How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
|
|
|
- Carmel Cole
- 10 years ago
- Views:
Transcription
1 How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner
2 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity Framework! Obama Administration s Agenda and Efforts! Congressional Responses: Hearings and Legislation
3 Agenda! Big Data: White House Report! Cyber Threat Information Sharing: CTIIC and Executive Order! White House Summit! Consumer Privacy Bill of Rights Act of 2015! Questions 3
4 U.S. Data Breaches on the Rise! Data breaches hit a record high in 2014! 783 incidents according to a recent report! 27 percent over the number of breaches reported in 2013! 18.3 percent over the previous high of 662 breaches tracked in 2010! So far in 2015:! As of April 21, 2015, 256 data breaches exposing 102,374,010 records Report by Identity Theft Resource Center (ITRC) 4
5 U.S. Data Breaches on the Rise! Data breaches hit a record high in breaches 618 breaches 783 breaches As of April 21, 2015: 256 data breaches exposing 102,374,010 records Source: Identity Theft Resource Center (ITRC) 5
6 Effect of Increasing Cybersecurity Threats Regulatory Changes?! The Obama Administration has announced an aggressive cybersecurity and data security agenda.! Congress has held a number of hearings and proposed new legislation in an attempt to address the issue. 6
7 Effect of Increasing Cybersecurity Threats Regulatory Changes?! Some of these new privacy, data security, and cybersecurity proposals may come to bear on operators in the coming years, adding to their already substantial regulatory burden. 7
8 Obama s Administration Cybersecurity Framework! First announced in President s 2013 State of the Union Address! Released on February 12, 2013! Intended to encourage companies to adopt best practices for critical infrastructure including global digital infrastructure, such as undersea communications cables that land in the U.S. 8
9 Obama s Administration Cybersecurity Framework Current Status: Remains entirely voluntary Lacks key incentives sought by industry stakeholders But it is too soon to handicap the success of the initiative 9
10 Obama s Administration Cybersecurity Agenda! On January 13 th, President Obama delivered remarks on cybersecurity initiatives at the Department of Homeland Security s (DHS) National Cybersecurity Communications Integration Center (NCCIC)! Proposed cybersecurity legislation! incentivizing the private sector to share cyber threat information with DHS! providing liability protections for companies that share information on cyber threats!. 10
11 Obama s Administration Cybersecurity Agenda! Obama also highlighted an initiative to update the authorities of law enforcement to better combat cyber crime! Given the rise of cyber crime, including recent announcement regarding IRS hack, the item will move higher up in priority 11
12 Obama s Administration Privacy and Data Security Efforts! On January 20 th, in the State of the Union Address, President Obama urged lawmakers to pass comprehensive cybersecurity legislation! White House Report- Big Data: Seizing Opportunities, Preserving Values! Executive Order - Cyber Threat Information Sharing! Consumer Privacy Bill of Rights 12
13 Congressional Response Hearings on Privacy and Data Security January 21 The U.S. Senate Commerce, Science, and Transportation Committee s hearing entitled, Protecting the Internet and Consumers Through Congressional Action January 27 The U.S. House Energy and Commerce Committee s Subcommittee on Commerce, Manufacturing, and Trade s hearing entitled, What Are the Elements of Sound Data Breach Legislation? The House Science, Space, and Technology Committee s Subcommittee on Research and Technology s hearing entitled, The Expanding Cyber Threat March 18 The U.S. House Energy and Commerce Committee s Subcommittee on Commerce, Manufacturing, and Trade s hearing entitled, Discussion Draft of H.R., Data Security and Breach Notification Act of
14 Congressional Response Cybersecurity Legislation H.R Protecting the Cyber Networks Act improve cybersecurity through enhanced sharing of information about cybersecurity threats permit companies to voluntarily share cyberthreat information with the government and receive protection from liability require companies to omit individual personal information not related to a cybersecurity threat before submitting information to the government HR National Cybersecurity Protection Advancement Act of 2015 amend the Homeland Security Act of 2002 enhance multi-directional sharing of information and strengthen privacy and civil liberties protections designate NCCIC as lead civilian portal for voluntary cyber threat information sharing require double scrubbing of personal information unrelated to cybersecurity risk by companies and NCCIC enhance voluntary information sharing 14
15 Big Data White House Report! On February 5 th, the White House published an interim report entitled, Big Data: Seizing Opportunities, Preserving Values calls for utilization of big data, for law enforcement activities, among other things details the impact that big data has on the economy, government, and society, as well as the privacy concerns raised in its collection 15
16 Big Data White House Report concludes that individual privacy is far from perfect and technology alone cannot protect privacy absent strong social norms and a responsive policy and legal framework 16
