Details of more than 18,000 Foreign Terrorist Fighters have now been shared via Interpol’s network with an increasing amount being sourced from the conflict zones. Biometric data such as photos, fingerprints and DNA profiles have already led to the positive identification of terrorists around the world, including via facial recognition.
In their perpetual battle against external cyber threats, understanding and addressing evolving regulations and gathering resources to meet escalating security demands, Chief Information Security Officers (CISOs) are a busy, if not overburdened, bunch these days.
This system’s workflow automation and tracking features enable adaptive response, while including all stakeholders and facilitating information-sharing with other organizations through participating with Information Sharing and Analysis Centers (ISACs).
Amid calls for stronger cyber security laws, the Department of Homeland Security is working on getting its threat-tracking system to work across its own operations and the Department of Defense. An October 24 memo from the Office of the Inspector General found that although the DHS can keep track of threats and provide updates on ongoing issues, “federal cyber operations center do not have a common incident management system tool that tracks, updates, shares, and coordinates cyber information with each other.”
Who are the Most Influential People in Security? Find out which security leaders are making a difference in the September issue of Security magazine! Also, read about how New York is shaking up cybersecurity, changes in drone legislation, three steps to prepare for the GDPR, school surveillance savings and more.