Class Organization. Class participation is required and will be taken into account in final grading.
|
|
|
- Jeffrey McCoy
- 10 years ago
- Views:
Transcription
1 Cybersecurity: The Challenges of Securing Cyberspace Leonard Bailey and Kimberley Raleigh, Adjunct Professors Georgetown University Law Center Spring 2015 (Edited 3/21/15) Class meets for two hours on Wednesdays at 5:45 p.m. Overview. The course will explore why securing the Nation s computer systems, which has been a goal of multiple successive administrations and has broad bipartisan and public support has proven to be so difficult to realize. The topics presented will include the legal and policy framework for cybersecurity, roles and responsibilities of government agencies, private sector cybersecurity risk management, information sharing, and international issues including internet governance, law enforcement cooperation, and nation state activity in cyberspace. Office Hours and Availability. Professors Bailey and Raleigh are available for telephone conferences or meetings by appointment. To schedule, please contact Professor Bailey or Professor Raleigh at Class Organization. Class participation is required and will be taken into account in final grading. Laptops will be allowed in the classroom, but use of the Internet for any activity other than accessing course materials is not allowed. No audio or visual recording devices are permitted in the classroom. Readings. There is no assigned textbook for this class. The reading will consist of academic and general media articles, judicial decisions, statutes, regulations, and executive branch documents listed below. Documents listed below without a link will be posted on Courseware. Additional readings on topical issues will be added to Courseware after the start of the semester. The professors will endeavor to inform the class when materials are added, but students are responsible for checking the website before class each week. The class password is. Writing Assignment. There will be a short, pass/fail writing assignment to prepare students for participation in the exercise that we will be conducting in class 9. The assignment will be due at the beginning of that class and counts toward the class participation grade. To receive credit for its completion, students must turn it in on time. Class Presentation. Students will select a topic and a partner and prepare a ten minute class presentation. An additional five minutes will be reserved for each pair to engage the class in a question and answer session. Active class participation is expected. Exam. There will be a four- hour take- home exam that will cover concepts from class and the readings. The exam questions will be available from the beginning of the exam period; answers must be turned in by Monday, May 4, 2015 at 9 a.m. Grading. Class Participation: 20%
2 Class Presentation: 30% Exam: 50% Course Syllabus and Reading Assignments. 1. January 14, 2015: Course Overview and Cyber Threats (Prof. Bailey and Prof. Raleigh) Steven G. Bradbury, The Developing Legal Framework for Defensive and Offensive Cyber Operations, 2 Harv. Nat'l Sec. J. 591 (2011), available at developing- legal- framework- for- defensive- and- offensive- cyber- operations/ Gregory T. Nojeim, Cybersecurity: An Idea Whose Time Has Not Come And Shouldn t, 8 I/S: J. L. & Pol'y for Info. Soc'y 413 (Fall 2012), available at Amanda Vicinanzo, U.S. Cybersecurity Practices Fail to Keep Pace with Cyber Adversaries, available at news/single- article/us- cybersecurity- practices- fail- to- keep- pace- with- cyber- adversaries/170a083812f4f52eb d8739a0.html a. What is cybersecurity? b. Who are the stakeholders? c. Who conducts cybersecurity activities and uses cybersecurity authorities? d. What are the cyber threats that pose the greatest risk to information systems? 2. January 21, 2015: Internet Technology and Its Impact on Legal Frameworks (Prof. Bailey) Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Lawrence G. Roberts, Stephen S. Wolff, The Past and Future of the Internet, available at ttp://groups.csail.mit.edu/ana/publications/pubpdfs/the%20past%20and%20future%20history%20of% 20the%20internet.pdf [Available on Courseware] Kyllo v. United States, 533 U.S. 27 (2001) [Excerpt on Courseware] United States v. Forrester, 512 F.3d 500, 510 (9th Cir. 2007) [Excerpt On Courseware] United States v. Knotts, 460 U.S.276 (1983) [Excerpt On Courseware] a. Why was the Internet created and what purposes was it intended to serve? b. How did this vision of the Internet influence its subsequent development and use? c. How have courts approached interpreting the law in cases in which technology is central to the disposition of the case? 3. January 28, 2015: Corporate Cybersecurity Risk Management Part 1 (Prof. Raleigh) Michael Riley, Ben Elgin, Duen Lawrence, and Carol Matlack, Missed Alarms and 40 Million Stolen Credit Cards: How Target Blew It, in Bloomberg Businessweek, available at 13/target- missed- alarms- in- epic- hack- of- credit- card- data
