CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS
|
|
|
- Suzan Fleming
- 10 years ago
- Views:
Transcription
1 CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson WASHINGTON, D.C. Satish M. Kini Renee M. Cipro 2013 has begun with an acute focus on cyberthreats and cybersecurity. In particular, concern about the safety of U.S. critical infrastructure has grown in the wake of cyber intrusions targeted at a wide range of industries including construction, energy, transportation, information technology and financial services that have been used to bring down corporate websites, steal valuable intellectual property and gain access to non-public personal information on thousands of individuals. Intrusions have been linked to state actors including Iran, which U.S. authorities believe has been targeting U.S. firms in reaction to U.S. sanctions programs, and the Chinese military, as well as to criminals and so-called hacktivists. President Obama addressed these concerns in his State of the Union address and simultaneously issued a much-anticipated Executive Order entitled Improving Critical Infrastructure Cybersecurity. 1 Last week, the White House released a strategy report that outlined new federal efforts, including trade restrictions and diplomatic steps, against countries that commit corporate espionage. Meanwhile, a new version of the controversial Cyber Intelligence Sharing and Protection Act ( CISPA ) has been re-introduced in the U.S. House of Representatives. CISPA, which was passed by the House in 2012 but was not enacted by the Senate due principally to privacy concerns, 1 Executive Order Improving Critical Infrastructure Cybersecurity, 78 Fed. Reg (Feb. 19, 2013).
2 would permit companies to share information with the federal government relating to cyber-security threats and provide protection from liability for such sharing. In this Update, we focus most closely on President Obama s Executive Order. We first review what the Executive Order may mean for firms operating in critical industries and then provide a broader summary of the Order. Key Implications of the Executive Order Requirements for Information Sharing. The Executive Order contains directives for the federal government to disseminate information about cyberthreats to critical infrastructure companies (a broad concept that could cover almost any firm of significance in the economy) and others. Importantly, unlike CISPA, the Executive Order calls for one-way information sharing and does not require industry to share information with the government. Nonetheless, critical infrastructure firms likely will need to take affirmative steps to participate fully in the information sharing: Firms will need to obtain appropriate security clearances for personnel in order to receive classified information from the government and may need to develop protocols for handling and safeguarding government threat and technical reports. Imposition of Standards. The Executive Order directs the federal government to develop a set of standards, procedures and processes to help critical infrastructure firms to identify, assess and manage cyber risks. Although the Order describes the standards as voluntary, the Order directs the Department of Homeland Security ( DHS ) to develop incentives to encourage participation with the standards and requires annual reports on the level of participation by critical infrastructure entities. Accordingly, critical infrastructure firms may find themselves under pressure to adopt government-developed standards, which are voluntary in name only. In addition, the voluntary standards may be a prelude to further developments: this week, the White House announced plans to submit priorities for cybersecurity legislation to Congress. Shaping the Standards. The Executive Order provides few details about the cybersecurity framework to be developed but does call for an open public review and comment process. Firms particularly in financial services, information technology and other industries that already have relatively advanced cyber-security standards in place will want to participate in the process by which this framework is developed, to ensure that standards are workable and accord with existing practices. The development process is already commencing; the National Institute of Standards and 2
3 Technology ( NIST ) has put out an extensive request for information regarding riskmanagement practices, standards and guidelines. 2 Potential Liability. Firms that fail to adopt standards developed under the Executive Order or that fail to take countermeasures based on government-supplied threat information may be exposed to various regulatory and litigation risks if they subsequently experience data and cyber-security breaches. Regulators or private litigants (possibly in the form of class-action plaintiffs) could argue that any such firm disregarded industry standards and government-issued red flags and did not take reasonably prudent measures to address vulnerabilities. Summary of the Executive Order The Executive Order seeks to improve sharing of cyber-security information and to foster the development of risk-based cyber-security standards in collaboration with the owners and operators of critical infrastructure. Defining Critical Infrastructure. The Executive Order provides an expansive definition of critical infrastructure, including systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, economic security or public health and safety. A Presidential Policy Directive entitled Critical Infrastructure Security and Resilience, which accompanied the Executive Order, highlights the expansiveness of the term by identifying 16 different industries that constitute critical infrastructure : chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waster, transportation systems, water and waste water systems. The Executive Order instructs the DHS Secretary, within 150 days, to identify critical infrastructure at the greatest risk of a cyber-security incident that would result in catastrophic regional or national effects on public health or safety, economic security, or national security. In an apparent bow to privacy concerns, DHS is instructed to exclude commercial information technology and consumer information technology services. Sharing Information with Critical Infrastructure Firms. New information sharing programs established under the Executive Order will provide both classified and 2 See Developing a Framework To Improve Critical Infrastructure Cybersecurity, 78 Fed. Reg (Feb. 26, 2013) (seeking comments by April 8, 2013). 3
