In This Issue: Finance & Legal Edition. Voice. Cybersecurity Developments Raise Growing Regulatory Concerns For Undersea Cable Industry

Size: px
Start display at page:

Download "In This Issue: Finance & Legal Edition. Voice. Cybersecurity Developments Raise Growing Regulatory Concerns For Undersea Cable Industry"

Transcription

1 Voice of the Industry 69 m a r 2013 ISSN Finance & Legal Edition In This Issue: Cybersecurity Developments Raise Growing Regulatory Concerns For Undersea Cable Industry Current Legal Trends And Contract Issues For Data Center Development And Leasing Eating A Cable: Internet Access Still Elusive In Cuba

2 In This Issue... Exordium Wayne Nielsen News Now 5 Cybersecurity Developments Raise Growing Regulatory Concerns For Undersea Cable Industry Kent Bressie & Madeleine Findley 3 8 Eating A Cable: Internet Access Still Elusive In Cuba Yoani Sanchez Advancements of Plough Technology Dr. Paul Davison Financing A Submarine Cable System Jim Lemberg Advertiser Index 45 Coda Kevin G. Summers 46 Current Legal Trends And Contract Issues For Data Center Development And Leasing Andrew D. Lipman 18 Back Reflection Stewart Ash 42 Conferences 44 4

3 Cybersecurity Developments Raise Growing Regulatory Concerns For Undersea Cable Industry 8 Kent Bressie & Madeleine Findley

4 For the past decade or so, the U.S. Government has escalated its oversight of infrastructure security and information security of undersea cable systems and services. It has designated undersea cables as critical infrastructure, imposed new requirements for initial licensing and mergers and acquisitions, required reporting of deployed equipment, software, outages, and restoration arrangements, and even tried to influence procurements of equipment and software. Most of these initiatives were ad hoc and specific to undersea cables. All of these measures increased the costs of doing business for operators and suppliers. 9 With news of cyberattacks increasingly making front-page headlines, and with many governments already moving to counter such attacks, the United States has now acted to adopt broad cybersecurity measures for U.S. communications infrastructure, including but not specific to undersea cables. These new measures will add to existing regulatory burdens and threaten to create new regulatory uncertainties and tensions in existing commercial relationships. These measures pose a particular risk to undersea cable operators, as neither the undersea cable industry nor many of the agencies that regularly regulate undersea cables are identified expressly as stakeholders or decisionmakers for the development and implementation of those measures. In this article, we describe the U.S. Government s recent cybersecurity initiatives, outline issues of concern for the undersea cable industry, and make some preliminary recommendations for enhancing cable protections while minimizing regulatory burdens. 1. Executive Order and Presidential Policy Directive On February 12, 2013, U.S. President Barack Obama issued a broad Executive Order 1 designed to enhance physical and cybersecurity protections for critical infrastructure. The President also issued a Presidential Policy Directive ( PPD ) 2 to implement the 1. Executive Order No. 13,636, Improving Critical Infrastructure Cybersecurity, 78 Fed. Reg. 11,739 (Feb. 19, 2013). 2. Presidential Policy Directive/PPD-21, Critical Infrastructure Security and Resilience (Feb. 12, 2013),

