Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Cyber Wars – From Global to Laptop

By Bill Zalud
June 1, 2009

It seems that the next international war may be a cyber war. It may be happening now. There are also a lot of threats at the laptop level, too.
     
Last month, Security Magazine reported cyber attacks across numerous countries, government agencies and military groups, including the Pentagon. Some have suggested the attacks originated in China.
     
At the April RSA security conference in San Francisco, Melissa Hathaway, a top advisor to President Barack Obama, gave some details of a two-month study about the nation’s computer security. She suggested that the Administration won’t consolidate the patchwork of national agency protection into one person. But there is legislation in the U.S. Senate – S.773: Cybersecurity Act of 2009, which will establish, within the Executive Office of the President, the Office of the
National Cybersecurity Advisor.
     
The proposal states that the national cybersecurity advisor will be an assistant to the President, subject to confirmation by the Senate, and would have specific duties with respect to advising the President.


Serious Threat

But, according to Hathaway, the challenge of protecting the government’s computer networks is too big for any one agency to handle alone. According to media reports from RSA, the fragility of the world’s digital infrastructure is “one of the most serious economic and national security challenges of the 21st century,” Hathaway said, and the responsibility for locking down networks in the U.S. “transcends the jurisdictional purview of individual departments and agencies.”
     
There’s no doubt that hackers, identity thieves and spies have increased attacks on the nation’s power grids, military networks and other government networks. The big question is: Are governments orchestrating or encouraging the attacks.
     
China denies involvement.
     
“We have reiterated many times our policies of firmly opposing and severely cracking down on all crimes that damage the Internet, including hacking,” China Foreign Ministry spokeswoman Jiang Yu told a regular press conference.
     
Ironically, there may be more losses in the U.S. in terms of computers and data from something as simply as losing a laptop computer or having it stolen.
     
An independent study on notebook security, commissioned by Intel Corporation, analyzed the potential business costs of stolen or lost notebook computers, suggesting that in an era where “the office” can be almost anywhere, good security precautions are essential.
     
The study, which was conducted by the Ponemon Institute, calculated that notebooks lost or stolen in airports, taxis and hotels around the world cost their corporate owners an average of $49,246 per loss, reflecting the value of the enclosed data above the cost of the PC.


The Mobile Worker

“For a rapidly growing number of workers, desktop computers have given way to notebooks, rewarding users with the increased productivity and freedom that mobility affords,” said Mooly Eden, vice president and general manager, Mobile Platforms Group.
     
Analyzing 138 instances of lost and stolen notebooks, the study based the $49,246 price tag on costs associated with replacement, detection, forensics, data breach, lost intellectual property, lost productivity, and legal, consulting and regulatory expenses. Data breach alone represents 80 percent of the cost. The study found that data encryption makes the most significant difference in the average cost: A lost notebook with an encrypted hard-disk drive is valued at $37,443, compared with $56,165 for a nonencrypted version.
     
By the way, the greatest losses from a laptop or notebook computer come from those used by enterprise managers and directors and not the CEO. According to a Zalud Report interview of the researchers, the CEO’s laptop often does not contain a firm’s most sensitive data.


SIA Legislative Priorities

The Security Industry Association will focus on ensuring adequate funding to secure the nation's critical infrastructure and facilities.
  • Secure sufficient funding for the Student Safety and Campus Emergency Management grant program.
  • Secure enactment of the School Safety Enhancements Act and appropriation of $50 million in fiscal year 2010.
  • Secure full funding of $400 million in fiscal year 2010 for the Port Security Grant Program.
  • Secure full funding of $900 million in fiscal year 2010 for the Transit Security Grant Program, and support the distribution of grant money directly to transit authorities without a local match requirement.
  • Support the allocation of additional funding to protect facilities that contain dangerous toxins, diseases or agents.
  • Support the allocation of additional funding to help hospitals and health care facilities conduct security assessments and purchase security equipment.
  • Support legislation that promotes participation by the Department of Homeland Security in the development of technological standards by the private sector.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber Wars Get Tougher

    See More
  • web-g52f703615_1920.png

    Global navigation in cyberspace: GPS and threats to national defense

    See More
  • Cyber Liability Insurance: Moving from Insurance to Assurance; cyber security news

    Cyber Liability Insurance: Moving from Insurance to Assurance

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products

Events

View AllSubmit An Event
  • September 23, 2025

    From Signal to Action in Seconds: How Nutrien Translates Early Warnings into Operational Confidence

    ON DEMAND: When a threat emerges — how fast can your team respond? The ability to detect, validate and act with confidence can be the difference between a contained incident and a costly crisis.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing