COMMENTS OF THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION
|
|
|
- Dale Sherman
- 9 years ago
- Views:
Transcription
1 February 23, 2016 Via Electronic Filing Re: National Institute of Standards and Technology s Notice and Request for Information, Views on the Framework for Improving Critical Infrastructure Cybersecurity [Docket No ] COMMENTS OF THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION I. INTRODUCTION The Telecommunications Industry Association ( TIA ) submits these comments in response to the National Institute of Standards and Technology s ( NIST ) Notice and Request for Information ( RFI ) seeking information about the ways the NIST Cybersecurity Framework ( Framework ) is being used and how best practices for using it are being shared. 1 TIA appreciates NIST s commitment to an inclusive approach through continued outreach to stakeholders and efforts to collect public input on usage and perception of the Framework, to date. TIA is a trade association representing hundreds of global manufacturers and vendors of information and communications technology ( ICT ) equipment and services that are supplied to critical infrastructure owners and operators, enabling secure and resilient network operations across segments of the economy. We offer the specific input below based on TIA efforts to raise awareness of the Framework and our members experience using it. 1 National Institute of Standards and Technology (NIST), Views on the Framework for Improving Critical Infrastructure Cybersecurity, 80 Fed. Reg (Dec. 11, 2015) ( RFI ).
2 II. USE OF THE NIST CYBERSECURITY FRAMEWORK TIA commends NIST for its efforts to not only advance the Framework but assess its value and usefulness to all stakeholders. We appreciate NIST s engagement in a transparent process during the development of the Framework as well as the post-publication initiatives aimed at educating relevant communities about the Framework and facilitating its adoption. At this stage, two years since its initial publication, the Framework serves as an important tool to aid industry in developing a common language and approach for dealing with cyber risks. While the Framework is still in its early stages, TIA believes there is increasing general awareness of the Framework amongst TIA members and the ICT manufacturer and supplier community as a whole. Additionally, TIA members have expressed support for the Framework and have reported positive experiences where it has been adopted. TIA has helped facilitate this by promoting awareness of the Framework amongst the ICT community and by advocating it as the model for a voluntary cyber risk management approach. TIA has worked to share developments related to the Framework with member companies through its Cybersecurity Working Group, which determines the association s public policy positions related to the security of ICT equipment and services from a vendor perspective as it relates to critical infrastructure, supply chain, and information sharing. This includes informing members of NIST s activities regarding the Framework itself as well as the Department of Homeland Security s Critical Infrastructure Cyber Community (C³) Voluntary Program, which is intended to support industry in increasing its cyber resilience; increase awareness and use of the Framework; and encourage organizations to manage cybersecurity as part of an all hazards approach to enterprise risk management. Awareness amongst TIA s membership has also been driven by TIA s continued work related to the Framework. Most directly, TIA has worked to raise awareness of the Framework as it worked with NIST to provide ICT industry consensus views towards finalizing the Framework. Since the Framework was finalized, TIA has continued to work with its members on efforts and issues related to the Framework that have increased awareness including attendance at NIST Framework events and providing input on the initial RFI seeking input on 2
3 Framework awareness. Additionally, TIA was an active member of the Federal Communications Commission s Communications Security, Reliability, and Interoperability Council (CSRIC) Working Group 4, which was an effort to map the Framework to the communications sector. Further, TIA is a member of the Communications and IT Sector Coordinating Councils, key venues for receiving information and sharing lessons learned about the Framework and other network reliability and resiliency issues generally. Besides our policy-based efforts to share information with members, TIA also engages in standards-based activities and coordination with other industry associations to spread the value of the Framework to industry and government stakeholders. Furthermore, as communications technologies are increasingly being incorporated in other industry segments and products, beyond traditional critical infrastructure, government entities as well as the public at large are starting to consider issues surrounding cyber threat readiness in these sectors. TIA and its members have identified the Framework as a great model for consideration of how to begin developing a flexible, voluntary, viable mechanism for cybersecurity readiness and resilience. For example, in response to a U.S. Department of Transportation request for comment on Automotive Electronic Control Systems Safety and Security, TIA encouraged the agency to align its cybersecurity risk management efforts with existing guidance documents done through public-private partnerships like the Framework. 2 In addition, TIA s white paper on Realizing the Potential of the Internet of Things: Recommendations for Policy Makers, 3 which addresses policy approaches for dealing with Internet of Things security, specifically identifies the Framework s voluntary, risk-based, and technology neutral methodology as one that lawmakers should look toward when considering cybersecurity implications for the Internet of Things rather than adopting rigid standards or mandates. 2 See TIA Comments, NHTSA , at 4-5, available at f. 3 See TIA White Paper, Realizing the Potential of the Internet of Things at 9, Realizing_the_Potential_of_the_Internet_of_Things.pdf. 3
