Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris...

24
Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief Information Security Officer Keith Tresh Your Car Could be as Smart as Your Phone STATE OF CYBERSECURITY? INSIDE By Mike Montgomery

Transcript of Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris...

Page 1: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

Vol 1. issue 3 September 2012

AG Harris Cracking Down on Cyber Crimes

Profile: State Chief Information Security Officer Keith Tresh

Your Car Could be as Smart as Your Phone

State of CyberSeCurity?

InsIde

By Mike Montgomery

Page 2: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department
Page 3: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

ContentsTechwire September 2012

Congratulations to ITLA XIX by Secretary Carlos Ramos 7

What is the State of Cybersecurity? Profile: State Chief Information Security Officer Keith Tresh 8

4 California Counties Recognized for Best Technology Practicesby Melanie Glover 11

California Technology Projects Win Nationalby Elise Armitage 12

Your Car Could Soon Be As Smart As Your Phoneby Mike Montgomery 18

Cracking Down on Cybercrimeby Cindy Waxer 21

A Look Back...Techwire - Year One! 22

Page 4: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

4 Te c h w i r e S e p t e m b e r 2 0 1 2

Techwire.neT

1005 12th Street, Suite 10

Sacramento, CA 95814

(916) 476-4789

PuBLIShER AND EDITOR

Bill Maile

DESIGN EDITOR

Emory Ensign

PhOTO EDITOR

Bill Foster

MuLTIMEDIA EDITOR

Patrick Kuske

COPY EDITOR

Kathleen Stacey

WRITERS

Ashley Nelson

Elise Armitage

Melanie Glover

Amy Stewart

CONTRIBuTORS

Mike Montgomery

Cindy Waxer

ADVERTISING SALES

Maile Communications

(916) 476-4789

Read by opinion leaders, policy makers, the vendor community

and government IT workforce, Techwire has a well-defined

audience focused on the public-sector technology industry in

California. Our goal is to gather and publish news and information

related to this community, and to document the efforts by those

helping to modernize California’s digital infrastructure and access

to information.

Launched in September 2011,

Techwire.net is an independent

publication not affiliated with

any public-entity or particular

organization. Support comes from

industry and non-profit sponsors

in the technology field.

Techwire is published by Bill Maile who previously served

as Communications Director for the State Chief Information

Officer and California Technology Agency. Prior to working at

the agency, he was Chief Deputy Press Secretary for Governor

Schwarzenegger and has spent more than fifteen years working in

state government representing members of California’s Legislature

and Executive Branch.

Page 5: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

2 0 1 2 S e p t e m b e r Te c h w i r e 5

Eye on the Cloud...

OTech Director Ron Hughes

says the state data center

is aiming for increased

efficiencies with new options

for state, county and federal

governments. Three basic

cloud service offerings will

include the systems provided

and managed by OTech,

a private offering supplied

by vendors and a public

cloud located at vendor data

centers.

He says cloud services will

allow departments to get

systems running at a much

faster rate than the current 8

to 12 months expected with a

normal procurement process.

A Request for Information is

expected out this fall, with the

goal to have a private cloud

up and running in the next

6 to 12 months and a public

cloud offering within in the

next 2 years.

Also, stay tuned for an event

in January focused on

cloud computing. Currently

in the planning stages, an

education forum will be held

in Sacramento.

By Ashley Nelson

Office of Technology Services (OTech) Director Ron Hughes and Chief Deputy Director Jeff Uyeda on campus at the Federated Data Center.

Photo: Bill Foster, Techwire.net

Page 6: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department
Page 7: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

2 0 1 2 S e p t e m b e r Te c h w i r e 7

Congratulations IT Leadership Academy XIX!

