Cyber Security Industry Alliance Newsletter • Volume 1, Number 10 • June 2005

CSIA in the News

Article of Interest

Datamation, May 13, 2005
Home Users: IT's Cross to Bear
Home access to the corporate enterprise is on the rise, according to industry watchers. Gridlocked highways, skyrocketing fuel costs, and the desire for a better work/home life balance have employees clamoring to telecommute. This sea change could mean big headaches for IT managers who are caught unprepared.

Chris Hernandez, senior network engineer at Holtzbrinck Publishers, LLC, in New York, N.Y., knows this first-hand. A year ago, a lax remote access strategy led to someone transporting a virus onto the corporate network. “It shut us down for a few days,” he says.

“Home users using their own computers pose the biggest risk to the corporation,” says Doug Neal, vice president of product management at iPass, a security software developer in Redwood Shores, Calif. “They are purchasing their own equipment with varying standards. They probably have the worst scenario: They may have no firewalls and use wireless networks. The threats in that environment are broad.“

To adequately deal with the pressure to provide secure home access, IT groups should follow some basic guidelines: have a dedicated security guru managing home access, study what your users need for access before giving them access, develop minimum requirements for home computers, enforce the policies you've created, and train and support your users.

Read more...


CSIA Coverage

Washington Internet Daily, May 9, 2005*
Industry Notes
IT experts debated whether industry needs more guidance pertaining to what companies must do to comply with Sec. 404 of the Sarbanes-Oxley Act (SOX), at a meeting hosted by the Cyber Security Industry Alliance (CSIA) last Tues. The group also discussed potentially overlapping regulatory requirements with the other laws and the need to develop sustainable, automated processes to reduce costs and increase efficiency, officials said. CSIA released a report late last year that indicated a lack of available IT security information related to Sec. 404 and while the recent meeting's participants didn't draft formal recommendations, CSIA will release another report in June summarizing the various points of view expressed by executives who attended the conference.
*Subscription required to access full article.

eWeek, May 9, 2005
Tech Wields Its Political Clout
The newest face of the IT industry here, Lezlee Westine, is leaving her job as director of public liaison and deputy assistant to Bush to become CEO of TechNet, a political network of CEOs. TechNet's growing presence here and its placement of a well-connected administration insider at its helm mirror a larger trend in the industry. Having once shunned politicking — in keeping with a West Coast, independent, free-spirited image — IT is fast becoming one of the country's highest-profile groups seeking to influence Capitol Hill, the White House and federal agencies. But as its power grows, the IT lobby increasingly looks out for its parochial interests — often at the expense of users, experts say. TechNet is not alone in turning to Bush administration insiders to lead the lobbying charge. The Cyber Security Industry Alliance, in Arlington, Va., joined the crowded field of IT lobbying a year ago with Paul Kurtz, former special assistant to President Bush, at its helm. With Republicans retaining control of the White House and Congress, Beltway observers say that hiring administration insiders is the most pragmatic way to get things done. The organizations, however, generally insist that the insider is simply the most qualified candidate for the job.

eWeek, May 9, 2005
IT Lobbies for Cyber-Security
The swelling sum spent by the tech industry in Washington results not only from organizations boosting expenditures in recent years but also from the arrival of a new IT lobbying subset — cyber-security. In October 2001, shortly after the Sept. 11 terrorist attacks, several network security companies registered on Capitol Hill for the first time, including SecureInfo Corp., of San Antonio; Symantec Corp., of Cupertino, Calif.; and SecureLogix Corp., also of San Antonio.

Since then, many other cyber-security companies joined the growing lobbying ranks, including Internet Security Systems Inc., of Atlanta; CyberGuard Corp., of Deerfield Beach, Fla.; and iDefense Inc., of Reston, Va. These companies provide a snapshot of the path emerging businesses often take in establishing a voice on public policy.

Last year, several network security companies came together to form the Cyber Security Industry Alliance, hiring Paul Kurtz, former special assistant to President George W. Bush, to serve as executive director. With more than 20 federal bills pending that have something to do with cyber-security — from spyware, phishing and ID theft to accelerating broadband deployment and creating a position for an assistant secretary for cyber-security — those in the industry are battling to ensure that new laws do not leave them at risk. “We will probably have a number of bills passed that deal with these issues individually,” Kurtz said in a recent interview. “Without a doubt, there is a need for an individual voice on security.”