4 This demonstrates that TIA members and the larger ICT industry have increased recognition of the value of the Framework s approach, are taking steps to promote it, and that many companies have begun to apply its methodology to their individual business models. For those that have begun to use the Framework, however, there may be proprietary and/or competitive concerns associated with this fact or the results of the use of the Framework so far. TIA, therefore, believes that NIST should not attempt to measure the effectiveness of the Framework from the results of this RFI, and defers to individual companies to provide more specific input about their initial experiences with the Framework, should they wish to provide this information. III. AREAS OF POSSIBLE IMPROVEMENT FOR THE FRAMEWORK As we have previously noted, the Framework is still in the initial stages for usage and adoption. Thus, TIA and its members strongly believe it would be premature for NIST to pursue significant updates to the methodology and approaches outlined in the Framework. The ICT community is just at a point of being more adept with the Framework and many have only recently begun to implement its approach. Therefore, we believe that it would not be advantageous at this time to pursue a process for updating framework for cybersecurity as industry is just at a point of using and recognizing the Framework s value. Instead, TIA encourages NIST to focus the next stage of Framework development on areas where further work is needed towards the goal of promoting the Framework s voluntary, industry-led methodology as the most effective approach for enabling industry to adopt practices that will aid in their cyber infrastructure security, resiliency, and responsiveness. The objective should be continuing to use the Framework to reinforce the idea that voluntary, process-oriented guidelines, developed with industry s input, of the kind embedded in the Framework is superior to mandated cybersecurity standards. Specifically, NIST should work on promoting the elements of the Framework domestically, with civil agencies at the Federal and state levels, as well as on the international front. Internationally, awareness of the Framework has continued to increase, particularly amongst the community of subject matter experts. In an increasing number of jurisdictions, 4
5 where alternative mandate-based approaches are sometimes proposed, policymakers are becoming more aware of the existence of the Framework as it begins to be more widely used across Critical Infrastructure/Key Resource (CIKR) sectors within the United States. Nonetheless, NIST along with its government counterparts could do more to advance the Framework itself as well as the following U.S.-supported principles that led to the successful Framework model: Voluntary private sector security standards should be used as non-mandated means to secure the ICT supply chain; Industry-driven best practices and global standards should be relied upon for the security of critical infrastructure; and Public-private partnerships should be utilized as effective vehicles for collaborating on current and emerging cyber threats. This type of international engagement will be crucial to ensuring there is global harmonization on addressing cyber threats. Such an approach is necessary to ensure that the ICT industry can develop the most efficient, effective security protocols rather than region- or country-specific policies. TIA and its members believe that global harmonization of standards and best practices is critical as the ICT industry operates in a global marketplace where sector-specific rules can serve as barriers to trade and significantly inhibit the continued growth of the industry. The importance of harmonized approaches is particularly important in the area of cybersecurity, where the United States is already a leader in adopting a flexible, public-private approach. Therefore, TIA believes the federal government must embrace this role and work to enhance its role as the standard-bearer in the cybersecurity space. We applaud the Administration s recent efforts towards achieving this goal. We believe the 2015 report outlining a new strategy to improve the U.S. government s engagement in the development of international cybersecurity standards sets us on the right track and has a number of important recommendations. 4 4 See The White House Blog, Engaging the International Community on Cybersecurity Standards, Dec. 23, 2015, TIA 5