A message from Secretary Carlos Ramos

On June 14, 2012, the Information Technology Leadership Academy (ITLA) XIX held its class graduation celebration. Now entering its 20th year, the academy is an intensive, nine-month program focusing on the skills and knowledge state IT managers need to succeed in the 21st century. The California Technology Agency is committed to recruiting and retaining a dynamic workforce to support the ever changing demands of IT. As part of a new initiative, I created the Agency’s first ever Office of Professional Development, focused on ensuring that we have the skilled workforce we need to meet the challenges ahead. For this critical position, Kari Gutierrez will serve as Assistant Secretary. I would like to congratulate this year’s graduates for their extraordinary commitment to leadership in IT as we work to improve technology programs across the state. As ITLA Class XX gets started this month, I invite the IT community to stay tuned for exciting developments and more terrific work that makes us proud to serve the people of California.

Class Includes: Beth Jackson, Department of Fish and Game Betty Jablonsky, Office of System Integration Brian Mays, Department of Health Care Services Chad Wagner, Department of Mental Health Chadona Wynn, Department of Insurance Dale Paolucci, Employment Development Department Darlene Miller, Department of Motor Vehicles David Langston, Office of Technology Services Erica Gonzales, Department of Motor Vehicles Gordon McGregor,

Class Managers David Harris Director CERES Program, Natural Resources Agency

Gretchen Hernandez CHHS Deputy Agency Information Officer & Chief Information Officer, Office of Systems Integration

Lisa Murphy Chief, Account Management Branch, Office of Technology Services

Class Sponsors Paul Benedetto Undersecretary, Operations, Technology Agency

Andrea Rohmann Deputy Director Human Resources, Department of Corrections and Rehabilitation

Sergio Gutierrez Agency Information Officer, Environmental Projection Agency

IT Leadership Academy Class XIX

Department of Health Care Services James Fong, Department of Public Health Jason Chapman, Department of Corrections and Rehabilitation Jeff Vargas, Department of Health Care Services John Burlin, Department of Finance Kathy Owen, State Water Resources Control Board Lorenza Pennington, Department of Health Care Services Mike South, California Employment Training Panel

Natalie Hand, State Controller’s Office Richard Fu, Department of Motor Vehicles Ryan Fogleman, Office of Technology Services Sarbjit Brar, Department of Motor Vehicles Sirisha Gullapalli, Department of Corrections and Rehabilitation Stephen Champeau, State Controller’s Office Terese Matchim, Department of Corrections William Helms, Franchise Tax Board

Page 8: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

8 Te c h w i r e S e p t e m b e r 2 0 1 2

A National Guard man with 33 years’ experience serving the military

on his resume, California’s Chief Information Security Officer

Keith Tresh knows firsthand the importance of keeping sensitive

information safe. In an exclusive interview with Techwire, Tresh talks

about his day-to-day life keeping an eye on government data and

trying to sleep with the weight of the large task on his shoulders.

Returning from a 2006 combat tour in Iraq, Tresh became the Chief Information Officer for the California National Guard, overseeing the network security for the guard’s Department of Defense network. The position gave Tresh responsibility for securing the network and included plenty of training from the federal government.

“The security on the military side is much more stringent,” Tresh said. “So that’s kind of where I got into the IT security, learning and then working from high-side classified networks and having to adhere to those standards, so that’s the nexus.”

Tresh then heard about his current position, held within the California Technology Agency and was encouraged to apply.

“I have been a state employee for about 10 years, because in the guard they’re both federal and state, so it’s been a very easy move,” Tresh said

Tresh began his foray into information technology on the military side, serving as a telecommunications manager and then on the help desk side. After earning a master’s in Computer Information Systems from the University of Phoenix, Tresh was deployed in 2005 as an Army Brigade Signal Officer.

What is the State of Cybersecurity? California’s Chief Information Security Officers ExplainsBy Ashley Nelson

Page 9: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

2 0 1 2 S e p t e m b e r Te c h w i r e 9

of moving from the military into state government. “The transition from federal to state as far as the way things operate has been great.”

Tresh took the position with the Office of Information Security within the Technology Agency in August 2011, taking on all the worries and concerns that come with overseeing all state data and systems.

“There are so many different types of threats and actors out there in cyberspace,” Tresh said of the daily concerns that come with his job. “Nationstate actors, organized crime, folks that are doing it just for fun and those who are trying to make money. Each threat is different, they adapt and change but we keep conquering the threats.”