5 WASHINGTON, DC - JANUARY 25: U.S. President Barack Obama addresses a Joint Session of Congress while delivering his State of the Union speech January 25, 2011 in Washington, DC. During his speech Obama was expected to focus on the U.S. economy and increasing education and infrastructure funding while proposing a three-year partial freeze of domestic programs and $78 billion in military spending cuts. (Photo by Chip Somodevilla) 10 Executive Order. The PPD provides for increased coordination between government and industry regarding physical and cyber security, and resilience of critical infrastructure, noting, in particular, the vital role that communications networks play in such infrastructure. The Executive Order and PPD define critical infrastructure as systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters. This definition clearly encompasses undersea cable systems, although neither the Executive Order nor the PPD references them specifically. The Obama Administration has long contemplated issuing an Executive Order and PPD due to concerns about cyber risks and Congress inability to enact comprehensive cybersecurity legislation. This Executive Order and PPD create an initial cybersecurity framework, and U.S. regulatory agencies have begun the process of developing and implementing the framework s objectives. The potential for Congressional action still exists and may be increased as a result of the Administration s actions. The Executive Order and PPD direct the Department of Homeland Security ( DHS ) and the National Institute for Standards and Technology ( NIST ) to, among other things: create policies and procedures to increase information sharing about cyber threats; develop a Cybersecurity Framework to reduce risk to critical infrastructure; and create a voluntary, incentivesdriven cybersecurity program for critical infrastructure to share threat information with the U.S. Government. The Executive Order and PPD provide little specific information about how DHS and NIST will fulfill their new obligations, or the degree to which they will consult with industry stakeholders in designing the Cybersecurity Framework or cybersecurity information-sharing program. The Executive Order includes the following key provisions: Information Sharing. The Executive Order directs federal government agencies to share unclassified reports of cyber threats with U.S. companies. It also requires DHS to provide classified government cyber threat and technical information to eligible critical infrastructure companies.

6 Framework to Reduce Cyber Risk to Critical Infrastructure. The Executive Order requires NIST to work with industry to develop a set of industry best practices (the Cybersecurity Framework ) to reduce cyber risks to critical infrastructure. A preliminary version of the Cybersecurity Framework is due within 240 days of the Executive Order and a final version within one year. 11 Regulatory Review. The Executive Order directs federal agencies to review their regulations and propose new authority as needed to address current and projected cyber risks to critical infrastructure. The PPD designates DHS as the sector-specific agency for the communications sector, subject to consultations with the FCC. Identifying Critical Infrastructure. Within 150 days, DHS must identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic consequences. DHS must confidentially notify owners and operators of critical infrastructure that they appear on the list, and listed entities will have an opportunity to appeal their identification as high-risk critical infrastructure. The PPD includes the following key provisions: DHS to Take Lead Role. As in the Executive Order, the PPD designates DHS as the primary authority in coordinating the federal government s actions to improve the security of critical infrastructure. The PPD instructs DHS to establish and operate two national critical infrastructure centers one for physical infrastructure and one for cyber infrastructure.

7 12 Directives to FCC. The PPD instructs the FCC to identify communications infrastructure and communications-sector vulnerabilities and to work with industry to address those vulnerabilities. The PPD also instructs the FCC to work with industry to develop best practices to promote the security and resilience of critical communications-sector infrastructure. Because the FCC is an independent regulatory agency, however, the PPD is not binding on the FCC. Information Sharing. The PPD requires all levels of government and critical infrastructure owners and operators to timely exchange information on threats and vulnerabilities, including information that allows for the development of a situational awareness capability during incidents. 2. Issues of Concern to the Undersea Cable Industry The undersea cable industry should be concerned about a number of aspects of the regulatory program established by the Executive Order and PPD. These include: Mismatch Between Decisionmaking Responsibility and Expertise. The regulatory processes established by the Executive Order and PPD could result in inappropriate or overly burdensome regulation because regulatory responsibility for undersea cables is diffuse, and many of the agencies that play a role in regulating undersea cables have not been identified formally as decision-making agencies. The Executive Order and PPD identify DHS as the sector-specific agency responsible for developing and implementing the Cybersecurity Framework and cybersecurity information-sharing program for the communications sector. The PPD directs the Federal Communications Commission ( FCC ) the principal licensing agency for undersea cables landing in the United States pursuant to the Cable Landing License Act of to partner with DHS to the extent legally permitted. But the President and his Administration can only request but not require FCC action, as the FCC is answerable to the Congress as an independent regulatory agency. Even for Executive Branch agencies, however, the processes do not expressly include agencies such as: the U.S. Department of State (which coordinates Executive Branch input on cable landing license applications filed with the FCC and plays a key role in defending undersea cable treaty rights and freedoms from encroachment by other governments); the National Telecommunications and Information Administration; the U.S. Army Corps of Engineers (which authorizes U.S.C ; 47 C.F.R