6 Furthermore, in the recently passed Cybersecurity Act of 2015, section 402 directs the Department of State to develop a comprehensive cybersecurity strategy relating to United States international policy with regard to cyberspace. 5 TIA and its members believe this initiative would serve as an ideal avenue for the Administration to incorporate the Framework s key principles and develop a larger plan for promoting this approach on a global scale. We encourage NIST to coordinate with its counterparts in the State Department to educate them on the Framework and assist with formulating a strategy that has foreign adoption of the Framework as part of its objective. IV. CONCLUSION TIA thanks NIST for its public request for input on views and uses of the Framework and possible future areas of further development. The ICT manufacturing and vendor community stands ready to work with NIST as it moves forward. Respectfully submitted, By: /s/ James Reid James Reid Senior Vice President, Government Affairs Avonne Bell Senior Manager, Government Affairs TELECOMMUNICATIONS INDUSTRY ASSOCIATION 1320 North Courthouse Rd, Ste 200 Arlington, VA (703) February 23, 2016 was also encouraged to see the recent cybersecurity announcements by the Administration and we hope that the new initiatives, including the newly established Commission on Enhancing Cybersecurity, will include recommendations about furthering use of the Framework particularly on the international front. 5 Cybersecurity Act of 2015, Pub. L. No , div. N,
Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations
Submitted via [email protected] and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA
TELECOMMUNICATIONS INDUSTRY ASSOCIATION
April 28, 2014 General Services Administration Regulatory Secretariat Division (MVCB) ATTN: Ms. Flowers 1800 F Street NW, 2nd Floor Washington, DC 20405 Comments of the Telecommunications Industry Association
) ) ) ) COMMENTS OF THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION. The Telecommunications Industry Association ( TIA ) 1 hereby submits its comments in
Before the NATIONAL TELECOMMUNICATIONS AND INFORMATION ADMINISTRATION Washington, DC 20230 and the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of Model City for Demonstrating and
Billing Code: 3510-EA
Billing Code: 3510-EA DEPARTMENT OF COMMERCE Office of the Secretary National Institute of Standards and Technology National Telecommunications and Information Administration [Docket Number: 130206115-3115-01]
BSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
NIST Cybersecurity Framework. ARC World Industry Forum 2014
NIST Cybersecurity Framework Vicky Yan Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy
National Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair [email protected] 1 The National Institute of Standards
Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Critical Infrastructure Cybersecurity Framework Overview and Status Executive Order 13636 Improving Critical Infrastructure Cybersecurity Executive Order: Improving Critical Infrastructure Cybersecurity
RE: ITI Comments on Korea s Proposed Bill for the Development of Cloud Computing and Protection of Users
August 19, 2012 Korean Communications Commission Via e-mail to: [email protected] RE: ITI Comments on Korea s Proposed Bill for the Development of Cloud Computing and Protection of Users Dear Director Yang:
Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )
10 October 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Experience with the Framework for Improving Critical Infrastructure
April 28, 2014. Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC
April 28, 2014 Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC RE: Information Technology Sector Coordinating Council (IT SCC)
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
Delving Into FCC's 'Damn Important' Cybersecurity Report
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Delving Into FCC's 'Damn Important' Cybersecurity
Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association
Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association EXECUTIVE SUMMARY: The increased integration of information
Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace
Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace Testimony of Ben Beeson Vice President, Cyber Security and Privacy Lockton
RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
RE: ITI comments in response to NIST RFI: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 14, 2014 Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Via e-mail to: [email protected] RE: ITI comments in response to
1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection
U:\REPT\OMNI\FinalOmni\CPRT--HPRT-RU00-SAHR-AMNT.xml 0 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to () require a State to report data under subsection (a); or () require a non-federal
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
Re: Request for Comments on the Preliminary Cybersecurity Framework
Submitted Electronically Patrick Gallagher, Ph.D. Under Secretary of Commerce for Standards and Technology U.S. Department of Commerce 1401 Constitution Avenue, NW Washington, DC 20227 Re: Request for
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing
NASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
Corporate Citizenship in The World Economy. Global. united nations. Compact
Corporate Citizenship in The World Economy united nations Global Compact What Is the UN Global Compact? Never before in history has there been a greater alignment between the objectives of the international
Cyber Security Research and Development a Homeland Security Perspective
FBI ----------------------------------------- INFRAGARD National Conference ----------------------------------------- 2005 Cyber Security Research and Development a Homeland Security Perspective Annabelle
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2014 ISACA Pittsburgh Information Security Awareness Day Victoria Yan
Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, [email protected]. 2014 Utilities Telecom Council
Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, [email protected] 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
Understanding the NIST Cybersecurity Framework September 30, 2014