Tresh said “working closely with each state agency and department can feel a bit like a juggling act”.

“We have to remain constantly vigilant and it’s my office and specifically my job to make sure that all the state agencies know the threats and keep pressing them and helping to make sure they don’t let down their guard for one minute,” he said.

As Chief Information Security Officer, Tresh functions as part of the California Technology Agency and will be subject to the governor’s reorganization plan passed in July 2012. He works closely with federal agencies, the Department of Homeland Security, the Multi-State Information Sharing and Analysis Center, and the California Highway Patrol, which handles reported IT crimes.

“It starts at the federal level, down to the state level, and now we’re

coming even closer with the cities and counties and the universities,” Tresh said. “This threat is so prevalent and different that we have to share things so we can pool our efforts and our resources to try to combat it.”

The office will remain busy through this fall, keeping an eye on cyber threats and hosting informational events for government. On August 22, OIS hosted a security roundtable with House Cybersecurity Subcommittee Chairman Dan Lungren (R-CA), for a discussion about federal cybersecurity activities. In October, Tresh’s Office will host the eleventh annual IT Security Awareness Fair aimed at increasing government and business leaders’ awareness about IT security risks.

While government data must remain protected, Tresh cautioned California citizens to exercise caution when downloading applications and using social media on home computers.

“People are worried about their data and about systems at work, but they also need to be diligent about their home computers,” Tresh said. “Just because everything’s cool like social media and downloading files, doesn’t mean people can assume it will OK, because some of these bad actors end up owning and taking over computers.”

A hacker can gain access to a home computer to deny service on a state department or agency’s computer system without the home computer’s owner ever knowing, according to Tresh.

As for his three decades of service in the military, Tresh’s fulltime position keeping information safe for the state has not allowed him to forget his roots. Tresh still maintains a position

commanding a logistics brigade in the National Guard based in Roseville.

With the weight of IT security on his shoulders, Tresh says his OIS “well-oiled” and “hard-working” crew of six

“ There are so many different

types of threats and actors

out there in cyberspace...”

make his life much easier, though he still requires stress relief.

“I run many miles in the morning,” Tresh said. “I’m an avid runner and that is my stress relief. And lots of Starbucks.”

Statute requires state departments and agencies to appoint an Information Security Officer.

Each agency or department ISO has the responsibility for maintaining standards and security protocols for incidents and breaches within their organization, and reporting to OIS. This includes collecting information and doing the forensics and follow up, says Tresh. ISOs are the lead security officer for an organization and the liaison with OIS which sets policies for the entire Executive Branch.

Continued on page 15

Page 10: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department
Page 11: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

2 0 1 2 S e p t e m b e r Te c h w i r e 11

By Melanie Glover

Four California counties—San Diego, Sacramento, Nevada and Napa—received 2012 Digital Counties Survey awards this month for carrying out technology strategies with measurable benefits aligning with county priorities.

Conducted by the Center for Digital Government and the Digital Communities program —divisions of parent company e.Republic—in partnership with the National Association of Counties, the survey evaluated self-reporting entrants on their ability to demonstrate successful outcomes through the strategic use of technology. Ten winners were named in four population-based categories.

Survey questions addressed things like computing; network; applications; data and cyber security; governance; project management and funding; business continuity and disaster recovery; and citizen engagement through open government, online and mobile services, and social media. Members of the Center’s senior fellows and Center executives selected the winning counties.

Survey results showed that, as a whole, counties are focused on

simplifying their information technology infrastructure and sharing systems with other governments during the economic squeeze. Eighty-eight

percent of counties are pursuing federal grants to lessen dependence on the county general fund; 78 percent are pursuing joint service delivery (eight percent increase from last year); and 73 percent

have planned reductions in staffing and hours.

“Many have found ways to provide better information security, transparency and citizen engagement with innovative uses of social media and advanced decision support tools,” said Center for Digital Government Executive Director Todd Sander in a press release.