8 the installation of undersea cables in the navigable waters of the United States and in coastal estuaries pursuant to the Rivers and Harbors Act of 1899 and the Clean Water Act); and the U.S. Navy (which plays a key role in cable protection initiatives and works closely with the State Department in protecting treaty rights and freedoms). Most of these agencies are not even identified as stakeholders in the Executive Order or PPD. Even within DHS, the agency component most versed in undersea cable issues the Office of Policy, which acts for DHS in the Team Telecom process resides in a completely different part of DHS from the National Programs and Protection Directorate, which holds primary responsibility for cybersecurity matters. Mandatory in All but Name. Although the program is supposedly voluntary, the Executive Order requires agencies to report annually on which owners and operators are participating a name and shame provision and encourages agencies to devise incentives to encourage participation. In practice, program participation will be all but mandatory. New Requirements for Sales to Government Customers. The Department of Defense ( DOD ) and the General Services Administration ( GSA ) must also recommend how to incorporate the program into federal procurement processes 13 Absence of Liability Protections. The cybersecurity informationsharing program contains no liability protection for industry. To obtain such protection, the Congress would need to pass legislation.

9 14 further underscoring the essentially mandatory nature of the program. Federal law already requires industry to provide cybersecurity information to GSA and DOD. The Executive Order, however, is likely to increase ongoing reporting obligations for federal contracts and to create new compliance risks. These requirements would apply to capacity sales to U.S. Government agencies, including the Defense Information Systems Agency. Disparate Burden on Infrastructure Owners. The Executive Order creates obligations regarding both physical and virtual or cyber infrastructure, but excludes from its scope commercial information technology products or consumer information technology services. As a result, the Executive Order clearly reaches physical network and infrastructure providers, but may not clearly reach edge, application, and overthe-top providers. Undersea cable owners and operators may find themselves subject to additional regulatory compliance requirements that do not apply equally to customers or end-users, and for which they may be unable to recover costs. The Executive Order thus may complicate commercial arrangements between network or physical infrastructure providers and edge or overthe-top providers, and create ambiguity about cybersecurity obligations and accountability. 3. Initial Implementation Steps by NIST and DHS NIST began preparing for implementation of the Executive Order and PPD long before the White House issued final versions of those documents, thereby underscoring the need for early industry engagement. On February 12, 2013, NIST and DHS entered into a Memorandum of Agreement ( MOA ) that sets forth their collaboration plan for cybersecurity issues. Under the MOA, NIST agrees, among other things, to enable DHS participation in NIST-led engagements with industry. DHS agrees to consult with NIST on the metrics it intends to use to measure the effectiveness of cybersecurity programs. On February 26, 2013, NIST published in the Federal Register a Request for Information ( RFI ) 4 to stakeholders, including critical infrastructure owners and operators, asking them to share: (1) current cybersecurity risk management practices; (2) current use of existing cybersecurity standards and best practices; and (3) specific industry practices concerning, among other things, encryption and key management, asset identification and management, and security engineering practices. Stakeholders may submit responses to the RFI until April 8, Congressional Initiatives Congressional action on cybersecurity remains likely. In the immediate 4. NIST, Developing a Framework to Improve Critical Infrastructure Cybersecurity, 78 Fed. Reg. 13,024 (Feb. 26, 2013).