17 Big Data Policy Recommendations! The Report makes policy recommendations for the President and Congress to consider, including: Advancing the Consumer Privacy Bill of Rights Passing national data breach legislation Extending privacy protections to non-u.s. persons Amending the Electronic Communications Privacy Act 17
18 Big Data Policy Recommendations! The Report specifically examines how big data may be used to strengthen the nation s local, state, and federal law enforcement communities. 18
19 Cyber Threat Information Sharing Creation of CTIIC! On February 10 th, the White House announced the creation of the Cyber Threat and Intelligence Integration Center (CTIIC) aims to enhance cyber threat information sharing across government agencies 19
20 Cyber Threat Information Sharing Creation of CTIIC! CTIIC will operate under the Office of the Director of National Intelligence collect and analyze cyber threat information to efficiently distribute to government agencies enable the government to quickly analyze and assess fast-moving cyber threats or cyberattacks enable existing government cyber units to do their jobs more effectively 20
21 Cyber Threat Information Sharing Executive Order! On February 12 th, President Obama issued an Executive Order: with the goal of promoting private sector cybersecurity information sharing discussing the importance of cybersecurity information sharing across government agencies, as well as between the government and the private sector. 21
22 Cyber Threat Information Sharing Executive Order! According to the Order, [r]apid information sharing is an essential element of effective cybersecurity, because it enables U.S. companies to work together to respond to threats, rather than operating alone. 22
23 Cyber Threat Information Sharing Executive Order! Framework to Enhance Information Sharing Developing a common set of voluntary standards for information sharing organizations Clarifying the Department of Homeland Security s authority to enter into agreements with information sharing organizations Streamlining private sector companies ability to access classified cybersecurity threat information 23
24 White House Summit Cybersecurity and Consumer Protection! On February 13 th, President Obama delivered prepared remarks which outlined four principles for private entities and government agencies to consider: 1. Share cybersecurity information with each other 2. Recognize when the government may be able to assist or provide information related to cybersecurity 24
25 White House Summit Cybersecurity and Consumer Protection 3. Evolve the company s or agency s cybersecurity practices 4. Focus on protecting the privacy and civil liberty of the American people 25
26 Consumer Privacy Bill of Rights Act of 2015! On February 27 th, the White House released a draft! Requires companies to:! provide conspicuous notice of how they use consumer data,! ensure that data is being used for its intended purpose, and! provide consumers with a method of having their data deleted 26
27 Consumer Privacy Bill of Rights Act of 2015! Permits industries to develop codes of conduct that would have to be approved by the Federal Trade Commission! Empowers the FTC and state attorneys general to enforce the privacy and data security policies and practices outlined in the proposal through civil penalties 27
28 Consumer Privacy Bill of Rights Baseline Protections for Consumers Individual Control Transparency Respect for Control Security Access and Accuracy Focused Collection Accountability 28
29 Baseline Protections for Consumers! Individual Control: Right to exercise control over what personal data organizations collect from them and how they use it.! Transparency: Right to easily understandable information about privacy and security practices.! Respect for Context: Right to expect that organizations will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data. 29
30 Baseline Protections for Consumers! Security: Right to secure and responsible handling of personal data.! Access and Accuracy: Right to access and correct personal data in usable formats, in a manner that is appropriate to the sensitivity of the data and the risk of adverse consequences to consumers if the data are inaccurate. 30
31 Baseline Protections for Consumers! Focused Collection: Right to reasonable limits on the personal data that companies collect and retain.! Accountability: Right to have personal data handled by companies with appropriate measures in place to assure they adhere to the Consumer Privacy Bill of Rights. 31
32 Recent Developments! Acquisition: Telstra finalized its acquisition of Pacnet Limited last month. " Telstra is the largest telecommunications and media company in Australia. " Pacnet provides connectivity and data center services to carriers, multinational corporations and governments in the Asia-Pacific region. 32
33 Recent Developments! Data Breach: Shortly have the acquisition, it was revealed that Pacnet s corporate system had been accessed by an unauthorized third party through an SQL vulnerability that enabled malicious software to be uploaded to the network and ultimately led to the theft of admin and user credentials. 33
34 Recent Developments " Telstra immediately addressed the vulnerability and has continued to monitor the network through its incident response capabilities. " There is no evidence that any activity extended to Telstra s networks the Pacnet corporate IT network remains isolated. " Pacnet customers and staff have been informed of the incident, Australian Federal Police have been notified as well. " Currently, there is no evidence that information was stolen from Pacnet s Network. 34