A broad range of best practices will be shared with participants and provide examples of excellence for articles, reports and webinars.

“The Digital Communities Program fosters the discussion of these best practices through its task forces, in-person meetings and publications,” said Janet Grenslitt, Center for Digital Government director of surveys and awards.

Some highlights from top-ranked California Digital Counties: San Diego implemented a power management system for 13,000 computers resulting in $139,485 in energy savings. The county also expanded its wireless network to support mobile devices,

Nationwide Digital Counties Survey -

4 California Counties Recognized for Best Technology Practices

and its IT staff developed a VPN solution that maintained network connection throughout the day, cutting down on travel time by staff inspectors and saving an estimated $90,000 a year.

Sacramento was applauded for its website portal revamp and excellence in cyber-security as well as the merge of the two largest IT organizations to form a new Department of Technology, which saved over $1.25 million. The county also saves $210,000 a year by sharing existing fiber and wireless network infrastructure.

Nevada consolidated its virtual server to remove 85 physical servers from its data center, freeing up space for disaster recovery; replaced public CRM applications with a free cloud-based solution to allow stakeholders to report issues; developed a custom Medi-Cal claims reconcile system, enabling the county to collect $1 million in outstanding claims supplied to citizens; and revamped its website, saving taxpayers 20 percent annually.

Napa was recognized for green, money-saving practices, such as the implementation of mobile solutions like using iPads to view electronic agenda packets at Board of Supervisor meetings (estimated annual savings: $92,000), and a new criminal justice information system to reducing paper documentation.

For more information on survey results, visit digitalcommunities.com/survey/counties.

Page 12: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

12 Te c h w i r e S e p t e m b e r 2 0 1 2

By Elise Armitage

The National Association of State Chief Information

Officers (NASCIO) are out with this year’s

nominations for its annual awards program

- with California as finalist in 5 of 10 categories.

The winners, one in each category, will be announced in October at NASCIO’s annual convention to be held in San Diego. More than 120 nominations were submitted throughout the various categories, according to NASCIO.California’s finalist nominations in the following categories, from the entry submission write-ups, are:

Cross-Boundary Collaboration

State of California: Public Employer Readiness Team (PERT) - California Public Retirement System (CalPERS)

The PERT outreach project was created to operate in parallel to the my|CalPERS project to foster collaboration with business partners and diverse interests and capabilities. The task was to ensure that the voice of the customer was heard in the design, development and preparations to create commitment, enthusiasm, and readiness for the change.

Fast Track Solutions

State of California: Video Interact Project (VIP) California Department of Food and Agriculture

VIP provides a live, two-way, interactive video conferencing that enables CDFA employees to communicate with peers by voice, video, and instant messaging over the Internet. For full implementation, the team built mobile, Skype-enabled carts that use off-the-shelf products that cost less than 10 percent of commercial solutions.

Data Information and Knowledge Management

State of California: Surveillance of Animal Diseases through an Emerging Threats Identification System - California Department of Food and Agriculture.

Between 2009 and December 2011, CDFA developed the Emerging Threats Project (ET) to provide a single, integrated, comprehensive system to collect and report on millions animal health events, such as vaccinations.

Digital Government to Citizen (G2C)

State of California: CalVet Mobile App California Department of Veterans Affairs

The CalVet Mobile Application is a tool that will help achieve CalVet’s goals of increasing accessibility and utilization of housing, benefits, and services to veterans and their families allowing CalVet to provide the highest quality of care and services to California’s veterans and their families and create fiscal and operation efficiencies within the department.

Information Communication Technology (ICT) Innovations

State of California: California Mobile Development Program - California Technology Agency

California’s mobile app development program uses a unique and innovative approach that addresses California’s exploding population of smartphone users. It works across device platforms and is able to utilize the user’s location to provide the most pertinent information. The website, www.m.ca.gov, is comprised of about 29 web-based mobile applications from across state government with more being developed and released each month.