10 15 wake of the President s action, Representatives Mike Rogers (R-Mich.) and Dutch Ruppersberger (D-Md.) reintroduced the Cyber Intelligence Sharing and Protection Act ( CISPA ), which passed the House but not the Senate in the last Congress. The House Permanent Select Committee on Intelligence held a hearing on the bill on February 14, 2013, and the Secretary of Homeland Security testified before a hearing of the Senate Committee on Homeland Security and Governmental Affairs on cybersecurity issues on March 7, Before passing any legislation, however, Congress must first resolve several key contentious issues, including whether to mandate specific cybersecurity standards or provide liability protection to industry. Representative Mike McCaul (R-Tex.), chairman of the House s Homeland Security Committee, and Senator Tom Carper (D-Del.), chairman of the Senate s top homeland security committee, have both expressed their intent to push for legislation in the coming months Preliminary Recommendations for Industry Involvement Given the risks and uncertainties of the 5. See, e.g., Rep. Michael McCaul, Opinion, Hardening Our Defenses Against Cyberwarfare, Wall St. J., Mar. 6, 2013, available at SB html; Rep. Michael McCaul, Statement, Legislation Needed to Bolster Cybersecurity Executive Order, Feb. 12, 2013, available at gov/ press-release/legislation-needed-bolster-cybersecurity-executive-order. processes established by the Executive Order and PPD, we think it important for the undersea cable industry to take several actions. First, the industry should participate actively in the standards-development and other implementation proceedings already begun by various U.S. Government agencies, including the NIST RFI and stakeholder meetings. Second, it should continue to monitor and influence cybersecurity legislation. If possible, it should consider introducing other cable-protection elements in such legislation, including an increase in the statutory penalties for cable damage and a broader definition of cable damage. Third, it should engage proactively with U.S. Government agencies, the U.S. Congress, and other stakeholders to share information about existing industry cybersecurity efforts and the impact of proposals for new or additional compliance requirements. Fourth, it should take any and all opportunities to remind the U.S. Government and other stakeholders of the critical importance of undersea cable infrastructure and services to the U.S. economy and national security. Fifth, it should remind the U.S. Government and other stakeholders that infrastructure protection and undersea cable

11 16 protection in particular involves more than just malicious threats. In fact, other natural and human activities pose greater day-to-day risks to undersea cable infrastructure. Given the number of entities involved and the timelines provided in the Executive Order, agencies likely will feel significant pressure to act quickly. The undersea cable industry should therefore plan to engage quickly and proactively with DHS, NIST, and the other key entities in order to ensure that the policies and procedures created do not result in overly burdensome or costly reporting and compliance obligations. Its first opportunity is to participate in the NIST-led effort to develop a Cybersecurity Framework. Additionally, industry may benefit from engaging, either individually or as part of industry coalitions, with regulatory agencies, including DHS, the FCC, and others, and with legislative bodies, including the U.S. Congress, to share information about the cybersecurity efforts already underway and the impact of proposals for new or additional compliance requirements. Kent Bressie is a partner with the law firm of Wiltshire & Grannis LLP in Washington, D.C., and heads its international practice. An expert on telecommunications regulation and international trade and investment, he has extensive experience with the range of legal and regulatory issues affecting undersea cables, including licensing and permitting; national and cyber security, export controls, and economic sanctions; transaction and investment reviews; market access; corporate and commercial transactions; and the law of the sea. He has represented undersea cable operators, suppliers, and investors in connection with projects on six continents. Madeleine Findley is a partner with Wiltshire & Grannis LLP in Washington, D.C., and practices principally in the area of telecommunications law. She regularly advises undersea cable operators and suppliers on a wide variety of legal and regulatory issues arising from cross-border operations.

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson jfeigelson@debevoise.com WASHINGTON, D.C. Satish M. Kini smkini@debevoise.com Renee

More information

No. 33 February 19, 2013. The President

No. 33 February 19, 2013. The President Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001

More information

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses

More information

Billing Code: 3510-EA

Billing Code: 3510-EA Billing Code: 3510-EA DEPARTMENT OF COMMERCE Office of the Secretary National Institute of Standards and Technology National Telecommunications and Information Administration [Docket Number: 130206115-3115-01]

More information

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel todd.bertoson@dentons.com

More information

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Roberta Stempfley Acting Assistant Secretary for Cybersecurity and Communications

More information

FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness

FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness United States Government Accountability Office Report to Congressional Committees September 2013 FEDERAL INFORMATION SECURITY Mixed Progress in Implementing Program Components; Improved Metrics Needed