Federal lobbying can ensure that a company's voice is heard not only on Capitol Hill, where laws are made, but also throughout the government, where policies are implemented and products bought. Since arriving on the scene during the last few years, cyber-security companies have expanded their reach to every corner of the U.S. government.

CIO Asia, May 10, 2005
Why George Bush Needs a Technology Czar
A comprehensive policy on technology innovation has never ranked high on the federal government's agenda. And now, as we approach the 100-day mark of the second Bush administration, it looks like we're in for more of the same.

It is an oversight that could have grave consequences for the country, many technology policy experts and CIOs say. In January, the National Intelligence Council, a high-level CIA think tank, released a report concluding that "signs are ominous" that the United States' position as the world's technology innovation leader may be severely weakened by China and India in the next 15 years.

At present, there is no one person thinking about how these issues relate to one another. Paul Kurtz, who served in the White House as senior director for national security for the Office of Cyberspace Security during the first George W. Bush administration and is now head of the Cyber Security Industry Alliance, adds that, “having a more powerful individual to look at technology policy issues across agencies would be incredibly helpful.” When a technology matures to the point that it requires policy setting, it is squeezed into the agency that seems like the best fit. Thus, seemingly related issues are treated piecemeal. For example, DHS protects against viruses and hacks, the FTC regulates spam and the Justice Department sets policy for online identity theft. “Individual agencies' jurisdiction does not give them the ability to effectively manage a cross-cutting issue like technology,” says Kurtz.

Converge! Network Digest, May 10, 2005
Industry Alliance Focuses on VoIP Security
The Cyber Security Industry Alliance (CSIA) issued a report that recommends Congress consider cyber security issues facing VoIP as it looks to revise the Telecommunications Act of 1996. The report warns that the same qualities that make VoIP such a valuable new option for mass-market voice communications also can lead to quality of service and performance issues, including denial of service attacks, Spam over IP Telephony (SPIT), session eavesdropping and voicemail hijacking. The CSIA believes an extra layer of security infrastructure can help resolve some of these issues, but not all of them.

The CSIA also warns of the fallout from a major VoIP attack on other areas of national security, emergency preparedness and Internet fraud/criminal activity. VoIP vulnerabilities could also act as entry points for attacks on the rest of the network, including non-VoIP applications, systems and infrastructures.

CSIA concludes that cyber security for VoIP is essential for the protection of the entire information technology ecosphere and asks that Congress consider several recommendations for securing VoIP technologies, including supporting research & development aimed at improving the security and reliability of VoIP as well as defining roles and responsibilities for agencies such as the Department of Homeland Security, the FCC and the Department of Defense.

Technology Daily, May 10, 2005*
Security
The Cyber Security Industry Alliance (CSIA) released a report Tuesday that recommends Congress examine the security risks facing voice-over-Internet protocol (VoIP) as it revises the 1996 Telecommunications Act. The report says that the use of VoIP can expose consumers to unsolicited e-mail known as spam, eavesdropping and voicemail hijacking. It also stressed the problems VoIP poses for first responders and emergency services. For example, some VoIP customers are not automatically provided with 911 service. “While the promise of IP telephony is economical for many organizations, cyber security issues cannot be ignored,” said Paul Kurtz, CSIA's executive director. “Because IP telephony depends solely on the Internet for operating, it is subject to all the same vulnerabilities that our corporate networks face.” CSIA also announced it is co-hosting a VoIP security workshop on June 1 and June 2 in Washington to further explore the issues surrounding VoIP security.
*Subscription required to access full article.

TR Daily, May 10, 2005*
Cybersecurity Group Recommends Act Rewrite Address VoIP Security Issues
The Cyber Security Industry Alliance today issued a report recommending that Congress address voice-over-Internet protocol (VoIP) security issues as it aims to overhaul the Telecommunications Act of 1996. The group said it was imperative to address those issues because a VoIP cyberattack “could lead to serious consequences, such as loss of public access to critical emergency services” like “911” service. “While the promise of IP telephony is economical for many organizations, cyber security issues cannot be ignored,” said Paul Kurtz, executive director of CSIA. “Because IP telephony depends solely on the Internet for operating, it is subject to all the same vulnerabilities that our corporate networks face. As Congress considers revisiting the Telecommunications Act of 1996, CSIA strongly recommends that the serious implications of VoIP cyber attacks be addressed since they can affect critical government services such as 911 and other emergency first responder services.”
*Subscription required to access full article.