Understanding the NIST Cybersecurity Framework September 30, 2014 Earlier this year the National Institute of Standard and Technology released the Framework for Improving Critical Infrastructure Cybersecurity
Business-to-Business EIPP: Presentment Models, Part 1 By: The Council for Electronic Billing and Payment
Business-to-Business EIPP: Presentment Models, Part 1 By: The Council for Electronic Billing and Payment Abstract In the short time since the release of the first web browser in 1993, the Internet has
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
The Healthy Asia Pacific 2020 Roadmap INTRODUCTION: THE HEALTHY ASIA PACIFIC 2020 INITIATIVE
The Healthy Asia Pacific 2020 Roadmap INTRODUCTION: THE HEALTHY ASIA PACIFIC 2020 INITIATIVE In the 2014 APEC Leader s Declaration and Joint Ministerial Statement, it is recognized that the prospect of
RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP
RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP 1. Identity Ecosystem Steering Group Charter The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy), signed by President
National Cyber Security Strategies: United States
National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013 Trends: National Cybersecurity Strategies New strategies
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 NARUC Winter Committee Meeting Committee & Staff Committee on Critical Infrastructure February 15,
CForum: A Community Driven Solution to Cybersecurity Challenges
SESSION ID: AST3-R01 CForum: A Community Driven Solution to Cybersecurity Challenges Tom Conkle Cybersecurity Engineer G2, Inc. @TomConkle Greg Witte Sr. Security Engineer G2, Inc. @thenetworkguy Organizations
May 10, 2013. Office of the United States Trade Representative 600 17 th Street NW Washington, D.C. 20508
Office of the United States Trade Representative 600 17 th Street NW Washington, D.C. 20508 May 10, 2013 Submitted electronically via www.regulations.gov Attn: Docket: USTR-2013-0019 Re: Trans-Atlantic
14 New Greater Toronto Region Global Investment Attraction Agency (Newco)
Clause 14 in Report No. 17 of Committee of the Whole was adopted, without amendment, by the Council of The Regional Municipality of York at its meeting held on November 19, 2015. 14 New Greater Toronto
NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA
NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH Arthur Carter, Frank Barickman, NHTSA Electronic Systems Safety Research Division Electronic Systems Safety (ESS) Research Division conducts research to ensure
Realizing the Potential of the Internet of Things:
TIA White Paper Realizing the Potential of the Internet of Things: Recommendations to Policy Makers 2015 tiaonline.org Realizing the Potential of The Internet of Things: Recommendations to Policy Makers
RESOLUTION 102 (REV. BUSAN, 2014)
RESOLUTION 102 (REV. BUSAN, 2014) ITU's role with regard to international public policy issues pertaining to the Internet and the management of Internet resources, including domain names and addresses
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
Private Certification to Inform Regulatory Risk-Based Oversight: Discussion Document
Private Certification to Inform Regulatory Risk-Based Oversight: Discussion Document 1 Table of Contents INTRODUCTION... 3 BACKGROUND... 3 PRIVATE CERTIFICATION SCHEMES VS. REGULATORY STANDARDS... 3 PRIVATE
IBA Business and Human Rights Guidance for Bar Associations. Adopted by the IBA Council on 8 October 2015
IBA Business and Human Rights Guidance for Bar Associations Adopted by the IBA Council on 8 October 2015 With Commentaries 2015 IBA Business and Human Rights Guidance for Bar Associations With Commentaries
Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel
Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel May 5th, 2015 10:00-11:30 a.m. Hyatt Regency, Indian Wells, CA Thank you all for welcoming me. It
Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business
S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business
Review of Building the Canadian Advantage: a Corporate Social Responsibility Strategy for the Canadian International Extractive Sector
Review of Building the Canadian Advantage: a Corporate Social Responsibility Strategy for the Canadian International Extractive Sector Submission to the Department of Foreign Affairs, Trade & Development
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE 16 April 2014 (Highlighted in yellow below) Introduction 1. The Global Multistakeholder Meeting on the Future of Internet
Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.
Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee
NIST Cybersecurity Initiatives. ARC World Industry Forum 2014
NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission
National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009
National Security & Homeland Security Councils Review of National Cyber Security Policy Submission of the Business Software Alliance March 19, 2009 Question # 1: What is the federal government s role in
Corporate Sustainability in The World Economy. Global. united nations. Compact
Corporate Sustainability in The World Economy united nations Global Compact What Is the UN Global Compact? Never before has there been a greater alignment between the objectives of the international community
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
RE: IESBA s Exposure Draft Responding to Non-Compliance with Laws and Regulations
8 September 2015 Mr. Ken Siong Technical Director International Ethics Standards Board for Accountants (IESBA) International Federation of Accountants (IFAC) 545 Fifth Avenue, 14 th Floor New York, New