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President 004216 THE WHITE HOUSE WASHINGTON MEMORANDUM FOR September 28, 2 012 MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President MR. STEPHEN D. MULL Executive

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

Voice. of the Industry ISSN 1948-3031. Regional Systems Edition. In This Issue:

Voice. of the Industry ISSN 1948-3031. Regional Systems Edition. In This Issue: Voice of the Industry 64 j u l y 2012 ISSN 1948-3031 Regional Systems Edition In This Issue: In Cuba, Mystery Shrouds Fate Of Internet Cable U.S. Regulatory Update: FCC Proposes Extraordinary Increases

More information

Virginia Joint Commission on Technology and Science. Cybersecurity Legislation

Virginia Joint Commission on Technology and Science. Cybersecurity Legislation Virginia Joint Commission on Technology and Science Cybersecurity Legislation Pending Legislation Widespread agreement of need for legislation Three approaches CISPA Cybersecurity Act of 2012 SECURE IT

More information

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions

More information

Delving Into FCC's 'Damn Important' Cybersecurity Report

Delving Into FCC's 'Damn Important' Cybersecurity Report Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Delving Into FCC's 'Damn Important' Cybersecurity

More information

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing: Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony

More information

Kent Bressie 6 November 2012

Kent Bressie 6 November 2012 Managing the Parade of Regulatory Horribles in the United States Kent Bressie 6 November 2012 1. The Parade of Horribles 2 FCC FCC Universal Service Contributions FCC has proposed to reform contribution

More information

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security

More information

NH!ISAC"ADVISORY"201.13" NATIONAL"CRITICAL"INFRASTRUCTURE"RESILIENCE"ANALYSIS"REPORT""

NH!ISACADVISORY201.13 NATIONALCRITICALINFRASTRUCTURERESILIENCEANALYSISREPORT National(Health#ISAC#(NH!ISAC) GlobalInstituteforCybersecurity+Research7GlobalSituationalAwarenessCenter NASA SpaceLifeSciencesLaboratory KennedySpaceCenter,FL NH!ISACADVISORY201.13 NATIONALCRITICALINFRASTRUCTURERESILIENCEANALYSISREPORT

More information

Electric Utilities and the Cybersecurity Executive Order: Anticipating the Next Year

Electric Utilities and the Cybersecurity Executive Order: Anticipating the Next Year energy Electric Utilities and the Cybersecurity Executive Order: Anticipating the Next Year Stephen M. Spina & J. Daniel Skees NOTICE: This is the author s version of a work that was accepted for publication

More information

Impact & Consequences to Submarine Cable Systems Submarine Networks World - 10 September 2013

Impact & Consequences to Submarine Cable Systems Submarine Networks World - 10 September 2013 Maritime Jurisdictional Creep Impact & Consequences to Submarine Cable Systems Submarine Networks World - 10 September 2013 Kent Bressie Kent is a partner with the law firm of Wiltshire & Grannis LLP in

More information

146 FERC 61,166 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION

146 FERC 61,166 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION 146 FERC 61,166 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION Before Commissioners: Cheryl A. LaFleur, Acting Chairman; Philip D. Moeller, John R. Norris, and Tony Clark. Reliability Standards

More information

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128

More information

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman

More information

INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500

INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500 MAY 2 8 2014 MEMORANDUM FOR DISTRIBUTION SUBJECT: Government Accountability Office (GAO) Weekly Activity Repati

More information

NIST Cybersecurity Framework What It Means for Energy Companies

NIST Cybersecurity Framework What It Means for Energy Companies Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber

More information

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554. Comments of CTIA The Wireless Association

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554. Comments of CTIA The Wireless Association Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of CSRIC IV Cybersecurity Risk Management and Assurance Recommendations ) ) ) PS Docket No. 15-68 ) ) Comments of CTIA

More information

GAO. INTERNET INFRASTRUCTURE Challenges in Developing a Public/Private Recovery Plan

GAO. INTERNET INFRASTRUCTURE Challenges in Developing a Public/Private Recovery Plan GAO For Release on Delivery Expected at 9:30 a.m. EDT Friday, July 28, 2006 United States Government Accountability Office Testimony before the Subcommittee on Federal Financial Management, Government

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

Which cybersecurity standard is most relevant for a water utility?