ZDNet, May 10, 2005
Cyber Security Group: six reasons why VoIP is vulnerable
This morning, the Cyber Security Industry Alliance (CSIA) released a briefing that strongly presents the case for research and development activities to improve VoIP security. The briefing lists several reasons why VoIP is insecure, as well as the meta-consequences of this insecurity. Recommendations about how to fix these security flaws will be presented at the CSIA's “Workshop on Securing Voice over IP; ‘Harmonizing Technology and Policy,’” to be held in Washington on June 1-2. Because the report seeks to galvanize action on the part of lawmakers and policy makers, the location of the workshop is intentional.

DMNews, May 11, 2005*
Another Congressional Committee Begins Data Hearings
The learning curve continued yesterday as the latest congressional committee to question data providers explored the need for legislation regarding identity theft and data brokers. The Senate Committee on Commerce, Science and Transportation heard testimony from representatives of data providers LexisNexis and ChoicePoint, which have revealed data breaches this year, as well as fellow data provider Acxiom and privacy/security advocates. In his testimony, LexisNexis president/CEO Kurt P. Sanford listed the legislative actions his firm supports. He said the company advocates data security breach notification in cases of substantial risk of harm. The company also called for the adoption of data security safeguards and increased penalties for identity theft and other cyber crimes. ChoicePoint president/COO Douglas C. Curling also testified as to what types of regulation of data brokers his company supports. He said the company favors independent oversight and accountability for those handling personal information; a preemptive federal law requiring notice of data breaches; consumer access to correct public records; and restriction of the display of Social Security numbers. Other panelists included Paul Kurtz, executive director of the Cyber Security Industry Alliance; Marc Rotenberg, president/executive director of the Electronic Privacy Information Center; and Mari Frank of Mari Frank, Esq. & Associates.
*Subscription required to access full article.

Information Week, May 11, 2005*
Alliance Asks Congress To Consider VoIP Vulnerabilities In Updated Telecom Act
The Cyber Security Industry Alliance (CSIA) has called on Congress to include security recommendations related to securing voice over IP (VoIP) technologies as it reviews the 1996 Telecommunications Act. According to the CSIA, the pervasiveness of IP-based communication and networking technologies, particularly VoIP, has made the task of protecting security and integrity of the Internet a national priority. “Because IP telephony depends solely on the Internet for operating, it is subject to all the same vulnerabilities that our corporate networks face,” CSIA executive director Paul Kurtz said in a statement. “As Congress considers revisiting the Telecommunications Act of 1996, CSIA strongly recommends that the serious implications of VoIP cyber attacks be addressed since they can affect critical government services such as 911 and other emergency first responder services.” Among other things, the Alliance has made a number of recommendations for securing VoIP, and has asked Congress to provide support for research into and development of new security technologies. The CSIA, together with the University of North Texas and George Mason University also announced a conference on “Securing Voice Over IP” to be held in Washington, D.C. on June 1 and 2.
*Also ran in CRN and Security Pipeline.

Washington Internet Daily, May 11, 2005*
Data Brokers, Consumer Advocates Push for Privacy Protection
The need for a legislative crackdown on identity theft cannot be overstated, industry and privacy representatives told the Senate Commerce Committee Tues. Several witnesses said notification laws, like 2004's pioneering California statute, don't go far enough, so stricter regulation and accountability for industry are needed. They urged tougher penalties for “fraudsters” convicted of stealing consumers' personally identifiable information. Congress should “take a holistic approach,” said the Cyber Security Industry Alliance (CSIA). Bills in the House and Senate take on spyware, phishing and data warehouse security, but only individually, even though all of these fall into the larger category of threats to consumers' sensitive information, CSIA Exec. Dir. Paul Kurtz said. He told lawmakers to ensure that any new measures harmonize with existing laws, “filling gaps rather than duplicating requirements.” A federal law would prevent a patchwork of confusing state laws and complex compliance issues, Kurtz said, noting that more than 300 ID theft bills are pending around the U.S.. Executives for Choicepoint, Acxiom and Lexis Nexis -- all burned by high-profile data breaches — concurred on the need for a U.S. law.
*Subscription required to access full article.