California Technology Projects WIn National Nominations

Page 13: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department
Page 14: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

SharePointImplementation

MobileApplications

.NETDevelopment

CRM

OSHPD State ControllerCity of Sacramento City of Los Angeles Coastal CommissionAir Resources BoardCounty of SacramentoCounty of SacramentoDepartment of ConservationDepartment of Mental Health Department of Child Support ServicesDepartment of Food and AgricultureDepartment of Forestry and FireDepartment of General ServicesDepartment of Health Care ServicesDepartment of Health Care ServicesDepartment of InsuranceDepartment of Motor VehiclesDepartment of Personnel Admin.Department of Public HealthDepartment of Technology ServicesCA Teacher's Retirement SystemDept. ofDept. of Alcohol & Drug ProgramsDept. of Fair Employment and HousingEmployment Development DepartmentPublic Employee's Retirement SystemSacramento Municipal Utility DistrictFair Political Practices CommissionGambling Control CommissionCaliforniaCalifornia Technology AgencyIndependent System OperatorHousing Finance AgencyDepartment of CSDFranchise Tax BoardHighway PatrolLottery CommissionPort of LosPort of Los AngelesSecretary of StateCounty of KernVCGCB

Success Stories

CMAS MSA Spring-Fed Pool Small Business Certified Local

www.KieferConsulting.com916.932.7220

Certified Training Center

Page 15: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

2 0 1 2 S e p t e m b e r Te c h w i r e 15

A weekly newsletter that allows you to track bids, gather intelligence and stay ahead of the pack! › RFP Tracking › California – State and Local Bids › Gain Valuable Insight › Industry Purchasing Data › Easy to Navigate › Stay Competitive

Learn more, visit us online or call 916.476.4789.

During a bimonthly ISO meeting, Tresh and his staff walk through best practices related to risk mitigation and risk assessments. A basic training for new ISO’s focuses on basic duties and responsibilities and the reporting process for an incident, according to Tresh. OIS also maintains an email and communications channel with ISOs to provide alerts and information for ISOs on a daily basis, he said.

In a hacking incident, Tresh explained that the workflow begins with the individual agency or department. In a hypothetical scenario in which a hacker breaches an agency’s network and gains access to personnel information, such as names,

addresses, and social and pay data, the agency quickly reports the potential threat to the computer crimes unit at the California Highway Patrol and immediately has staff conducting troubleshooting and determining the scope of the data loss.

“We work with the agency in helping them solve problems and provide them with resources and guidance, and provide help and training, if needed, to abide by the standards related to risks and incidents.”

The Office of Information Security’s team gets involved to determine the type of data loss, ensure the agency secretary and the governor’s office

have been notified and help with any additional workload needed from the individual agency. OIS will guide the agency, work through public release of information about the hacking, and answer the question of “now how do we fix it?,” Tresh explained.

“We walk through and work with them until it’s complete,” he said. The entire process could take a few weeks.

“The process lasts over a two week period, from the time they report it, to give us what their plan is,” Tresh explained. “But depending on how big the breaches are and how much data was lost and how many assets there are, it could be weeks or months.”

What is the State of Cybersecurity?Continued from page 9

Introducing…

Techwire Roundup

Page 16: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

enterprise networking solutions, inc.

procurement options:

DVBE with affiliate HSB Solutions, Inc.

CMAS & WSCA

CA Small Business Certified

California IT MSA

CalPERS Spring-Fed Pool

virtualization

cloud integration

business continuity

disaster recovery

sharepointSharepoint is a registered trademark of Microsoft Corporation.

®

IT Agility and Efficiency

Enterprise Networking Solutions, Inc3054 Fite Circle #106, Sacramento, CA 95827

(916) 369-7567www.ens-inc.com

Your Datacenter. Your Cloud. Reliable Customer Service.

Building a vital IT infrastructure through virtualization and cloud integration, then securing that infrastructure with a solid plan for business continuity and disaster recovery, gives you the confidence your organization requires to focus on the business of the bottom line.

With the expertise and innovation of our highly-skilled architects and engineers, the oversight of ITIL and PMP-certified Project Managers, and a passion for customer service, ENS-Inc develops and deploys proven reliable and scalable technology solutions on time, on budget, and within scope.