4 unclassified information about threats to U.S. critical infrastructure companies. The DHS Secretary, the Attorney General and the Director of National Intelligence are required to issue instructions to ensure timely production of unclassified reports of cyberthreats to targeted U.S. companies. In addition, critical infrastructure entities also will enjoy greater access to classified information of cyberthreats as a result of (i) expedited processing of security clearances for personnel employed by critical infrastructure entities, and (ii) the establishment of a voluntary information sharing program that will expand the existing Enhanced Cyber- Security Services Program to provide classified cyber-threat information and technical information beyond the defense-industrial base to all eligible entities in critical infrastructure sectors. Cyber-Security Framework. The Executive Order instructs NIST, an agency within the Commerce Department, to work collaboratively with industry to develop a technologyneutral, flexible and cost-effective cyber-security framework that incorporates existing international standards, practices and procedures. The framework will be designed to help owners and operators of critical infrastructure assess, manage and mitigate cyber risks. As noted above, NIST has already commenced its work in response to the Executive Order. On February 26, NIST asked for responses to 33 questions regarding risk-management, best and industry practices; the questions seek information on how organizations assess risks, what cyber-security approaches are used and what limitations exist with respect to these approaches and how approaches relate to international standards. NIST indicates that responses to these questions will help it to develop the framework. In addition, NIST indicates that its outreach will include interactive workshops with industry and academia. Per the Executive Order, executive branch agencies with responsibility for regulating the security of critical infrastructure are required to review the framework for sufficiency and to develop industry-specific implementation guidance, as necessary. In addition, a voluntary program to support adoption of the framework will be developed by the DHS in cooperation with sector-specific agencies ( SSAs ) and sector coordinating councils representing industry. The Treasury Department is the SSA for the financial services industry. The Order directs DHS to establish a set of incentives to promote participation in the program. DHS, the Treasury Department, and the Commerce Department are each required to make recommendations to the President analyzing the benefits and 4
5 effectiveness of such incentives and whether the incentives would require legislation or can be provided to participants under existing law and authorities. Privacy. Recognizing the privacy concerns that caused CISPA and similar legislative efforts to stall in Congress, the Executive Order is careful to address privacy safeguards. Executive branch agencies must coordinate their activities under the order with senior agency officials for privacy to ensure that the appropriate protections are incorporated. In addition, the Chief Privacy Officer and the Officer for Civil Rights and Civil Liberties of DHS must assess the privacy and civil liberties risks of the functions undertaken by DHS and recommend ways to minimize or mitigate such risks. Conclusion The Executive Order could have broad implications for many U.S. firms. In addition to being watchful as the Executive Order s directives are implemented, critical infrastructure firms may want to take the Order as a prompt to review and update their own policies and practices with regard to cybersecurity. * * * Please do not hesitate to contact us with any questions. March 1,
Billing Code: 3510-EA
Billing Code: 3510-EA DEPARTMENT OF COMMERCE Office of the Secretary National Institute of Standards and Technology National Telecommunications and Information Administration [Docket Number: 130206115-3115-01]
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order
Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses
September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President
004216 THE WHITE HOUSE WASHINGTON MEMORANDUM FOR September 28, 2 012 MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President MR. STEPHEN D. MULL Executive
Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis
Westlaw Journal Computer & Internet Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 14 / DECEMBER 12, 2013 Expert Analysis The Cybersecurity Framework: Risk Management
NH!ISAC"ADVISORY"201.13" NATIONAL"CRITICAL"INFRASTRUCTURE"RESILIENCE"ANALYSIS"REPORT""
National(Health#ISAC#(NH!ISAC) GlobalInstituteforCybersecurity+Research7GlobalSituationalAwarenessCenter NASA SpaceLifeSciencesLaboratory KennedySpaceCenter,FL NH!ISACADVISORY201.13 NATIONALCRITICALINFRASTRUCTURERESILIENCEANALYSISREPORT
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Cybersecurity Primer
Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
The NIST Cybersecurity Framework
View the online version at http://us.practicallaw.com/5-599-6825 The NIST Cybersecurity Framework RICHARD RAYSMAN, HOLLAND & KNIGHT LLP AND JOHN ROGERS, BOOZ ALLEN HAMILTON A Practice Note discussing the
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel [email protected]
NATIONAL CYBERSECURITY PROTECTION ACT OF 2014
PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128
SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.
SECTION-BY-SECTION Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. Section 2. Definitions. Section 2 defines terms including commercial information technology product,
How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
What are you trying to secure against Cyber Attack?