35 Questions?
36 For more information: Ross Buntrock All rights reserved. This presentation is intended to provide general information on various regulatory and legal issues. It is NOT intended to serve as legal advice or counsel on any particular situation or circumstance Arnall Golden Gregory LLP
Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act
In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee
Preservation of longstanding, roles and missions of civilian and intelligence agencies
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel [email protected]
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 [email protected] (202) 661-3935 Why share information? Prevention
114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS
114 th Congress March, 2015 Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS On January 13, 2015, the Administration wrote a letter to Congress urging
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 Eric A. Fischer Senior Specialist in Science and Technology April 20, 2015 Congressional Research Service 7-5700 www.crs.gov
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
S. ll IN THE SENATE OF THE UNITED STATES A BILL
TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson [email protected] WASHINGTON, D.C. Satish M. Kini [email protected] Renee
The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor
The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist November 17, 2015 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:
Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.
Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter 1. In what ways do private entities currently share with, and receive from, the government cyber threat information?
DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
NATIONAL CYBERSECURITY PROTECTION ACT OF 2014
PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128
How To Protect Yourself From Cyber Crime
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
CRS Reports & Analysis Print Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist ([email protected], 7-6739) View Key CRS Policy Staff May
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 18, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President
004216 THE WHITE HOUSE WASHINGTON MEMORANDUM FOR September 28, 2 012 MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President MR. STEPHEN D. MULL Executive
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 11, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum
Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s
Delving Into FCC's 'Damn Important' Cybersecurity Report
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Delving Into FCC's 'Damn Important' Cybersecurity
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 Report Documentation Page Form Approved
Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Submitted via email: [email protected] April 8, 2013 Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Developing a Framework
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business
S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance
Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance Agenda CSA History CloudCERT White House Legislative Announcements How is CSA addressing the issue of information sharing?
SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.
SECTION-BY-SECTION Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. Section 2. Definitions. Section 2 defines terms including commercial information technology product,
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
The Legal Pitfalls of Failing to Develop Secure Cloud Services
SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
Prepared for distribution at the CYBERSECURITY 2015: MANAGING THE RISK Program September 25, 2015
Prepared for distribution at the CYBERSECURITY 2015: MANAGING THE RISK Program September 25, 2015 CONTENTS: PROGRAM SCHEDULE... 11 FACULTY BIOS... 19 1. Big Picture Cyber: Threats, Vulnerabilities and
Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order
Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses
When Can We Expect a Federal Data Breach Notification Law?
When Can We Expect a Federal Data Breach Notification Law? The Trials and Tribulations of Getting a DBN Bill through Congress. Alexi Madon Director of State Government Affairs, Midwest Cybersecurity Overview
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
005ASubmission to the Serious Data Breach Notification Consultation
005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to [email protected]) Your details Name/organisation
Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation. Part I
Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation Part I March 20, 2014 Speakers John J. Sullivan, Partner, rejoined Mayer Brown after serving as General Counsel at the US Department
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of
FINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
Department of Homeland Security
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
Data Breach Notifications. Submission by the Australian Communications Consumer Action Network to the Attorney General s Department
Data Breach Notifications Submission by the Australian Communications Consumer Action Network to the Attorney General s Department November 2012 About ACCAN The Australian Communications Consumer Action
12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013
Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist September 20, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 Cybersecurity: Authoritative Reports
Privacy Amendment (Notification of Serious Data Breaches) Bill 2015 Regulation Impact Statement
Privacy Amendment (Notification of Serious Data Breaches) Bill 2015 Regulation Impact Statement Regulation Impact Statement i Contents Background... 1 Australian Law Reform Commission Report on Privacy...
Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP
Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