Which cybersecurity standard is most relevant for a water utility? Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:

More information

DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION

DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION GROWTH CATALYSTS & LEGISLATION The current policy funding and policy landscape surrounding cybersecurity initiatives and funding is convoluted with

More information

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy By: Dan Arnaudo Copyright 2013, ASA Institute for Risk & Innovation Keywords: Congress, CISPA, Critical Infrastructure,

More information

Implementation of the Cybersecurity Executive Order

Implementation of the Cybersecurity Executive Order Implementation of the Cybersecurity Executive Order November 13 th, 2013 Ben Beeson, Partner, Lockton Companies Gerald J. Ferguson, Partner, BakerHostetler Mark Weatherford, Principal, The Chertoff Group

More information

Billing Code: 4810-25. Guidance Concerning the National Security Review Conducted by the Committee

Billing Code: 4810-25. Guidance Concerning the National Security Review Conducted by the Committee This document has been submitted to the Office of the Federal Register (OFR) for publication and is currently pending placement on public display at the OFR and publication in the Federal Register. The

More information

One Hundred Twelfth Congress of the United States of America

One Hundred Twelfth Congress of the United States of America S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act

More information

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis Westlaw Journal Computer & Internet Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 14 / DECEMBER 12, 2013 Expert Analysis The Cybersecurity Framework: Risk Management

More information

CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance

CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

Cybersecurity Primer

Cybersecurity Primer Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary

More information

Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 ) ) ) ) )

Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 ) ) ) ) ) Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 In the Matter of Stakeholder Engagement on Cybersecurity in the Digital Ecosystem Docket

More information

BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C. 20554 INTRODUCTION

BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C. 20554 INTRODUCTION BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C. 20554 In the Matter of Contributions to the Telecommunications Relay Services Fund CG Docket No. 11-47 REPLY COMMENTS OF CITRIX ONLINE LLC

More information

New Barriers to U.S. Market Entry by Undersea Cable Operators and International Carriers. Kent Bressie

New Barriers to U.S. Market Entry by Undersea Cable Operators and International Carriers. Kent Bressie New Barriers to U.S. Market Entry by Undersea Cable Operators and International Carriers Kent Bressie 1 Recent regulatory developments in the United States have made it increasingly burdensome to construct

More information

Cybersecurity for Medical Devices

Cybersecurity for Medical Devices Cybersecurity for Medical Devices Suzanne O Shea Kathleen Rice January 29, 2015 Why Is This Important? Security Risks in the Sensors of Implantable Medical Devices Over the last year, we ve seen an uptick

More information

Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce

Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House

More information

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 Eric A. Fischer Senior Specialist in Science and Technology April 20, 2015 Congressional Research Service 7-5700 www.crs.gov

More information

S. 2519 AN ACT. To codify an existing operations center for cybersecurity.

S. 2519 AN ACT. To codify an existing operations center for cybersecurity. TH CONGRESS D SESSION S. 1 AN ACT To codify an existing operations center for cybersecurity. 1 Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

More information

ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773

ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

CYBERSECURITY RISK MANAGEMENT

CYBERSECURITY RISK MANAGEMENT CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS

More information

Addressing Potential Security Risks of Foreign-Manufactured Equipment

Addressing Potential Security Risks of Foreign-Manufactured Equipment For Release on Delivery Expected at 2:00 p.m. EDT Tuesday, May 21, 2013 United States Government Accountability Office Testimony Before the Subcommittee on Communications and Technology, Committee on Energy

More information

114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS

114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS 114 th Congress March, 2015 Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS On January 13, 2015, the Administration wrote a letter to Congress urging