3 In re Target Corporation Customer Data Security Breach Litigation - Consumer Cases, available at McDonald Hopkins, Data Privacy Class Action Puts Bulls Eye On Target s Directors and Officers, available at privacy- class- action- puts- bulls- eye- on- targets- directors- and- officers Division of Corporation Finance, SEC, CF Disclosure Guidance: Topic No.2, Cybersecurity, October 13, 2011, available at topic2.htm Community Health Systems, Inc., SEC Form 8- K, available at a. Who manages cyber risk in an organization? b. How do we incentivize adoption of good cyber hygiene? c. Who should bear the cost of a breach? 4. February 4, 2015: Corporate Cybersecurity Risk Management Part 2 (Prof. Raleigh) Julie Brill, Comm r, FTC, On the Front Lines: the FTC s Role in Data Security (Sept. 17, 2014), available at FTC v. Wyndham Worldwide Corporation et al., Opinion Denying Motion to Dismiss, available at Federal Trade Commission, In the Matter of TRENDnet, Inc., complaint, available at and consent decree, available at Dissenting Statement of Comm r Michael O Rielly, FCC, TerraCom, Inc. and YourTel America, Inc., Apparent Liability for Forfeiture, File No.: EB- TCD , available at a5. a. What is FTC s authority to regulate data security? b. Are regulatory agencies required to provide notice through rule- making? 5. February 11, 2015: Legal Framework for Monitoring Electronic Communications (Prof. Bailey) Smith v. Maryland, 442 U.S. 735 (1979) [Excerpt on Courseware] California v. Riley, 134 S.Ct (2014) [Excerpt on Courseware] United States v. Cotterman, 709 F.3d 952 (9 th Cir. 2013) [Excerpt on Courseware] United States v. New York Telephone, 434 U.S. 159 (1977) 18 U.S.C and 2511 [Excerpt on Courseware] 18 U.S.C [Excerpt on Courseware] 18 U.S.C [Excerpt on Courseware] a. How does cybersecurity monitoring implicate the Fourth Amendment and electronic surveillance statutes? b. What different types of electronic communications do the Wiretap Act, Pen Register/Trap and Trace Statute, and Stored Communications Act regulate?
4 c. How are cybersecurity activities conducted without violating these constitutional and statutory provisions? 6. February 25, 2013: Computer Crimes (Prof. Bailey) 18 U.S.C [Excerpt on Courseware] Ciphertrust White Paper, What Hackers Know that You Don t, available at %20What%20 %20Hackers%20Know%20That%20You%20Do%20Not.pdf [Available on Courseware] United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc) [Excerpt on Courseware] Orin Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, 94 Minn. Law Rev (2010) available at content/uploads/2012/03/kerr MLR.pdf [Available on Courseware] Criminal Complaint in United States v. Auernheimer, available at Govt%20Criminal%20Complaint.pdf [Available on Courseware] a. How should a computer intrusion be defined by law? b. What should determine whether unauthorized access has occurred and how do they potentially affect cybersecurity activities conducted for non- malicious purposes (e.g., computer security research)? c. What challenges are raised in pursuing these offenses? 7. March 4, 2015: Cybersecurity Standards, Threat Information Sharing, and Law Enforcement Cooperation (Prof. Raleigh) Rosenzweig, Paul, Cybersecurity, the Public/Private 'Partnership,' and Public Goods (September 7, 2011), Hoover National Security and Law Task Force, 2011, pp 8-29, available at SSRN: Executive Order 13636, Improving Critical Infrastructure Cybersecurity, available at press- office/2013/02/12/executive- order- improving- critical- infrastructure- cybersecurity Executive Order [], Promoting Private Sector Cybersecurity Information Sharing, available at press- office/2015/02/13/executive- order- promoting- private- sector- cybersecurity- information- shari Department of Justice Response to CyberPoint International Request for Business Review Letter, available at w/ htm Skim: NIST, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, February 12, 2014, available at framework pdf Council of Europe Convention on Cybercrime, Chapter III- - International Co- operation, available at
5 a. What are the goals of information sharing? b. What legal and policy issues may impede information sharing? c. Should the government have a role in mandating that critical infrastructure entities maintain a certain standard of network defense? d. Should the government be expected to defend the private sector from network attacks perpetrated by nation states? e. How does the US share information with international partners, and what mechanism is there for cross- border investigative assistance? 8. March 18, 2015: Cybersecurity Incident Response (Prof. Bailey) Solar Sunrise Video [Available at Lysa Myers, Active Defense: Good Protection Doesn t Need to be Offensive, [Available at defense- good- protection- doesnt- need- to- be- offensive/] Stewart Baker, Steptoe and Johnson Blog, available at hackback- debate/ [Available on Courseware] Mark Young, U.S. Government Cybersecurity Relationships, 8 I/S: J. L. & Pol'y for Info. Soc'y 281 (Fall 2012) [Excerpt online available at a. Who in the government is in charge of cybersecurity? b. How are cyber incidents handled by the private sector and the government? What factors determine how a cyber incident is handled? c. Can a victim hack back to secure its stolen data? 9. March 25, 2015: Table Top Exercise (Prof. Bailey and Prof. Raleigh) Exercise Scenario to be provided to students. 10. April 1, 2015: International Law and Nation State Conduct in Cyberspace (Prof. Raleigh) Michael N. Schmitt, International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed, 54 HARV. INT L L.J. ONLINE 13 (2012), available at articles- online 54 schmitt/ Eichensehr, Kristen, The Cyber- Law of Nations (January 8, 2014). 103 Geo. L.J. 317 (2015), available at SSRN: Review: Section III, Offensive Cyber Operations in Steven G. Bradbury, The Developing Legal Framework for Defensive and Offensive Cyber Operations, 2 Harv. Nat'l Sec. J. 591 (2011), available at developing- legal- framework- for- defensive- and- offensive- cyber- operations/ a. Do the laws of war provide an adequate framework for nation state activity on the Internet? b. What constitutes a use of force in cyberspace? c. When does a cyber attack amount to an armed attack?
