CISC News...

In April the initial meeting of the Cyber & Information Security Consortium (CISC) was held. Since then we have been forming a structure and developing governance, talking to stakeholders, exploring grants and identifying opportunities to help members grow in our four key focal areas: communication/information sharing, policy/public awareness, workforce/education, and research/internet of things (IoT).

In the fall we will gather again to brief you on where we are and to discuss the topic of resilience in cyber security. 

This newsletter will be your window to discover all that is happening inside the CISC. Check out the events on the sidebar and feel free to share with colleagues who might be interested in the work of the CISC. 

Industry News...

Google & Facebook Push President’s Cybersecurity Commission for Transparency

Poisoned trust. Yearnings for transparency. The cyber Pearl Harbor.

Executives from Google, Facebook, Dropbox and other major tech companies met with the president’s Commission on Enhancing National Cybersecurity at UC Berkeley yesterday. The discussion was laced with moments of high drama as industry representatives asked the commission to recommend reforms and technological advances in government and the private sector.

The commission, staffed with members like former NSA director Gen. Keith Alexander and Uber chief security officer Joe Sullivan, is gathering feedback for cybersecurity recommendations it is expected to issue in December. Representatives from Google, Facebook, Dropbox and other companies spoke at the meeting, asking the commission to make recommendations on transparency, threat sharing and privacy for consumer data. 

Source: | Kate Conger |June 23, 2016

Click here to

Eliminating the Cybersecurity Blindspot

Global organizations will spend $88 billion this year on cybersecurity, nearly doubling this investment to $170 billion by 2020. Yet, many organizations have a major blind spot: they believe that spending additional money on cybersecurity automatically leads to greater security and reduced risk. It is not unusual for an organization to deal with 30 to 40 different technology point solutions from different vendors, often within the same technology segment in the case of multiple business units. As a result, they spend more time and money than necessary. 

However, an organization can eliminate or at least reduce its blind spot by using a formal, structured process for engaging technology solution vendors. This will also ensure it has the best vendors to support its cybersecurity strategy and architecture. While this process may differ somewhat by industry, it usually has the following seven key steps:

Source: | Guest Author | June 20, 2016

Click here to

US Department of State Awards IoT Contract

The U.S. government is slowly acting to catch up with much of the world in terms of IoT implementation, and in a recent announcement, the Department of State has taken a big step in the right direction.

C3 IoT has announced that the U.S. Department of State this week awarded the company a multi-year contract up to $25 million to provide its IoT enterprise application development platform for energy management and predictive analytics. This will be the federal government’s first enterprise-wide contract of this type, which is designed to help achieve and maintain statutory, executive order, and department energy and sustainability goals.

Source: | Ken Briodagh | June 22, 2016

Click here to




Monday, October 17, 2016
10:00 a.m. to 4:00 p.m.

Crowne Plaza Hotel
Downtown Knoxville Tennessee

Held in conjunction with the EDGE 2016 Security Conference.

You are invited to participate in this CISC partner event...

EDGE 2016 Security Conference. Bringing business leaders together with information and security professionals to solve today’s challenges, EDGE2016 is where complex business problems meet real world security solutions. For more information and to register:

Membership in the CISC?
Visit for information.

CISC’s mission is to make businesses and industries the most secure, expand R&D opportunities in cybersecurity, create a strong pipeline of cybersecurity talent, and transition new cybersecurity capabilities to industry thus growing new cybersecurity-focused companies. 
Two of the Nation's leading research entities – the Oak Ridge National Laboratory (ORNL) and the University of Tennessee (UT), – have joined with other private entities including members of the East Tennessee Economic Council (ETEC) to devise a strategy to position the region as a national leader in the development and deployment of cutting-edge cybersecurity technologies.

Copyright © 2016 Cyber & Information Security Consortium (CISC), All rights reserved.
You are receiving this newsletter because you... opted in at, were invited to the inital meeting on April 5th, or have expressed interest in learning more about the CISC.

Our mailing address is:
Cyber & Information Security Consortium (CISC)
1201 Oak Ridge Turnpike
Suite 100
Oak Ridge, TN 37830

Add us to your address book

Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list

This email was sent to <<Email Address>>
why did I get this?    unsubscribe from this list    update subscription preferences
Cyber & Information Security Consortium (CISC) · 1201 Oak Ridge Turnpike · Suite 100 · Oak Ridge, TN 37830 · USA

Email Marketing Powered by MailChimp