ENS-Inc empowers you to securely manage your IT infrastructure from anywhere, at any time while delivering maximum uptime of the crucial IT services your organization depends on.

Page 17: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department
Page 18: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

18 Te c h w i r e S e p t e m b e r 2 0 1 2

By Mike Montgomery

Executive Director of CALinnovates, which works on public policy affecting technology.

Techwire | Feature

Wireless Internet-based services are transforming the auto world,

empowering us to access relevant information, stream entertainment,

and travel safer. You’re cruising east on Interstate 80 early on a Friday

afternoon, getting a head start on a weekend in Tahoe. You come

up behind a slow moving semi, make a quick check in your side view

mirror and start to pull into the left lane to pass, unaware of the Lexus

that’s just roared into your blind spot at 85 m.p.h.

Yet you don’t become a highway statistic because vehicle-to-vehicle communications sent you a warning that your mirror couldn’t. The moment you nudged the steering wheel left, digital intelligence embedded in your car sent you an urgent warning not to change lanes or even applied the brakes automatically to avoid a collision.

Or suppose you’re driving through Napa Valley on a lazy Sunday and want to find a family friendly place to stop for dinner. With just a simple voice command, your wirelessly connected car pulls up Yelp on the dashboard, with recommendations and directions at the ready.

Your Car Could Soon Be As Smart As Your Phone

And if you’re driving one of the new electric vehicles (EV), the navigation system directs you for a ‘refill’ to a network of charging stations NRG Energy is deploying across California. These fast-charge stations will operate like a mobile network to provide complete coverage in several regions of the state.

Page 19: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

2 0 1 2 S e p t e m b e r Te c h w i r e 19

Helping drivers avoid collisions and keep both hands on the wheel and eyes on the road is just one of the many benefits of mobile technology. These are not vaporware automotive scenarios but rather technology that exists right now and will become common in cars over the next few years.

As California leads the tech industry and consumers continue to have an insatiable appetite for the latest technology, the auto industry is veering quickly toward mobile innovation. In the near future, the deciding factor in choosing a new car could fast become wireless connectivity and what it offers.

It’s significant that the rise in smart car features has coincided with the opening of Silicon Valley R&D centers by all the major U.S. car manufacturers – Ford just opened theirs last month. The auto industry joins health care, education and energy providers

who have set up shop here to take advantage of the digital revolution and the abundance of tech talent. While change doesn’t happen as quickly in the auto industry as it does in the Valley, smart car technology is accelerating.

In the mobile world, consumer demand for Internet connectivity and smartphones is skyrocketing and consumers are able to do more than ever on wireless connections— from operating home appliances to remote monitoring of health, to taking distance education courses—opportunities that further increase wireless demand. The U.S. government has estimated a 35-fold increase in U.S. mobile data traffic from 2009 to 2014 and experts forecast worldwide data traffic to multiply seven times in the next three years. So it’s not surprising that demand for mobile connectivity and the smartphone is leading us right to the

smart car, which will add to the growing strain on our wireless networks. There’s much more technology in the on-deck circle, but the future of “smart” cars - like smartphones, homes, grids, and mobile medical devices - depend on smart government. There are many things government can do to promote a flourishing Internet ecosystem, everything from allocating more spectrum (the airwaves that act like highway lanes in the sky transporting mobile data between devices) for consumer use, to modernizing regulations that would create incentives for the substantial private sector investment needed to transition to IP-based networks.

After all, it is consumer demand that has driven innovations like the smart car, and to satisfy that ever-growing demand in the future, it is imperative that we foster a policy environment that keeps mobile in the fast lane.

Page 20: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department
Page 21: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

2 0 1 2 S e p t e m b e r Te c h w i r e 21

By Cindy Waxer

California may be home to countless high-tech giants

but it’s also a hotbed for cybercrime. In fact, the

Golden State received the highest total number of

cybercrime complaints in 2011 – a whopping 34,169,

according to the Internet Crime Complaint Center.

