Global Cybersecurity Outlook: Legislative, Regulatory and Policy Landscapes
|
|
|
- Chester Owen
- 10 years ago
- Views:
Transcription
1 Global Cybersecurity Outlook: Legislative, Regulatory and Policy Landscapes June 23, 2015 Start Time: 9am US Pacific /12 noon US Eastern/ 5pm London Time #ISSAWebConf 1
2 T Brought to you by ISSA International #ISSAWebConf 2
3 Welcome Conference Moderator Allan Wall MSc., FBCS, CISSP, A.Inst.ISP Senior Consultant, Information Risk Management, HP Enterprise Security Services June 23, 2015 Start Time: 9am US Pacific 12pm US Eastern/5pm London Time 3
4 Speaker Introduction Brian Engle- Executive Director, Retail Cyber Intelligence Sharing Center Mathieu Gorge- CEO & Founder, VigiTrust Michael F. Angelo- CRISC, CISSP Remember to type in your question in the Chat area of your screen. You may need to click on the double arrows to open this function. 4
5 US Cybersecurity Legislation R-CISC Perspectives Brian Engle Executive Director Retail Cyber Intelligence Sharing Center
6 About the Retail Cyber Intelligence Sharing Center Non-profit organization enabling the community for cybersecurity intelligence and information sharing Membership model inclusive of wide variety of consumer oriented businesses as well as solution providers Operation of the Retail and Commercial Services Information Sharing and Analysis Center (RCS-ISAC) Conducting research on emerging threats, significant challenges, and effective solutions for cybersecurity issues 6
7 Previous Noteworthy Legislation National Cybersecurity Protection Act of 2014 Signed in December of 2014 Codified the National Cybersecurity Communications Integration Center (NCCIC) along with functions / responsibilities of DHS cybersecurity role Expedition of cybersecurity information sharing agreements with non-federal entities Information Sharing and Analysis Organizations, Clearances and support of industry through civilian interface 7
8 Previous Noteworthy Legislation Cybersecurity Enhancement Act of 2014 Signed in December of 2014 Authorizes the Department of Commerce through the National Institute of Standards (NIST) to develop voluntary standards to reduce cybersecurity risks to critical infrastructure Requires the Office of Science and Technology Policy to develop a federal cybersecurity research and development plan 8
9 In Flight US Cybersecurity Legislation Information Sharing Cybersecurity Information Sharing Act of 2015 (S. 754 Burr) Cyber Threat Sharing Act of 2015 (S. 456 Carper) Cyber Intelligence Sharing and Protection Act (HR 234 Ruppersberger Cybersecurity Governance Protecting Cyber Networks Act (HR 1560 Nunez) National Cybersecurity Protection Advancement Act of 2015 (HR 1731 McCaul) Data Security and Breach Notification Act of 2015/2016 (HR 1770 S. 177) Visit Congress.gov to follow progress on Cybersecurity legislation. 9
10 Cybersecurity Sharing Proposed Bills Common Traits Various stages of the process, but essentially somewhere on one side or the other of House/Senate Not overly contentious (discretionary not mandatory) Key Traits to Look For Exemptions from FOIA for cybersecurity information shared with government Exemptions from anti-trust Limitations of use, and lifecycle 10
11 Protecting Cyber Networks Act (HR 1560 Nunez) Amends the National Security Act of 1947 to require Director of National Intelligence (DNI) to develop procedures for timely sharing of classified and declassified cyber threat indicators with private entities and non-federal government agencies Prohibits defensive measures from being used to destroy, render unstable or inaccessible, or substantially harm an information system that is not owned by the operator or entity authorizing the operator of the defensive measure 11
12 National Cybersecurity Protection Advancement Act (HR 1731 McCaul) Amends the Homeland Security Act of 2002 Expands inclusion of ISACs and non-federal representatives in NCCIC Requires NCCIC to be the lead civilian interface for multi-directional and cross sector sharing of cyber threat information, including international partners Includes generally expected reporting to Congress along with defined details on DHS NCCIC authorized activities 12
13 Data Security and Breach Notification Act (HR 1770 S. 177) Requires certain commercial entities and non-profit organizations that use, access, transmit, store, collect or dispose of nonpublic personal information to notify affected US residents when a reasonable risk that a breach has or will result in identity theft, economic harm, or financial fraud Preempts state information security and notification laws, but does not replace them Expands audience for requirements of security practices and notification standards currently enforced by the FCC 13
14 Thank You! Brian Engle Executive Director Retail Cyber Intelligence Sharing Center 14
15 Question and Answer Brian Engle Executive Director Retail Cyber Intelligence Sharing Center To ask a question, type your question in the Chat area of your screen. You may need to click on the double arrows to open this function. #ISSAWebConf 15
16 Thank you! Brian Engle Executive Director Retail Cyber Intelligence Sharing Center 16