More information

The Dow Chemical Company. statement for the record. David E. Kepler. before

The Dow Chemical Company. statement for the record. David E. Kepler. before The Dow Chemical Company statement for the record of David E. Kepler Chief Sustainability Officer, Chief Information Officer, Business Services and Executive Vice President before The Senate Committee

More information

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan:

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan: John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505 November 4, 2015 Mr. Brennan: On March 31, 2015 several organizations called on the Central Intelligence Agency

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate

More information

More Unwritten Rules: Developments in U.S. National Security Regulation of Undersea Cable Systems. Kent Bressie

More Unwritten Rules: Developments in U.S. National Security Regulation of Undersea Cable Systems. Kent Bressie More Unwritten Rules: Developments in U.S. National Security Regulation of Undersea Cable Systems Kent Bressie 1 Overview In the past year, the U.S. Government has: Begun imposing security agreements on

More information

TELECOMMUNICATIONS INDUSTRY ASSOCIATION

TELECOMMUNICATIONS INDUSTRY ASSOCIATION April 28, 2014 General Services Administration Regulatory Secretariat Division (MVCB) ATTN: Ms. Flowers 1800 F Street NW, 2nd Floor Washington, DC 20405 Comments of the Telecommunications Industry Association

More information

One Hundred Thirteenth Congress of the United States of America

One Hundred Thirteenth Congress of the United States of America S. 2519 One Hundred Thirteenth Congress of the United States of America AT THE SECOND SESSION Begun held at the City of Washington on Friday, the third day of January, two thous fourteen An Act To codify

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21283 Updated August 6, 2003 CRS Report for Congress Received through the CRS Web Homeland Security: Intelligence Support Richard A. Best, Jr. Specialist in National Defense Foreign Affairs,

More information

Department of Homeland Security

Department of Homeland Security Implementation Status of EINSTEIN 3 Accelerated OIG-14-52 March 2014 Washington, DC 20528 / www.oig.dhs.gov March 24, 2014 MEMORANDUM FOR: FROM: SUBJECT: Bobbie Stempfley Acting Assistant Secretary Office

More information

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee

More information

Preservation of longstanding, roles and missions of civilian and intelligence agencies

Preservation of longstanding, roles and missions of civilian and intelligence agencies Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER THE DEPARTMENT OF DEFENSE [DOD-2009-OS-0183/RIN 0790-AI60]

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER THE DEPARTMENT OF DEFENSE [DOD-2009-OS-0183/RIN 0790-AI60] COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE DEPARTMENT OF DEFENSE Defense Industrial Base (DIB) Voluntary Cyber Security and Information Assurance (CS/IA) Activities By notice published

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 James.Costello@srpnet.com James J. Costello Director, Enterprise IT Security April 8,

More information

1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection

1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection U:\REPT\OMNI\FinalOmni\CPRT--HPRT-RU00-SAHR-AMNT.xml 0 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to () require a State to report data under subsection (a); or () require a non-federal

More information

PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM

PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving

More information

United States Department of Agriculture. OFFICE OF INSPECTOR GENERAl

United States Department of Agriculture. OFFICE OF INSPECTOR GENERAl United States Department of Agriculture OFFICE OF INSPECTOR GENERAl Processing of Freedom of Information Act Requests 50099-0001-21 September 2015 United States Department of Agriculture Office of Inspector

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

REPORT TO CONGRESS ON THE IMPLEMENTATION OF THE FY 2003 INTEROPERABLE COMMUNICATIONS EQUIPMENT GRANT PROGRAM

REPORT TO CONGRESS ON THE IMPLEMENTATION OF THE FY 2003 INTEROPERABLE COMMUNICATIONS EQUIPMENT GRANT PROGRAM REPORT TO CONGRESS ON THE IMPLEMENTATION OF THE FY 2003 INTEROPERABLE COMMUNICATIONS EQUIPMENT GRANT PROGRAM Department of Homeland Security Emergency Preparedness & Response Directorate May 2003 Table