Computer Business Review, May 12, 2005
VoIP security test bed, policy in the works
CSIA this week asked Congress to include security recommendations for VoIP as it revises the 1996 Telecommunications Act. The group also said that key VoIP companies and researchers will meet next month to plan a national “honey pot” VoIP security test bed to begin to address some of their concerns. “Some of the same problems we see on data networks, we're going to see on voice networks,” said Paul Kurtz, CSIA executive director, “And they will even be more complicated because some of the security tools we use on data networks are not as easily applicable on voice networks.”

A major VoIP attack, which has not yet happened, could disable critical infrastructure and cripple VoIP-based emergency systems, Kurtz said. Too little is known about VoIP security today to make specific policy recommendations to Congress yet, Kurtz said. But the CSIA will hold an event next month, out of which Kurtz expects will come some recommendations. By submitting a detailed report to Congress on the issue, Kurtz said CSIA is trying to “raise the level of understanding and awareness for VoIP reliability and security issues before we get into a situation where we have large scale attacks.” Kurtz said CSIA has invited the Federal Communications Commission to next month's event. Representatives from the Department of Homeland Security and the Department of Defense will attend.

AXcess News, May 13, 2005
Senator says now he understands impact of identity theft
The Senate Committee on Commerce, Science and Transportation held one of several planned hearings Tuesday on identity theft and data brokers to discuss recent data breaches and ways to prevent them. The hearings are being held to come up with legislation to tighten the use of Social Security numbers and improve cyber security. ChoicePoint and LexisNexis executives testified, along with a representative of smaller companies that collect data about people and sell it - supposedly to legitimate businesses. Kurt P. Sanford, president LexisNexis' U.S. corporate and federal markets, said that, although his company has made substantial changes in business practices since the breaches, the company supports legislation that would offer a greater protection over consumers' identities. “Technical provisions for security are aimed to thwart unauthorized access to personally identifiable information,” said Paul B. Kurtz, executive director of the Cyber Security Industry Alliance. “Whether by electronic hackers who break in by securing a legitimate password, or by in-person fraud,” Kurtz said. “Technical provisions are only as strong as the security policy which implements them.

CRN, May 13, 2005
Networking this Week: All Cisco, All The Time
No matter where you turned this week, there was Cisco: A whopper of a product announcement, solid quarterly earnings, and the arrest of a hacker who had stolen its source code. There was plenty of other news this week as well, including some eye-opening surveys. A Harris Interactive survey found that over half online adults said they had broadband access at home, compared to 37 percent in December of 2003. Naturally, there was also plenty of VoIP news. VoIP heavyweight Vonage raised another $200 million in financing, ringing the total investment in the company to $408 million. EMarketer Inc. said that this was the year that VoIP would hit the mainstream, with the growing use of broadband by U.S. households being a key driver. And the Cyber Security Industry Alliance (CSIA) called on Congress to include security recommendations related to securing voice over IP (VoIP) technologies as it reviews the 1996 Telecommunications Act.

Network World, May 13, 2005*
IT managers are ringing up VoIP
IT managers have phoned home with their interest in VoIP. According to Infonetics Research, North American VoIP service revenue rang up $1.3 billion in 2004. Sales are expected to continue ringing up to $19.9 billion in 2009, according to the report. Already VoIP can claim some fairly big wins. Cisco is working with integrator Prime Business Solutions to deploy 8,500 Cisco IP phones to British Airways staff at its U.K. offices and airports. The British Airways installation is just one more sign of the growing interest in VoIP. “IT managers are very interested in VoIP and companies are starting to integrate more and more VoIP solutions into their products at all levels,” said Zeus Kerravala, Yankee Group enterprise infrastructure vice president. While there is little doubt VoIP is going mainstream, plenty of issues remain to be solved for the technology. One of the key issues is security. The Cyber Security Industry Alliance recently asked Congress to include security recommendations for VoIP as it revises the 1996 Telecommunications Act, and the group is planning a national VoIP security test bed to address some security concerns.
*Also appeared in InfoWorld.

Information Week, May 16, 2005
Security Flurry
On the upside, Novell took steps to tighten up its Linux operating system, Microsoft unveiled a service for ad hoc security guidance, and Swedish cops caught the suspected Cisco code thief. Somewhere in the middle is the Cyber Security Industry Alliance, warning Congress to get serious about VoIP security.

Information Week, May 16, 2005
Telco Act Needs VoIP Security
The Cyber Security Industry Alliance has called on Congress to include recommendations related to securing voice-over-IP technologies as it reviews the 1996 Telecommunications Act. The pervasiveness of IP-based communication and networking technologies, particularly VoIP, has made the security and integrity of the Internet a national priority, according to the alliance. Voice applications over the Internet are vulnerable to many of the same threats as data traffic, including denial-of-service attacks, worms, and viruses, and these threats could cripple the IT-dependent critical infrastructure, disable VoIP-based emergency systems, and weaken the national response capability in the event of attack, the group says. “As Congress considers revisiting the Telecommunications Act of 1996, the cybersecurity alliance strongly recommends that the serious implications of VoIP cyberattacks be addressed since they can affect critical government services such as 911 and other emergency first-responder services,” executive director Paul Kurtz said in a statement. The alliance has made a number of recommendations for securing VoIP and has asked Congress to provide support for research into and development of security technologies.

Computerworld, May 17, 2005
U.S. House to debate new cybersecurity post
The U.S. House of Representatives is scheduled to begin debate tomorrow on H.R. 285, a bill that would create the post of assistant secretary for cybersecurity, according to a spokeswoman for Rep. Christopher Cox (R-Calif.), chairman of the House Committee on Homeland Security. The post is part of more extensive homeland security legislation, the spokeswoman said. Last month, Paul Kurtz, executive director of the Cyber Security Industry Alliance (CSIA), a CEO-led public policy and advocacy group, testified in support of the assistant secretary's position on behalf of the CSIA and the Business Software Alliance before the House Subcommittee on Economic Security, Infrastructure Protection and Cybersecurity. “We are seeing increased threats and vulnerabilities associated with our information infrastructure. We rely upon our information infrastructure, yet there is no one clearly in charge of coordinating its security and reliability,” Kurtz said. “The department's responsibilities to identify critical information infrastructure [and] develop emergency communications, contingency and reconstitution plans are compelling, yet the leadership is not.”

Government Technology, May 17, 2005
Workshop on Securing VoIP in Washington, D.C. June 1st and 2nd
The Cybersecurity Industry Alliance and tekVizion are co-sponsoring the 2nd Workshop on Securing Voice over IP to be held June 1st and 2nd in Washington, D.C. The workshop aims to engage government stakeholders, academic researchers and industry leaders in discussions about the technical challenges and implications to policy and law of securing VoIP networks. Organizers hope to leave the conference with an action plan to provide more research into the issues identified, including a plan to develop a nationwide research network. The network would be used by universities and others to develop and test new techniques and algorithms for preventing, identifying, tracing, isolating and recovering from attacks on VoIP networks.

“IP-enabled technologies such as VoIP hold enormous promise for government and enterprise organizations. As we look to take advantage of the many benefits of IP communications, it is important that we also proactively address challenges associated with secure and reliable deployment of VoIP given the importance of our telecommunications networks to our economy and our homeland security,” said Paul B. Kurtz, executive director of the Cyber Security Industry Alliance.

Government Computer News, May 18, 2005
Panel: Government leadership in IT security is lacking
A panel of government and industry representatives on Wednesday agreed that the government has not provided adequate leadership for the nation's cybersecurity, but that is just about all they agreed on. “We are all frustrated at the pace at which the government has been reacting to this,” said Rep. Tom Davis (R-Va.), who has taken a lead in IT issues in Congress. There was no agreement on where government responsibility for shepherding the nation through IT vulnerabilities should lie, however. Paul B. Kurtz, former presidential adviser and now executive director of the Cyber Security Industry Alliance, said that government and private-sector security are different jobs that should be spearheaded by different officials. The White House and OMB should oversee government security, Kurtz said, while responsibility for the rest of the critical infrastructure “largely rests with the Homeland Security Department.”

National Journal's Technology Daily, May 18, 2005*
Lawmakers offer divergent views on promoting cybersecurity
Two House lawmakers Wednesday offered divergent views on how the federal government can best promote cybersecurity. Rep. Zoe Lofgren, D-Calif., expressed support for creating an assistant secretary for cybersecurity at the Department of Homeland Security during a discussion on cybersecurity sponsored by George Mason University's Critical Infrastructure Protection Program. Lofgren, who sponsored a bill, H.R. 285, that would create such a position, said the issue of cyber security within the department “needs to be elevated.”