17 Global Cybersecurity Outlook: Legislative, Regulatory and Policy Landscapes Mathieu Gorge CEO, VigiTrust
18 Agenda Setting the Scene EU Global Data Protection Regulation EU NIS US-EU Convergence Other frameworks Key Considerations for compliance with Legal, Regulatory and Policy compliance in Q&A 18
19 Setting The Scene Disclaimer 19
20 EU General Data Protection Regulation (1) GDPR is a replacement for EU Data Protection Directive 95/46/EC In the making for 4+ years but European Council Approved EU GDPR draft (June 2015) Next stage is for the Parliament and EC to jointly agree GDPR to come into force two years after date of publication National DP laws to remain effective in the meantime. Jurisdiction will extend to outside the EU: If goods or services are offered to or allow monitoring of EU data subjects Non EU data controllers (of EU Data subjects info) will need to appoint an EU DP representative. 20
21 EU General Data Protection Regulation (2) Data Subject Rights Info on DS must be accurate, for a specific purpose, appropriately protected, etc DS must receive an explanation of the rights they have wrt to their data Must be told if any type of profiling is performed Big Data: primary or secondary use restrictions (must not conflict) Controllers & processors Controllers must have extended internal data processing record keeping activities P&Ps Processors can be liable as well as Controllers Right to be forgotten Data portability High Risk Activities require a Data Impact Assessment Security Officers are not required under GDPR but Member States may require it at local levels*. 21
22 EU General Data Protection Regulation (3) Data Breach Notification is included: Notify applicable supervisory authorities within 72 hours One stop shop supervisory authority is somewhat changed especially wrt to multi-jurisdictional breaches so all MS supervisory authorities can be involved in a data breach case Notify affected data subjects without undue delay Article 29 Working Party European Data Protection Board Provide interpretation of GDPR & related matters Fines Up to 2% of an enterprise s global turnover capped at 1m Infractions to be tiered. 22
23 EU Network Information Security (1) Means a transformation of Information Security Regulation in the EU EU Cybersecurity Strategy implementation framework Key Objectives To provide a Secure & Trustworthy Environment To protect businesses against always evolving threats Protect users to drive consumer confidence How did it come about? Consultation & Impact assessment July-Oct 2012 EU Member States Conference July 2012 Private sector feedback 2012 European Cybercrime Centre (EUROPOL) focal point re cybercrime in the EU (2013) European Parliament successfully votes NIS Directive (2014) US-EU Workshops (2014) Full adoption 2015? 23
24 Who/ How does the EU Network Information Security apply to (1): EU Member States who now have a minimum level of national capabilities by: Establishing competent authorities for national level Setting Up Computer Emergency Response Teams (CERTs), and Adopting national strategies and national cooperation plans Also required to exchange information and cooperate to counter NIS threats & Incidents on the basis of European NIS plan Ensuring that a culture of risk management develops and that information is shared between public & private sectors. EU Member States must require operators of Critical Infrastructure (CI) to: a) Adopt appropriate steps to manage security risks b) Report incidents to the national competent authorities. 24
25 Who/ How does the EU Network Information Security apply to (2): CI sectors in scope for compliance with NIS: Energy, transport, banking, financial market infrastructures, health sector All of the above must work with CERTs to (a) monitor & respond to national level incidents, have public/private coop, promote good practices for incident management Market Operators aka providers of information society services in scope for compliance with NIS: Social networks, Search engines, Cloud Computing services Commerce platforms, Internet Payment gateways, application stores All of the above must have: Technical & organizational measures to manage security risks Perform risk/security assessments Investigate non compliance & notify where required Are encouraged to use available security standards 25
26 NIS Application in Practical Terms: At member States / Regional Levels Monitor compliance as against other EU countries & take corrective action Co-ordinate with multiple new authorities (national competent authorities & CERT(s) Ensure they continually enhance Incident management processes NIS focus on Security Awareness: Employees involved in or directly responsible for the management of global systems (including CI) must understand and comply with NIS & MS laws Committee members and IT/Business Decision makers affecting technical & management security controls in the EU must be trained up Staff of 2 nd & 3 rd lines of defense providing oversight or auditing security/it in the EU must all be trained 26