Cracking Down on Cybercrime

With illegal activities ranging from identity theft to phishing scams, cracking down is no easy task. But California’s Attorney General Kamala D. Harris is starting to make a dent with some innovative approaches that include teaming up with industry behemoths and forming a brain trust of cybercrime gumshoes.

The eCrime Unit marks one of Attorney General Harris’ first cybercrime-fighting initiatives since being elected in 2010. Staffed with 20 attorneys and investigators, the group is responsible for identifying and prosecuting crimes including identity theft, online fraud, child exploitation and intellectual property charges. Because many of these crimes are multi-jurisdictional, the eCrime Unit can prosecute on a statewide level and across jurisdictions – a boon for California prosecutors who, up until this point, faced the enormous challenge of prosecuting multi-jurisdictional cybercrimes at a local level.

“The Attorney General recognized that high-tech crime is no longer an emerging threat; it is a serious threat to the state, to consumers across California and that it required a dedicated unit of investigators who were trained in the technology, could keep up with the technology and actually investigate and prosecute these multi-jurisdictional crimes,” says Travis LeBlanc, special assistant Attorney General for Technology for California.

Another one of Attorney General Harris’ crime-fighting feats: getting tech giants to agree on something. In February, industry behemoths Amazon, Apple, Google, Hewlett-Packard, Microsoft and Research In Motion agreed to a California law that requires mobile apps sold in their digital app stores and running on their mobile operating platforms to have clear privacy policies. Rather than reach out to hundreds of thousands of app developers across the globe, LeBlanc says the Attorney General spent six months convening with “certain gatekeepers who had a

fundamental role in the app economy.” More than simply a step towards greater privacy protection, LeBlanc says the agreement heralds “a shift in the way that government works with industry where they are collaborating more than they ever have before.”

Also protecting the privacy of consumers is the Attorney General’s newly formed Privacy Enforcement and Protection Unit in the Department of Justice. The group’s mandate is broad and includes regulating the collection, disclosure and destruction of private or sensitive information including health and financial records. Joanne McNabb, formerly of the California Office of Privacy Protection, serves as the Director of Privacy Education and Policy, and oversees the Privacy Unit’s education and outreach efforts. Previously a part-time, two-person job, LeBlanc says Californians can now expect a “team of six prosecutors to work pretty much full time on investigating and prosecuting civil violations of federal and state privacy laws.”

Page 22: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

22 Te c h w i r e S e p t e m b e r 2 0 1 2

A Look Back...

Techwire - Year One!

Symantec (then) CEO Enrique Salem gives keynote address at IT Security Awareness Fair – Oct. 2011 | Technology Services Board meets – April 2012

Secretary Carlos Ramos, EMC Executive Jennifer Axt, health Care Services CIO Chris Cruz, award recipients at Best of California Awards Ceremony – May 2012

Government Mobility Conference Exhibit hall – Feb. 2012 | IT Security Awareness Fair Exhibit hall – Oct. 2011 | Department of Information Technology reunion – May 2012

Page 23: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

The M Corp Legacy Roadmap is the 'How' in delivering low risk, proven, high value conversions, migrations, and modernizations. Our frameworks are a combination of M Corp methodologies and processes combined with industry leading tool sets to deliver Business Rules Extraction, Conversion, Quality Management, Enhancements, Integration, and Change Management. We use this system to transform data and code from some of the largest mainframes in produc-tion, helping our customers navigate the challenges of their legacy projects.

Find your way with California’s legacy expert at the-mcorp.com.

WE KNOW LEGACY.

Page 24: Vol 1. issue 3 September 2012 State of CyberSeCurity? · Vol 1. issue 3 September 2012 AG Harris Cracking Down on Cyber Crimes Profile: State Chief ... Sirisha Gullapalli, Department

Kiefer Consulting Inc. - 916.932.7220 - [email protected]

www.KieferConsulting.com

ADA Mobile Assessment Tool

http://bit.ly/cacio2012

Event Mobile

Mobile Innovation