Cybersecurity Legal Landscape Bonnie Harrington Executive Counsel EHS and Product Safety & Cybersecurity GE Energy Management Imagination at work. What are you trying to secure against Cyber Attack? Personally
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act
In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee
How To Understand And Manage Cybersecurity Risk
White Paper A Framework to Gauge Cyber Defenses NIST s Cybersecurity Framework Helps Critical Infrastructure Owners to Cost-Effectively Defend National & Economic Security of the U.S. Executive Summary
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
NIST Cybersecurity Framework. ARC World Industry Forum 2014
NIST Cybersecurity Framework Vicky Yan Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy
Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Submitted via email: [email protected] April 8, 2013 Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Developing a Framework
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 Eric A. Fischer Senior Specialist in Science and Technology April 20, 2015 Congressional Research Service 7-5700 www.crs.gov
DIVISION N CYBERSECURITY ACT OF 2015
H. R. 2029 694 DIVISION N CYBERSECURITY ACT OF 2015 SEC. 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 2015. (b) TABLE OF CONTENTS. The table
NIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
Why you should adopt the NIST Cybersecurity Framework
Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business
S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business
Preservation of longstanding, roles and missions of civilian and intelligence agencies
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
Cybersecurity and Hospitals. Four Questions Every Hospital Leader Should Ask in Order to Prepare for and Manage Cybersecurity Risks
Cybersecurity and Hospitals Four Questions Every Hospital Leader Should Ask in Order to Prepare for and Manage Cybersecurity Risks This resource was prepared exclusively for American Hospital Association
Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy
Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the
Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS
Delving Into FCC's 'Damn Important' Cybersecurity Report
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Delving Into FCC's 'Damn Important' Cybersecurity
Cybersecurity for Medical Devices
Cybersecurity for Medical Devices Suzanne O Shea Kathleen Rice January 29, 2015 Why Is This Important? Security Risks in the Sensors of Implantable Medical Devices Over the last year, we ve seen an uptick
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
Treasury Department Report to the President on. Cybersecurity Incentives Pursuant to Executive Order 13636
Treasury Department Report to the President on Cybersecurity Incentives Pursuant to Executive Order 13636 SUPPORTING ANALYSIS PART I: INTRODUCTION Our national and economic security depends on the reliable
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
How To Protect Yourself From Cyber Crime
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative
PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection
More Intelligent, More Effective Cybersecurity Protection January 2013 Business Roundtable (BRT) is an association of chief executive officers of leading U.S. companies with more than $7.3 trillion in
FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness
United States Government Accountability Office Report to Congressional Committees September 2013 FEDERAL INFORMATION SECURITY Mixed Progress in Implementing Program Components; Improved Metrics Needed
S. ll IN THE SENATE OF THE UNITED STATES A BILL
TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 18, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 Report Documentation Page Form Approved
How To Protect Your Data From Being Hacked
Cyber Division & Manufacturing Division Joint Working Group Cyber Security for the Advanced Manufacturing Enterprise Manufacturing Division Meeting June 4, 2014 Michael McGrath, ANSER [email protected]
To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG15121 Discussion Draft S.L.C. 114TH CONGRESS 1ST SESSION S. XXXX To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
1st Session 114 83 NATIONAL CYBERSECURITY PROTECTION ADVANCEMENT ACT OF 2015
114TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 114 83 NATIONAL CYBERSECURITY PROTECTION ADVANCEMENT ACT OF 2015 APRIL 17, 2015. Committed to the Committee of the Whole House on the State
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
Critical Infrastructure Security and Resilience
U.S. Department of Homeland Security in partnership with the National Coordination Office for Space-Based Positioning, Navigation and Timing Critical Infrastructure Security and Resilience International
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
CRS Reports & Analysis Print Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist ([email protected], 7-6739) View Key CRS Policy Staff May
S. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,
Cybersecurity: Authoritative Reports and Resources
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 11, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace
Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace Testimony of Ben Beeson Vice President, Cyber Security and Privacy Lockton
How To Protect Your Cybersecurity From Cyber Incidents
SEC ENFORCEMENT The SEC s Two Primary Theories in Cybersecurity Enforcement Actions By Daniel F. Schubert, Jonathan G. Cedarbaum and Leah Schloss WilmerHale Cyber attacks are increasingly common and affect
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP
Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government
Incentives to Encourage Adoption of. the NIST Cybersecurity Framework
Incentives to Encourage Adoption of the NIST Cybersecurity Framework Preston C. Stinson Mississippi State University Washington Internships for Students of Engineering 2014 July 31, 2014 CONTENTS Contents
S. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG Discussion Draft S.L.C. TH CONGRESS ST SESSION S. ll To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. IN THE
INFRAGARD.ORG. Portland FBI. Unclassified 1
INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District
U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District Securing the Nation s s critical infrastructures one community at a time Critical Infrastructure & Key Resources
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to
This directive establishes the Department of Homeland Security (DHS) Security Education, Training, and Awareness (SETA) Program.
Department of Homeland Security Management Directive System MD Number: 11053 Issue Date: 10/12/2004 SECURITY EDUCATION, TRAINING, AND AWARENESS PROGRAM DIRECTIVE 1. Purpose This directive establishes the
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter 1. In what ways do private entities currently share with, and receive from, the government cyber threat information?
U.S. Cyber Security Readiness
U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National