27 US - EU Convergence Historical perspective Data Protection vs Data Breach Notification EU vs US approach to addressing data security challenges Cybersecurity risks are often cross-sectorial yet regulations are often regional or sectorial Must address both dimensions at the same time Of MA 201, GDPR and NIST Cybersecurity framework & NIS. Information sharing seems to be a key driver on both sides of the Atlantic yet: Is real information really being shared shared the right way? Can we really achieve true Public-private information sharing? US/EU Information sharing? 27
28 Other Frameworks PSD2 Update to existing PSD Pilot implementation to run from Applies to all payment service providers offering payment services (from Internet card payments to online credit transfers, ACH/Direct debit) Requires two key things from a security perspective: Annual Security & Risk Assessment Breach notification PCI DSS ISO 27001:2013 AML & KYC considerations 28
29 Key Considerations for compliance with Legal, Regulatory and Policy compliance in Convergence & Overlap in scope of applicability as well as regional applicability in legal & industry security frameworks C-Level involved Focus on Security Awareness is much more obvious Data Breach Notification Risk Based Approach within each mandate not a tick box exercise But really.we should all be doing this already! 29
30 Thank You Mathieu Gorge CEO, VigiTrust
31 Question and Answer Mathieu Gorge CEO, VigiTrust To ask a question, type your question in the Chat area of your screen. You may need to click on the double arrows to open this function #ISSAWebConf 31
32 Thank you! Mathieu Gorge CEO VigiTrust 32
33 A Cautionary Note Michael F. Angelo CRISC, CISSP
34 A Cautionary Note 34
35 Averted Disasters Massachusetts Early PII Data Encryption defense against PII violation Original draft specified AES
36 Averted Disasters German Digital Signature Law No repudiation for digitally signed items I owe you $100 or $1,000,000
37 Beware of Secure Touch-n-Pay Biometric Access Corp June tml#.vyb2-zjbjre
38 Corporate Assets Their Database Financial Information protected Names and Fingerprints 2002 not defined status Legislation Names and Fingerprints use limited to the use they were provided for and not transferrable as an asset without explicit permission of the owners.
39 Morphing Laws Sarbanes Oxley In part protects against destruction of information in a crime. Directed at ENRON type events What happens if you: Clear your cache Defragment your drive
40 Morphing Laws Prosecutors do not have to show that the person deleting evidence knew there was an investigation underway So in the normal course of system maintenance you could destroy data that you did not know was evidence, and be convicted of violating Sarbanes Oxley
41 New Laws Royce Bill of materials and other requirements DHS & UL Bill of materials Assertion that you have no known vulnerabilities at release You have a mechanism to repair vulnerabilities More to come
42 Export Controls Encryption 1997 moved from ITAR to commerce Original controls set at 56, 80, 512 bits Over years decontrol technology or exemptions Secure operating systems Added Controls
43 2013 Wassenaar Agreement for additions to list of dual-use goods: systems, equipment or components specially designed for the generation, operation or delivery of, or communication with, intrusion software; software specially designed or modified for the development or production of such systems, equipment or components; software specially designed for the generation, operation or delivery of, or communication with, intrusion software; technology required for the development of intrusion software; Internet Protocol (IP) network communications surveillance systems or equipment and test, inspection, production equipment, specially designed components therefor, and development and production software and technology
44 Wassenaar Implementation Used to have security controls in Cat 5. Part 1 Networking Part 2 Encryption, Certified O/S, Quantum Encryption Proposed Rules Published -Federal Register /Vol. 80, No. 97 /Wednesday, May 20, 2015
45 Wassenaar Implementation Changes 4A005 - ( systems, equipment, or components therefor, specially designed for the generation, operation or delivery of, or communication with, intrusion software 4D004 - ( software specially designed for the generation, operation or delivery of, or communication with, intrusion software 4E001 (to control technology required for the development of intrusion software. ) Why National Security (NS) Regional Stability (RS) Anti-Terrorism (AT)
46 In Addition 5A001.j Internet Protocol (IP) Network Communications Surveillance Systems or Equipment and Test, Inspection, Production Equipment, Specially Designed Components Therefor
47 Not Done Yet Removes Cybersecurity software from mass market provision cybersecurity items classified in cybersecurity ECCNs, - (4A005, 4D004, 4E001, 5A001, 5A002, 5D002 and 5E002) all cybersecurity items using or incorporating encryption or other information security functionality classified under ECCNs 5A002, 5D002, 5A992.c, 5D992.c or 5E002, must also satisfy the registration, review and reporting requirements set forth in , (b) and 748.3(d) of the EAR, including submissions to the ENC Encryption Request Coordinator, Ft. Meade, MD.