Although House Government Reform Committee Chairman Tom Davis, R-Va., agreed that more must be done by the federal government in the area of cybersecurity, he disagreed that the creation of the assistant secretary post would be the best route to go. Paul Kurtz, executive director of the Virginia-based Cyber Security Industry Alliance, also disagreed with adding such a reporting requirement, saying that more time should be given to allow companies to abide by the 2002 Sarbanes-Oxley law, which mandates stricter accounting requirements for firms.
*Also appeared in GovExec.

Network Computing's Security Pipeline, May 18, 2005
All The Rage: Look Who's Lobbying
Yet another lobbying group is taking shape: the CSIA (Cyber Security Industry Alliance). This is a sign of maturity for the security arena. Every industry that has matured to the point of having an impact on our society becomes a target for legislative action. But who will benefit or suffer from security legislation? Not the security vendors that make up the CSIA, but rather the companies — yours — subject to security events. In other words, the wrong set of players is rallying to “inform and educate” Washington.

Usually, legislation directed toward corporations is intended to protect consumers. In the case of security legislation, it's arguable that technology- consuming companies are the most affected. If the federal government, for example, required E-Stamps to curb spam, this policy would have a significant impact on every small business that runs its own mail server, to the extent that many companies could no longer afford to send legitimate e-mail.

The Internet Security Alliance, a group that aims to identify and standardize best practices in Internet security and network survivability, represents the concerns of technology users who are impacted by security defects in technology. It has the backing of the security vendor community. But the alliance needs broader participation from the IT community. Bottom line: The greater effort in Washington has to come from us.

InformationWeek, May 19, 2005*
House Elevates Cyber Czar Position
The House late Wednesday passed a $34 billion budget for the Department of Homeland Security that among its provisions, would elevate the nation's head cybersecurity official to Assistant Secretary status, a move that's been urged by security industry leaders for almost a year.

Among the bill's provisions is one that would elevate the head of the National Cyber Security Davison (NCSD) to Assistant Secretary level. In December, the Cyber Security Industry Alliance (CSIA), a policy and advocacy group composed of big names in the security trade such as Symantec, McAfee, RSA Security, Check Point, and Internet Security Systems, urged the Bush administration to push the position to Assistant Secretary status. “This is a very positive development,” said Paul Kurtz, the executive director of the CSIA.

“We need an individual with greater authority to set programs and priorities and strategies on how we address cybersecurity,” said Kurtz. “Unfortunately, cybersecurity has taken a back seat to the physical protection issues in Homeland Security. That's not to eclipse physical protection, but by elevating the position to Assistant Secretary, the government's acknowledging that the job of defending and protecting information technologies and networks is important in a world where threats are rapidly evolving.” The title change, said Kurtz, would also help entice leaders in industry or government security to actively lobby for the job, since the position would have more power and authority, and “be held more accountable on the issues,” said Kurtz.
*Also appeared in TechWeb and Security Pipeline.

Reuters, May 19, 2005*
House votes to give cyber chief more clout
The government's top computer security official would have more authority to shore up the nation's technology defenses under a measure passed by the House late Wednesday. The measure would promote the head of the National Cyber Security Division up one level within the Department of Homeland Security, a move backed by computer industry officials who say the government does not devote enough attention to online threats. The proposal was included within a larger spending bill for the Homeland Security Department that passed by a 424-4 vote.

If the measure becomes law, the 60-person computer security office would no longer be subordinate to the division that oversees efforts to protect power plants, water-treatment systems and other critical infrastructure. The computer security director would instead report to the undersecretary for information analysis and infrastructure protection, one step below Homeland Security Secretary Michael Chertoff. “From a private-sector point of view, we're missing that chief, we're missing that quarterback” to coordinate government and private-sector security efforts, said Paul Kurtz, a former White House official who now heads the Cyber Security Industry Alliance.
*Also appeared in ABC News, MSNBC and The Washington Post.

Computerworld, May 23, 2005
Tech Features: Security Log
VoIP Security Workshop in D.C.
The Cyber Security Industry Alliance is hosting a workshop in Washington on June 1-2 on securing voice-over-IP installations. Topics include VoIP security deployment, VoIP security requirements and 1996 Telecommunications Act reform. You can register at http://pfidc.com/voip. The workshop is free for government employees and $195 for all others.