Let me just, you raise the holiday season. People should specifically be paying attention to . Most cans are imposter scams. Be very careful if you receive an ecard and it does not say who it is from four ask you to give personal information or have a special link. They tried to deliver a package to you, please click this link to find out. If it doesnt say who the packages from dont click the link. The the sneaky ways to the malware loaded. The family scam wherein this holiday time i have been stranded, email me money so im in the hospital for the real. Please doplease do not send any money until you talk to a family member. They scale, these are the ones, its a special sale. Click now. Prepaid debit card which can be traced. Once its gone and stuff. If you take them,them, most of the scams rely on an emotional response. The bad guys out there. Take one more moment and think about it, stop and think. The hebrew people to drop off shopping carts because there concerned about the amount of personal information being connected for their trusting their got about what is going on, any advice for businesses when they are communicating with their customers about completing a transaction . Look for ht tp. That way any payment trying to collect if it has been fraudulently obtained. And most businesses will not encourage you to pay by Wire Transfer or prepaid debit card. Card. The more a business can do to show they are working to protect your information or promote through paypal give the customer another reason to keep going. Today people are starting to be a little more savvy. They may not get down your postcard that they are looking to say this is a good company. Its how they express that out to everyone. Pass the conscience. One of the top things that we still see. It doesnt matter. If they engage in Wire Transfers for the beautiful vulnerability where we see cases come out. Elected january or february also from a Small Business perspective to have discussions on staff training and with your bank. The mother vulnerabilities and experiences in cyber protection. Its a hectic season. You want to be as diligent as possible. But also start thinking about january and february. Looking inward and talking to others. Not everything is in your immediate span of control. In my prompt with you need to look at a service provider, having those discussions. Now Cyber Security is a must discussion point. Businesses with new years resolutions. I would encourage it. We will all try to get fit. That we have a few more minutes here. Maybe we could shout. [inaudible question] and i am just wondering, somebody scrutinizing and this is something. [inaudible question] who is watching that . So the question in the back, the gentleman here is trying to look for things so line. There is a way to protect that effort as he undergoes and make sure that no one is trying to steal his ideas. Using Search Engines for email solutions and conducting market research, looking for branding opportunities. It is something to be aware of. I have not heard many cases of people doing in general surgeon in finding that somebody is tracking it immediately and snatching up a url or product name. There are millions and billions of these going on every day. That does not guarantee if you do a search today that url or product name will be taken are gobbled up somewhere else. People are doing that every day. Search,day. Search, search, search. There are great Small Business tools that will give you alternatives. And if you get to the point where your going to copyright or patent something we have a lot of solutions of the local level and also at the federal level, tips when you are at the juncture what might be involved. Any other tips in terms of folks trying to protect intellectual property your ideas . I agree with all of that. One more thing. Something that is really possible to write something that you think will take off. Limit how much you get that out there. At the university with our research we deal with intellectual property all the time and have lots of disclosures. The bestthe best advices until your ready to move quickly hold it back because once it is out their someone else can grab it up. Thats the last thing i would add, holdback is much as you can. Ican. I would just add, if you find a domain name, and internet name and you find one that is available that you like go get it. A lot of people have good ideas. As unique as you may think it is a lot of people may be thinking about the same thing. A lot of us hold domains associated with things that we do as a protection or because we just have a great idea and wants to hold it because who knows. Any other questions . A couple down here. We will try to get a couple of these in here. Speak up. How many of your companys have been hacked, compromised in the past three to five years . Piraeus forever. What is the 1st one or two . How do you feel that that . Intrusion, every university, like a lot of big concept, peopleconstant, people are constantly trying to hack into the networks and do malicious things. And so we have a large staff that handles Cyber Security and very aggressive policies changing passwords, things like that. But even beyond the university itself, for example, benefits or through anthem, and infamous act. A lot of people do classified research for example. The federal government clearance process was hacked into. A lot of times ill have different monetary staff because of all these different things. So whether it is target of the federal government or health benefits, this happens all the time. The general advice, the higher levels of authentication when you get on the internet and are doing things online. A lot of people were getting caught fishing scams. Let people know, let them know that there is a phishing scam. That is a good policy for any employer. If someone is accidentally downloaded the worst thing that can happen is they are afraid to tell you because the longer that since the more your company is in danger. We have a policy if anyone suspects anything you have to let us no right away. Very going to act on it and protect as many people as we can. In employee that inadvertently downloaded something for notice theres a problem and sits on it too long. Just looking at this from aa little bit different perspective, a lot of times my colleagues will come to me to say do we have a number because they have to do a victim notification. For a web site and that led to a vulnerability that was actually across the whole web at this particular open source system had that hackers were using and they use their web site to put out, to direct people to malware and other kinds of things that we did do a notification we posted a blog about what happen our web site to let people know that if it issues they should change passwords. Its not always about data. Sometimes they could hear web site being hacked or compromise. It could be used for other purposes and used to redirect people to places that i want to go so they can happen in a lot of different ways. The important pieces we are Getting Better at telling people what is happen. In the old days it was like a data breach the first thing you do is dont tell people. Now you are like tell people so thats a good change. I think we have another question right here. Maybe this will be the last one and we will have closing remarks. I wondered if you see twofactor identification being compromised . And information about twofactor compromise . I dont know unless