48 Good News ish Comments: submit to the Federal rulemaking portal The regulations.gov ID for this rule is: BIS to Physical Regulatory Policy Division, Bureau of Industry and Security, Room 2099B, U.S. Department of Commerce, 14th St. and Pennsylvania Ave. NW., Washington, DC Please refer to RIN 0694 AG49 in all comments and subject line of
49 Summary Security experts need to examine the impact of environmental changes in order to validate their security controls, before implementation. If not, expect more prescriptive legislation If you don t comment or participate in the decision Don t complain about the results
50 Thank You Michael F. Angelo CRISC, CISSP
51 Question and Answer Michael F. Angelo CRISC, CISSP To ask a question, type your question in the Chat area of your screen. You may need to click on the double arrows to open this function. #ISSAWebConf 51
52 Thank you! Michael F. Angelo CRISC, CISSP 52
53 Open Panel with Audience Q&A Brian Engle Executive Director, Retail Cyber Intelligence Sharing Center Mathieu Gorge CEO & Founder, VigiTrust Michael F. Angelo CRISC, CISSP To ask a question, type your question in the Chat area of your screen. You may need to click on the double arrows to open this function. #ISSAWebConf 53
54 Closing Remarks I would like to thank Brian, Mathieu and Michael for lending their time and expertise to this ISSA Educational Program. Thank you Citrix for donating the Webcast service. #ISSAWebConf 54
55 CPE Credit Within 24 hours of the conclusion of this webcast, you will receive a link via to a post Web Conference quiz. After the successful completion of the quiz you will be given an opportunity to PRINT a certificate of attendance to use for the submission of CPE credits. On-Demand Viewers Quiz Link: Conference-June Global-Cybersecurity- Outlook-Legislative-Regulatory-and-Policy-Landscapes #ISSAWebConf 55
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
I. The Proposed Interpretation of Intrusion Software Inappropriately Fails to Exclude Software for Defensive Activities
July 20, 2015 Ms. Hillary Hess Director, Regulatory Policy Division Room 2099B Bureau of Industry and Security U.S. Department of Commerce 14th Street & Pennsylvania Ave., N.W. Washington, D.C. 20230 Re:
Preservation of longstanding, roles and missions of civilian and intelligence agencies
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel [email protected]
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
The state of PCI DSS compliance. Irish Payments Services Organisation PCI DSS Explained
Pro-active Enterprise Security The state of PCI DSS compliance Global, European and Irish perspectives Irish Payments Services Organisation PCI DSS Explained Dublin 2 nd September 2010 Prepared by Mathieu
What are you trying to secure against Cyber Attack?