More information

Government Focus on Cybersecurity Elevates Data Breach Legislation. by Experian Government Relations and Experian Data Breach Resolution

Government Focus on Cybersecurity Elevates Data Breach Legislation. by Experian Government Relations and Experian Data Breach Resolution Government Focus on Cybersecurity Elevates Data Breach Legislation by Experian Government Relations and Experian Data Breach Resolution Will Congress pass data breach legislation in 2015/2016? Recent high-profile

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Comments on the National Plan for Information Systems Protection. Testimony

GAO CRITICAL INFRASTRUCTURE PROTECTION. Comments on the National Plan for Information Systems Protection. Testimony GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release at 10 a.m. Tuesday,

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

Cyberprivacy and Cybersecurity for Health Data

Cyberprivacy and Cybersecurity for Health Data Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 NARUC Winter Committee Meeting Committee & Staff Committee on Critical Infrastructure February 15,

More information

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, March 27, 2012 United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee

More information

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity Critical Infrastructure Cybersecurity Framework Overview and Status Executive Order 13636 Improving Critical Infrastructure Cybersecurity Executive Order: Improving Critical Infrastructure Cybersecurity

More information

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security. Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government

More information

CFIUS and Network Security Agreements 1

CFIUS and Network Security Agreements 1 CFIUS and Network Security Agreements 1 Mark E. Plotkin 2 David M. Marchick 3 David N. Fagan 4 This memorandum provides an overview of the principal U.S. government national security considerations and

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

Computer Network Security & Privacy Protection

Computer Network Security & Privacy Protection Overview Computer Network Security & Privacy Protection The Nation s electronic information infrastructure is vital to the functioning of the Government as well as maintaining the Nation s economy and

More information

GAO CYBERSECURITY. Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative

GAO CYBERSECURITY. Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative GAO United States Government Accountability Office Report to Congressional Requesters March 2010 CYBERSECURITY Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National

More information

CRITICAL INFRASTRUCTURE PROTECTION. DHS Action Needed to Enhance Integration and Coordination of Vulnerability Assessment Efforts

CRITICAL INFRASTRUCTURE PROTECTION. DHS Action Needed to Enhance Integration and Coordination of Vulnerability Assessment Efforts United States Government Accountability Office Report to Congressional Requesters September 2014 CRITICAL INFRASTRUCTURE PROTECTION DHS Action Needed to Enhance Integration and Coordination of Vulnerability

More information

Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel

Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel May 5th, 2015 10:00-11:30 a.m. Hyatt Regency, Indian Wells, CA Thank you all for welcoming me. It

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative

More information

Critical Infrastructure Security and Resilience

Critical Infrastructure Security and Resilience U.S. Department of Homeland Security in partnership with the National Coordination Office for Space-Based Positioning, Navigation and Timing Critical Infrastructure Security and Resilience International

More information

FEDERAL FACILITY CYBERSECURITY. DHS and GSA Should Address Cyber Risk to Building and Access Control Systems

FEDERAL FACILITY CYBERSECURITY. DHS and GSA Should Address Cyber Risk to Building and Access Control Systems United States Government Accountability Office Report to Congressional Requesters December 2014 FEDERAL FACILITY CYBERSECURITY DHS and GSA Should Address Cyber Risk to Building and Access Control Systems

More information

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats

More information

1st Session Part 1 HOMELAND SECURITY UNIVERSITY-BASED CENTERS REVIEW ACT

1st Session Part 1 HOMELAND SECURITY UNIVERSITY-BASED CENTERS REVIEW ACT 114TH CONGRESS REPT. 114 168 " HOUSE OF REPRESENTATIVES! 1st Session Part 1 HOMELAND SECURITY UNIVERSITY-BASED CENTERS REVIEW ACT JUNE 18, 2015. Committed to the Committee of the Whole House on the State

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Submitted via email: cyberframework@nist.gov April 8, 2013 Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Developing a Framework

More information

Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations

Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations Submitted via ISAO@hq.dhs.gov and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3) DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners

More information