you know from the education. Im not aware of that since we have gone to the twofactor we havent had any realms with peoples accounting compromise. That was the requirements worst drawn passwords and sending something out through your phone or phone record in that sort of thing is really worked very well so i think thats really a really important thing to do and once you do that you still have the other vulnerabilities that we just talked about. At least in. Set the universities. I mean if we had superduper cybersecurity im sure someone would say that twofactor could be hacked. There is no such thing as perfect security so lets remember that. Someone said that earlier in the day today theres no such thing as perfect security. In the current world, right, you have people who are using to factor in people that arent and lets just say the bad guys are opportunistic and theyre always going to go to the lowest hanging fruit so if i got a million compromised accounts and 800,000 of the minority have their login and passwords in the other 200,000 have multifactor up and occasion to make it harder for me to get it to guess which 800,000 going to first in this environment we are in right now. Hopefully but as time goes on im sure there will be efforts by the bad guys to break any system that we put in place and well have to keep increasing the ability to make these systems more secure. So with that said does anybody have any last thoughts or resource that might be helpful to them and we will start from that end and work towards here. Thank you for inviting us to be here and thank you for everyone is joining us. This is a very important topic and is not going to go away and its growing so we are taking baby steps to take on a huge challenge. The work that im most proud of his bbd. Orcs because we share information with the ftc and the fcc and reports that are recorded we make sure no personal information is available scammed we know people are embarrassed. Nothing about you will come out, just about the scam and we share a lot of our data so a lot of these web sites and the sources here are often linked and i would do a little plug that though we are talking about cyber in the internet there are great materials upfront so please take an oldfashioned copy and read it and you can view the same information on line but there are great resources from everybody here. In closing i would just say if any of you are interested in learning more about the Educational Programs that we are doing our web site gnu. Edu has links that will lead you to a lot of what we are doing and cybersecurity. The one thing i didnt mention as a Research University we do have the experts to do research and some of them are sitting out in the audience right now. We are also trying to really do the Research Work with industry and the federal government to stay one step ahead or maybe stay two steps ahead. Five steps ahead. Right and we are doing really Creative Things and we are getting a lot of support from all of our partners and the universities all working together well. Just as an example this is rapidly rapidly changing and brandnew and years ago there werent very many cybersecurity programs another hundreds and in five more years there will be a lot more than that so we are also working with different groups to set standards and common outcomes for programs in that way we can go and and get accreditation and those sorts of issues so as a rapidly changing area and we want to create opportunity and again as a University Educator we encourage our own people as a career opportunity. I too would encourage you to look into it as a potential venue to find more Resources Available to you as well. I echo my college statements my colleague statements. You will see a lot of links to each other to afford you the opportunities opportunity to get the information to help you detect yourself. A reminder as b. A. Ghafour sba. Gov. Gov on social media. Punch in your zip code to find a local resource or use these Digital Tools that will provide. If you have something you really like from a Small Business perspective and you dont see it on our web site feel free to email me jack back at sba. Gov. Happy to find the material that fits better for us best for Small Business owners. Send me a note and we will get a process and toward digital team that go to our web site and a workshop at a library or university or better peers Better Business bureau. Lets give a and to the panel. [applause] thank you aujali spirit of great lively conversation with a lot of experts appear that i want to thank our partners and made it possible infragard, bbd, google, george mason and being here at the Arlington Public Library has been a great honor today to the do that. I want to thank all of you for coming and please take the time to do one or two things to make yourself a little bit safer on line and remember you will make the internet better for all of us. Certainly have a great day and thanks again. [applause] the Republican Party has been beaten in the 1892 election. Grover cleveland would come into office and mckinley has seen a country descend into a deep depression and the republicans think the election of 1896 is going to be there is and he wants to be the nominee buddies by these not the frontrunner. Hes not be favorite of the party bosses. Host now on cspan we want to introduce you to john watters who runs a Company Called isight partners. Mr. Watters what is isight . Guest its a Cyber Company to protect against the cyber guys. Host when you say cyber thread what kind of cyber thats a looking for. Guest they call into three categories. Cyber criminals after financial ovation hactivist trying to pursue an ideological goal for disruption or brain damage or individual damage at some point in time and their cyberespionage operators that are trying to get it an advantage to advantage their own business or industry. Host do you look at all three of those categories . Guest thats correct. Host what kind of clients do have . Guest when rewritten a starter was government Financial Services. It was the most targeted. Where is everybody going after where where where the bank is or usually cyber rhyme or some government orders espionage events. Last three or four years business has expanded dramatically to cover everything from telecom to retail to industrial manufacturing, energy and follow the hack. It used to be limited to Financial Services they have had about and the Health Care Breaches and then the sony breaches so its expanded dramatically across all sectors. Host do you work with the federal government . Guest yes, they are a client. Host there are clients. Is this consulting or do you do the actual investigation . Guest then adjusting business. Investigation, something happened and try to figure out whos behind it now that did it. We start off when he decides that we sell annual subscription to our cyber thread Intelligence Research so that research is conducted without a task to the customers. They say im concerned about Cyber Threats in my enterprise so we build an intelligence collection plan and hear the threats irrelevant with an abc company are xyz Government Agency that would cause much damage. We task the Research Teams around the world from 20 different countries. Go look for a thread in the Development Cycle people Building Tools and capable infrastructure targets as they would pose a threat to our customers. We then analyze the threats in a thread Fusion Center in chantilly where