Cybersecurity Legal Landscape Bonnie Harrington Executive Counsel EHS and Product Safety & Cybersecurity GE Energy Management Imagination at work. What are you trying to secure against Cyber Attack? Personally
Rules and Regulations
1059 Rules and Regulations Federal Register Vol. 76, No. 5 Friday, January 7, 2011 This section of the FEDERAL REGISTER contains regulatory documents having general applicability and legal effect, most
How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity
Big Data Trust and Reputation, Privacy Cyber Threat Intelligence
Big Data Trust and Reputation, Privacy Cyber Threat Intelligence October 27, 2015 Start Time: 9 am US Pacific / 12 noon US Eastern / 5 pm London Time #ISSAWebConf Big Data Trust and Reputation, Privacy
12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013
Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He
Network Security Testing
Network Security Testing Are There Really Different Types of Testing? July 28, 2015 Start Time: 9 am US Pacific / 12 noon US Eastern / 5 pm London Time #ISSAWebConf WebCONFERENCES Network Security Testing
Cyber Analysis Tools:
Cyber Analysis Tools: The State of the Union August 26, 2014 Start Time: 9am US Pacific /12 noon US Eastern/ 5pm London Time 1 Generously sponsored by: #ISSAWebConf 2 Welcome Conference Moderator Matt
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act
In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 Eric A. Fischer Senior Specialist in Science and Technology April 20, 2015 Congressional Research Service 7-5700 www.crs.gov
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Information Security Risks when going cloud. How to deal with data security: an EU perspective.
Separating fact from fiction about new software licensing /SaaS/ cloud computing models: advantages, disadvantages and ethical implications. Information Security Risks when going cloud. How to deal with
Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015
Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security
2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP
2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
NATIONAL CYBERSECURITY PROTECTION ACT OF 2014
PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128
114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS
114 th Congress March, 2015 Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS On January 13, 2015, the Administration wrote a letter to Congress urging
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor
The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on
Position of the retail and wholesale sector on the Draft Data Protection Regulation in view of the trilogue 2015
2 September 2015 Position of the retail and wholesale sector on the Draft Data Protection Regulation in view of the trilogue 2015 We support the efforts of EU legislators to create a harmonised data protection
Online Lead Generation: Data Security Best Practices
Online Lead Generation: Data Security Best Practices Released September 2009 The IAB Online Lead Generation Committee has developed these Best Practices. About the IAB Online Lead Generation Committee:
SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon
This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Feature. Log Management: A Pragmatic Approach to PCI DSS
Feature Prakhar Srivastava is a senior consultant with Infosys Technologies Ltd. and is part of the Infrastructure Transformation Services Group. Srivastava is a solutions-oriented IT professional who
COMPUTER & INTERNET. Westlaw Journal. Expert Analysis Software Development and U.S. Export Controls
Westlaw Journal COMPUTER & INTERNET Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 1 / JUNE 13, 2013 Expert Analysis Software Development and U.S. Export Controls
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis
Westlaw Journal Computer & Internet Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 14 / DECEMBER 12, 2013 Expert Analysis The Cybersecurity Framework: Risk Management
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
Touring the World of Cybersecurity Law
SESSION ID: MODERATOR: LAW W04 Touring the World of Cybersecurity Law Alan Charles Raul PANELISTS: John Smith Vice President, Legal Cybersecurity & Privacy Raytheon Michael Sulmeyer Director, Cyber Security
New EU Data Protection legislation comes into force today. What does this mean for your business?
24 th May 2016 New EU Data Protection legislation comes into force today. What does this mean for your business? After years of discussion and proposals, the General Data Protection Regulation ( GDPR )
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
DIVISION N CYBERSECURITY ACT OF 2015
H. R. 2029 694 DIVISION N CYBERSECURITY ACT OF 2015 SEC. 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 2015. (b) TABLE OF CONTENTS. The table
Information Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
Department of Homeland Security
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
HIPAA Compliance: Are you prepared for the new regulatory changes?
HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @
Checklist for Breach Readiness Enabling a Resilient Organization Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Facts about breach violation impact
Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations
Submitted via [email protected] and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
Export Controls and Cloud Computing: Legal Risks
Presenting a live 90-minute webinar with interactive Q&A Export Controls and Cloud Computing: Legal Risks Complying with ITAR, EAR and Sanctions Laws When Using Cloud Storage and Services TUESDAY, APRIL
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
CSR Breach Reporting Service Frequently Asked Questions
CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could
When Can We Expect a Federal Data Breach Notification Law?
When Can We Expect a Federal Data Breach Notification Law? The Trials and Tribulations of Getting a DBN Bill through Congress. Alexi Madon Director of State Government Affairs, Midwest Cybersecurity Overview
Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security
Cloud Security Standardisation & Certification Arjan de Jong Policy Advisor Information Security Overview Economics of standardization and certification (EU) Legal requirements for (cloud) security International
Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance
Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance Agenda CSA History CloudCERT White House Legislative Announcements How is CSA addressing the issue of information sharing?
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
