Computer Week, 11/1/2001 <a href="http://www.fcw.com/fcw/articles/2001/1029/web-chat-11-01-01.asp">http://www.fcw.com/fcw/articles/2001/1029/web-chat-11-01-01.asp> The Bush administration's new Critical Infrastructure Protection Board is already considering several ways in which industry can be involved in the federal cybersecurity effort, including a new Web site to promote new ideas and solutions, an official said Wednesday. The new board, established in October by executive order, oversees the cyber and physical protection of information systems that support the nation's critical infrastructure, such as telecommunications and electric power. One of the standing committees, led by the Office of Science and Technology Policy and focused entirely on research and development, will coordinate the many cybersecurity research programs under way across government. In this arena, the government will be working closely with industry and academia to "come up with good solutions," said Paul Kurtz, director of critical infrastructure protection at the National Security Council. But innovative solutions developed outside the federal R&D community will be welcome. In fact, the board hopes to establish a Web site within the next month where agencies can learn about the latest cybersecurity developments, Kurtz said in a Web chat. "One of the purposes of the critical infrastructure board is to offer a conduit through which the ideas, products and resources available in the private sector can be passed to the whole range of government agencies," he said. Rep. Sherwood Boehlert (R-N.Y.), chairman of the House Science Committee, hosted the Web chat to bring together government and industry security experts in an open forum. The committee will keep cybersecurity as a priority on its agenda, he said in the chat. Advertisement ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST