среда, 18 мая 2016 г.

Vulnerabilities in Pentagon cyber security found! (Gen.Cook transcrypt)

 Peter Cook - advisor to the Secretary and Deputy Secretary of Defense for communications spoke at the Department of Defense Press Briefing on 16 of May. He comented on the results of Pentagon cyber-program, according to which their cyber-security was to be tested by individuel hackers. He announced that all in all 80 vulnerabilities were found.
Here's the actual transcrypt of  Mr.Cook's speech.


Q:  Two cyber questions, if I could.  Hack the Pentagon is ongoing, I believe.  Do you have an update on how the -- how many people are participating, what's going on with that?

MR. COOK:  Yeah.  The -- actually, the Hack the Pentagon itself, the actual period of time when the hackers have been allowed to engage in the DoD and try and identify vulnerabilities, that has now come to an end
We're in the process right now of pulling together all the details we can about not only those who -- the vulnerabilities that have been identified, but also the steps that we have had to take to try and remedy those vulnerabilities, and also determine who's qualified for -- for potential prizes as a result of this.
We have been very, very satisfied with the -- with the outcome so far.  The secretary spoke to this last week, but I believe over 1,400 hackers participated.  They did identify, I believe, over 80 vulnerabilities.  And we believe this has been a success.
As you know, this is the first time ever that a federal agency has ever had a competition like this, a bug bounty competition like this.  And we think it has been an unqualified success, and we look forward to sharing the full details once we've been able to tabulate everything.  We're going through that process right now.

Q:  So those 80 vulnerabilities, will you be disclosing them publicly, or are these just going to be for internal --

MR. COOK:  No, we will not be, for understandable reasons.

They've been identified to us, and now we're in the process of being able to remedy those vulnerabilities.  In many cases, they've already been remedied.
But the goal here was to spot things that we, in our teams, had not been able to spot.  And that was -- that was achieved and it has been done in a very cost-effective fashion.
And we believe our -- our security, our digital security is better today as a result of this competition than it would have been otherwise.

Комментариев нет:

Отправить комментарий