6 d. How does uncertain attribution impact a state s response to a cyber attack? e. What non- military action might the US Government take in response to a network attack by a nation state? f. How is the Internet governed? 11. April 8, 2015: The Future of Cybersecurity and STUDENT PRESENTATIONS (Prof. Bailey and Prof. Raleigh) Paul Rosensweig, The Organization of the United States Government and Private Sector for Achieving Cyber Deterrence, available at sites.nationalacademies.org/cs/groups/cstbsite/documents/webpage/cstb_ pdf [Available on Courseware]. Vivek Wadhwa, Laws and Ethics Can't Keep Pace with Technology, MIT Technology Review (2014) available at and- ethics- cant- keep- pace- with- technology/ 12. April 15, 2015: STUDENT PRESENTATIONS (Prof. Bailey and Prof. Raleigh) 13. April 22, 2013: Course Wrap- Up (review, Q&A, exam overview, class evaluations) (Prof. Bailey and Prof. Raleigh)
Information Security Law: Control of Digital Assets.
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
Prepared for distribution at the CYBERSECURITY 2015: MANAGING THE RISK Program September 25, 2015
Prepared for distribution at the CYBERSECURITY 2015: MANAGING THE RISK Program September 25, 2015 CONTENTS: PROGRAM SCHEDULE... 11 FACULTY BIOS... 19 1. Big Picture Cyber: Threats, Vulnerabilities and
Please see Section IX. for Additional Information:
The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) BILL: CS/CS/SB 222 Prepared By:
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Retaliatory Hacking: Risky Business or Legitimate Corporate Security?
Retaliatory Hacking: Risky Business or Legitimate Corporate Security? 1 Presenter: Sean L. Harrington Cybersecurity Partnership Manager and information security risk assessor in the banking industry; Digital
TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures
TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 [email protected] (202) 661-3935 Why share information? Prevention
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS
CYBERSECURITY PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS by Dr. Lawrence A. Gordon ([email protected]) EY Professor of Managerial Accounting and Information Assurance Affiliate
FINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
The Problems With SEC s Cybersecurity Approach
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] The Problems With SEC s Cybersecurity Approach Law360,
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
Technology, Security, and Conflict in the Cyber Age IGA-236M, Harvard Kennedy School January 2015 Faculty: Professor James Waldo
Course Description: Technology, Security, and Conflict in the Cyber Age IGA-236M, Harvard Kennedy School January 2015 Faculty: Professor James Waldo In our information age security policy, strategy, and
Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
Case 3:09-cr-00856-JAP Document 84 Filed 11/30/11 Page 1 of 7 PageID: 376
Case 3:09-cr-00856-JAP Document 84 Filed 11/30/11 Page 1 of 7 PageID: 376 U.S. Department of Justij$ Paul Kemp, Esq.. Ethridge, Quinn, Kemp, McAuliffe, Rowan & 33 Wood Lane Rockville, Maryland 20850 Criminal
PUBLIC HEALTH LAW AND ETHICS
PUBLIC HEALTH LAW AND ETHICS LAWJ-364-05 Fall Term, 2002 Tuesdays 5:45-8:50 PM Room 160 Georgetown University Law Center Professor Lawrence O. Gostin Syllabus COURSE OBJECTIVES Ensuring the health and
SYLLABUS TAX FRAUD AND TAX CRIMES LAWG 2033 09
SYLLABUS TAX FRAUD AND TAX CRIMES LAWG 2033 09 Course Description and Purpose. This course offers first-hand insight into how federal criminal tax cases are investigated and prosecuted. Taught by federal
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
Cybercrime in Canadian Criminal Law
Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime
To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG15121 Discussion Draft S.L.C. 114TH CONGRESS 1ST SESSION S. XXXX To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015
Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
TITLE I FORMER VICE PRESIDENT PROTECTION ACT
122 STAT. 3560 PUBLIC LAW 110 326 SEPT. 26, 2008 Sept. 26, 2008 [H.R. 5938] Former Vice President Protection Act of 2008. 18 USC 1 note. Public Law 110 326 110th Congress An Act To amend title 18, United
Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime (3d ed.)
Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime (3d ed.) Edited by Ralph D. Clifford Carolina Academic Press, Durham, North Carolina, ISBN 978-1-59460-853-7 Price $38.00,
Big Data As a Threat? An Alternative Approach to Cybersecurity
Big Data As a Threat? An Alternative Approach to Cybersecurity February 11, 2015 Brian Finch, Pillsbury Winthrop Shaw Pittman Brian Fox, PwC Pillsbury Winthrop Shaw Pittman LLP Data Breaches and Cyber
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy
Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy We thank the administration for this valuable opportunity to engage in a national
Case 8:13-cv-01731-VMC-TBM Document 36 Filed 03/17/14 Page 1 of 11 PageID 134 UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION
Case 8:13-cv-01731-VMC-TBM Document 36 Filed 03/17/14 Page 1 of 11 PageID 134 JOHN and JOANNA ROBERTS, UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION Plaintiffs, v. Case No. 8:13-cv-1731-T-33TBM
Cyber-insurance: Understanding Your Risks
Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
Cybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
UNIVERSITY OF WISCONSIN-EAU CLAIRE COLLEGE OF ARTS AND SCIENCES Department of Political Science Criminal Justice Program
UNIVERSITY OF WISCONSIN-EAU CLAIRE COLLEGE OF ARTS AND SCIENCES Department of Political Science Criminal Justice Program CRIMINAL JUSTICE 103/SOCIOLOGY 103 SURVEY OF THE CRIMINAL JUSTICE SYSTEM Tuesday
Advanced Eye Care & Optical 499 E Winchester Blvd., Suite 101 Collierville, TN 38017 Phone: 901-850-2366 Fax: 901-850-2367
NOTICE OF PRIVACY PRACTICES THIS NOTICE OF PRIVACY PRACTICES ( NOTICE ) DESCRIBES HOW WE MAY USE OR DISCLOSE YOUR HEALTH INFORMATION AND HOW YOU CAN ACCESS TO SUCH INFORMATION. PLEASE READ IT CAREFULLY.
Data Breach Response Planning: Laying the Right Foundation
Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
FACT SHEET: PROJECT SAFE CHILDHOOD
FACT SHEET: PROJECT SAFE CHILDHOOD Project Safe Childhood Project Safe Childhood is a Department of Justice initiative launched in 2006 to combat the proliferation of technology-facilitated crimes involving
S. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG Discussion Draft S.L.C. TH CONGRESS ST SESSION S. ll To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. IN THE
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act
In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee
Cybercrime CCJS 418B Spring 2014
Cybercrime CCJS 418B Spring 2014 Instructor Professor David Maimon Lecture Tuesday and Thursday 2:00-3:15 Architecture Building 1105 Office hours Tuesday and Thursday 11:00-12:00 and by appointment Phone
UN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
Legal and Ethical Issues Facing Computer & Network Security Researchers
Legal and Ethical Issues Facing Computer & Network Security Researchers Aaron Burstein UC Berkeley School of Information November 23, 2009 Constraints on Network Research U.S. law is often unclear (and
Pulmonary Associates of Richmond, Inc. Notice of Privacy Practices Page 1 of 6
Page 1 of 6 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. If you have any questions about
UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES
UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES 1 Effective Date: January 26, 2015 THIS NOTICE APPLIES TO THE UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM
S. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
DIVISION N CYBERSECURITY ACT OF 2015
H. R. 2029 694 DIVISION N CYBERSECURITY ACT OF 2015 SEC. 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 2015. (b) TABLE OF CONTENTS. The table
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
BSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? FREEMAN WOOD HEAD OF MERCER SENTINEL NORTH AMERICA GREGG SOMMER HEAD OF OPERATIONAL RISK ASSESSMENTS MERCER
CYBERSECURITY RISK MANAGEMENT
CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS
