INTERNATIONAL FOUNDATION FORCULTURAL PROPERTY PROTECTION
News
Reposted from The Art Newspaper
Environmental activists defaced the Louvre pyramid on 27 October, covering the landmark glass monument with orange paint. Protestors from the Dernière Rénovation group threw balloons at the famous glass structure while one of the demonstrators climbed up the edge of the pyramid; according to the Telegraph, a dozen people were arrested following the incident.
A Louvre spokesperson confirmed to The Art Newspaper that the activists attempted to cover the pyramid, the museum’s main entrance, with an orange liquid. “One of them climbed onto the pyramid's outer glass roof using climbing equipment. The liquid was sprayed onto the glass; traces are visible on the [structure]. No damage to the pyramid has been reported at this stage. Visitor access to the museum was maintained throughout the operation,” the spokesperson adds.
The website of Dernière Rénovation says that humanity has just “513 days left” until societal collapse (referring to the carbon emissions peak predicted for 2025), adding that: “It is now up to us, ordinary citizens, to enforce the commitments to which our government refuses to comply. It is up to us to enter into civil resistance.” The group is demanding that the French government implements a nationwide plan for the thermal insulation of buildings.
The glass pyramid, designed by the Chinese-American architect I.M. Pei, was inaugurated by the then French president François Mitterrand on 4 March 1989 after years of vitriolic debate—unheard in Paris since the early days of the “useless and monstrous” Eiffel Tower. Supported by a 200-ton steel and aluminum structure, the pyramid is surrounded by water basins and three smaller pyramids.
Reposted from AMM
Save the Date! We're heading to Columbus, OH in 2024!
Join us in one of the fastest growing cities in the Midwest in 2024 - Columbus, Ohio!
With its diverse neighborhoods, thriving food scene, and 30+ museums and galleries, we can't wait to explore Columbus, Ohio, with you next summer.
We'll kick off the conference with a virtual day on Wednesday, July 24, hosted in collaboration with the Ohio Museums Association. Then, we'll gather together in-person at the Hilton Columbus at Easton from July 31-August 3 for sessions and many opportunities to connect with our peers. Of course, we'll also get out and experience Columbus museums!
In the coming weeks, we'll announce this year's conference theme, provide instructions for booking your room at the conference hotel, and open the Call for Proposals. Stay tuned!
Reposted from CISA
Today, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) published “Phishing Guidance, Stopping the Attack Cycle at Phase One” to help organizations reduce likelihood and impact of successful phishing attacks. It provides detailed insight into malicious actor techniques, as well as technical mitigations and best practices to help prevent successful phishing attempts.
A form of social engineering, malicious actors commonly use phishing with the intent to get their targeted victims to visit an illegitimate website or to download malware. To help organizations better understand this activity, this guide categorizes phishing into two common tactics: phishing to obtain login credentials and phishing to deploy malware. It expands upon the two tactics by detailing the techniques frequently used by these actors, such as impersonating supervisors/trusted colleagues, using voice over internet protocol to spoof caller identification, and using publicly available tools to facilitate spear phishing campaigns.
With our NSA, FBI, and MS-ISAC partners, CISA produced this guide to provide practical, actionable steps to reduce the effectiveness of phishing as an initial access vector. Many of the controls described in this guide can be implemented by technology vendors, reducing burden and increasing security at scale.
This guide also recommends software manufacturers incorporate secure by design principals and tactics into their software development practices. The authoring agencies provide several recommendations to mitigate the success of phishing emails reaching users and users interacting with the email.
In addition to the joint guide, CISA published a blog with more information on phishing and this joint guide.
All organizations, from small and medium-sized businesses to software manufacturers, are encouraged to review this joint guide and blog to better understand evolving phishing techniques and implement tailored cybersecurity controls and best practices to reduce the risk of compromise.
The Cybersecurity Infrastructure Security Agency (CISA) is pleased to formally announce next steps of an important effort to update the National Cyber Incident Response Plan (NCIRP). As directed by the White House, in the 2023 National Cybersecurity Strategy, CISA will lead the process to update the NCIRP.
As set forth in the National Cybersecurity Strategy Implementation Plan, CISA, in coordination with the Office of the National Cyber Director (ONCD), will gather input from public and private sector partners– including the federal interagency, Sector Risk Management Agencies, and regulators to incorporate appropriate changes to the NCIRP to make it more modern, agile, and flexible. The updated NCIRP will strengthen existing processes, procedures, and systems to more fully reflect that a “call to one is a call to all.”
First published in 2016, the NCIRP is the Nation’s framework for coordinated response to significant cyber incidents. Since that time, much has changed to both the threat landscape and the cyber defense ecosystem. Through the Joint Cyber Defense Collaborative (JCDC), CISA will work to ensure that the updated NCIRP addresses significant changes in policy and cyber operations since the initial NCIRP was released.
In leading the development of NCIRP 2024, CISA will ensure the work is grounded in the following principles:
The NCIRP 2024 planning initiative is part of the JCDC Planning Agenda, bringing together government and the private sector to execute cyber defense plans that achieve specific risk reduction goals and enable more focused collaboration.
We are committed to remaining transparent about the work being performed throughout this process over the next year and a half and invite the public to follow its progress by visiting The National Cyber Incident Response Plan (NCIRP) or reviewing the fact sheet.
We look forward to the work ahead and are grateful for the willingness of our colleagues across all levels of government, the private sector and civil society to participate in this important process.
Reposted from DHS
WASHINGTON – Today, the Department of Homeland Security (DHS) released the 2024 Homeland Threat Assessment (HTA), which continues to identify a high risk of foreign and domestic terrorism in 2024. The HTA provides the public and the Department’s partners with a detailed report on the most pressing threats to the United States as part of the Biden Administration’s continuing effort to assist them in preparing for, preventing, and responding to the diverse and dynamic threat environment.
Going forward, the annual HTA will serve as the primary mechanism for sharing the terrorism threat level, which has previously been done through the National Terrorism Advisory System (NTAS). The issuance of NTAS advisories will be reserved for situations where DHS needs to alert the public about a specific or imminent terrorist threat or about a change in the terrorism threat level. This shift will provide the public and DHS partners both in-depth annual reports and urgent updates, as needed.
“Sharing information with the public on the threats we face is a vital part of protecting our homeland from today’s evolving security challenges,” said Secretary of Homeland Security Alejandro N. Mayorkas. “The annual Homeland Threat Assessment is a publicly available resource on the most pressing challenges facing the nation. By sharing our analysis of the threat landscape, we will enable our partners across state, local, tribal, and territorial government, along with the private and non-profit sectors, to make better-informed decisions that account for these security challenges.”
Assessments from the 2024 HTA:
Examples of DHS Efforts to Combat Threats Identified in the 2024 HTA:
See Original Post
The Cybersecurity and Infrastructure Security Agency (CISA) is pleased to announce the release of a new resource titled, Security Planning Workbook, which can assist critical infrastructure owners and operators with developing a foundational security plan. This workbook is designed to be flexible and scalable to suit the needs of most facilities. It is intended for any individual who is involved with an organization’s security planning efforts, including those with varying degrees of security expertise, who are charged with the safety and security of facilities and people. This product also provides descriptions of critical elements of security planning information, offers a multitude of resources, and includes fillable fields to guide stakeholder efforts.
Today, the Cybersecurity and Infrastructure Security Agency (CISA) is pleased to release a new resource, Protecting Houses of Worship: Perimeter Security Considerations Infographic. This product is a companion piece to the CISA and Federal Bureau of Investigation (FBI) co-branded Protecting Places of Worship: Six Steps to Enhance Security Fact Sheet. The infographic provides Houses of Worship stakeholders with low- to no-cost protective measures to enhance physical security. It also highlights grants and resources available to assist houses of worship in conducting vulnerability assessments, developing and updating security strategies and plans, bolstering physical security, and minimizing the impact of a potential attack.
On September 28, the Cybersecurity and Infrastructure Security Agency (CISA) kicked off the 20th Cybersecurity Awareness Month. In tandem, CISA also launched a new, enduring cybersecurity awareness program known as “Secure Our World.” The Secure Our World program promotes behavioral change in all Americans, with a particular focus on how individuals, families and small to medium-sized businesses can Secure Our World by focusing on four critical actions: using strong passwords and a password manager, turning on multifactor authentication (MFA), recognizing and reporting phishing, and updating software. It also asks technology manufacturers to Secure our Products by designing products that are cybersecure right out of the box. Secure Our World is the theme for this year’s Cybersecurity Awareness Month and will remain the enduring theme for future awareness month campaigns.
This October and year-round, CISA challenges everyone to help secure our
· Use strong passwords that are long, random, and unique to each account, and use a password manager to generate them and to save them.
· Turn on multifactor authentication on all accounts that offer it. We need more than a password on our most important accounts, like email, social media, and financial accounts.
· Recognize and report phishing, as we like to say, think before you click. Be cautious of unsolicited emails or texts or calls asking you for personal information, and don't click on links or open attachments from unknown sources.
· Update software. In fact, enable automatic updates on software so the latest security patches keep devices we are connected to continuously up to date.
world by adopting four simple steps that everyone can take to stay safe online:
· For individuals and families, the Secure Our World program emphasizes the importance of securing personal accounts, offering guidance on personal device safety, safe internet browsing practices, social media usage, and protecting personal information online.
· Small and medium-sized businesses (SMBs) face unique challenges, so we are working to help them Secure Our World by offering tools and resources that can help keep their businesses, employees, customers and, ultimately, our communities safer.
· Tech manufacturers can Secure Our World by implementing security features built-in by design. Default settings should have the highest security measures implemented, and individuals can manually bypass security features if they don’t want them. Users should not have to opt-in to necessary security measures to make their products safe to use. Products should be safe for end users right out of the box.
By committing to safe online behaviors, we can easily minimize or prevent cybercriminals and hackers from infiltrating our devices and online accounts.
Today, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Emergency Management Agency (FEMA) announced the opening of the application process for the Tribal Cybersecurity Grant Program (TCGP) to help tribal governments address cybersecurity risks and threats. The cyber grant program, established by the State and Local Cybersecurity Improvement Act as part of the Bipartisan Infrastructure Law, helps address the unique challenges tribal governments face when defending against cyber threats.
Digital threats impacting Native American and Alaska Native tribes are increasing and becoming more complex. Tribal sovereignty creates unique cybersecurity challenges for these groups that often lack or can’t easily access resources needed to address them.
Today, CISA and the National Security Agency (NSA) published Identity and Access Management: Developer and Vendor Challenges, authored by the Enduring Security Framework (ESF), a CISA- and NSA-led working panel that includes a public-private cross-sector partnership. ESF aims to address risks that threaten critical infrastructure and national security systems.
This publication, which follows ESF's Identity and Access Management Recommended Best Practices Guide for Administrators, assesses and addresses challenges developers and technology manufacturers face in identity and access management (IAM). The guidance specifically addresses technology gaps that limit the adoption and secure employment of multifactor authentication (MFA) and single sign-on (SSO) technologies within organizations.
Although the publication primarily addresses challenges facing large organizations, it also provides recommendations applicable to smaller organizations. CISA encourages cybersecurity defenders to review this guidance and to speak to their software vendors about implementing its recommendations.
QUICK LINKS
ConferenceMembershipTraining & CertificationDonate to IFCPP
TRAINING & EVENTS
1305 Krameria, Unit H-129, Denver, CO 80220 Local: 303.322.9667 Copyright © 1999 International Foundation for Cultural Property Protection. All Rights Reserved
Contact Us