Cybersecurity Critical Infrastructure Sectors

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Department of Energy invests $34M in cybersecurity for critical infrastructure

The Department of Energy (DOE) has announced that it will invest $34M to the University of Arkansas and the University of Illinois for two projects designed to “improve and enhance” the protection of the U.S. electric grid,...more

[Event] 2015 Cybersecurity Seminar: Identifying and Mitigating Data Breaches and Related Liabilities - Oct. 29th, Richmond, VA

October is National Cyber Security Awareness Month! Please join Williams Mullen, Marsh and EY for an in-depth discussion on effective strategies for identifying and mitigating data breach and related liabilities. WHO...more

NIST Guide Highlights Cybersecurity Considerations for Utilities and Manufacturing Companies

In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more

China’s Draft Cybersecurity Law – A New Regime for Network Security

China’s current leadership has attached significant attention to network security, which is deemed to be a core aspect of national security. In early 2014, China’s President, Xi Jinping, who is also the head of the Office for...more

We’re All About Sharing Cyber Information: The National Cybersecurity and Communications Integration Center

Amidst the maelstrom of unceasing cyber attacks and intrusions, the National Cybersecurity and Communications Integration Center (NCCIC or Center) assumes a front-and-center role as the government command and communication...more

Congressional Action Supports Improvement of Cybersecurity for Critical Infrastructure and Beyond

None of us in the United States – no family or individual, no industry or business, and no government agency – is immune from the potential devastation that cyber-attacks can wreak. No particular reminder is needed. Each day,...more

New Executive Order Allows for Sanctions Related to Cybersecurity

On April 1, 2015, President Obama issued a groundbreaking Executive Order (E.O.) enabling the United States to sanction persons that have (1) participated in malicious cyber-enabled activities constituting a “significant...more

New US sanctions program to combat cybercrimes: 3 action steps for tech companies

The new sanctions in President Barack Obama’s Executive Order 13694 of April 1, 2015, “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities,” target individuals and...more

New Executive Order Authorizes Economic Sanctions to Combat Malicious Cyber Activity

Calling cyber threats “one of the most serious economic and national security challenges to the United States” and declaring a national emergency relating to those threats, on April 1, 2015, President Obama issued an...more

Obama Administration Recognizes Cyber Threats to U.S. Critical Infrastructure as a National Emergency

Many cybersecurity experts have warned that the United States is already engaged in covert cyber warfare against hostile actors around the world. The latest cybersecurity Executive Order reflects formal recognition that,...more

Executive Order Blocks Property of Those Engaging in Malicious Cyber Activities

The executive order enables US government agencies to block the assets of any foreign person determined to have engaged in malicious cyber-enabled activities....more

U.S. Authorizes Targeted Sanctions Against Overseas Cyber Threats

Cyber threats are one of the U.S.’s top security threats. In just the past year, there has been a significant increase in the frequency, scale and sophistication of cyber intrusions and attacks – many of them originating...more

President Obama’s April Fools' Day Order on Cyberterrorism – No Joking About It!

While it’s not clear whether the President’s release today of an Executive Order, "Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities," was purposefully timed to coincide with...more

Cyber Vulnerability in Wind Turbines

It has been reported that a wind turbine which is deployed across the energy sector worldwide has been hacked. Due to a software bug, an attacker can get the user name and password from the browser. This can allow admin...more

New York State Charges Ahead on Critical Infrastructure Cybersecurity Legislation

On Feb. 26, 2015, in an effort to make “New York State’s computer infrastructure the most secure in the nation,” the New York State Senate passed a suite of four cybersecurity-related bills focused on protecting critical...more

President Obama Issues Executive Order on Cybersecurity Information Sharing

On February 13, 2015, President Barack Obama signed an executive order entitled "Promoting Private Sector Cybersecurity Information Sharing" (the "Executive Order") to foster cybersecurity threat information sharing within...more

What General Counsel Need To Know About The Latest Cybersecurity Developments

In the wake of reported security breaches at a number of significant financial institutions, cybersecurity is garnering more attention and concern than ever before — both within the financial services industry and among...more

NIST Framework as Basis for Standard of Care for Cyber Security

When the National Institute of Standards and Technology (“NIST”) released its Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity (the “Framework”), (a priority program for the federal Department of...more

NIST RFI to Solicit Feedback on Cybersecurity Framework Closing: Good Opportunity to Assess Suggestions and Concerns

On Friday, October 10th, an opportunity to submit comments on a Request for Information concerning awareness and implementation of the “Framework for Improving Critical Infrastructure Cybersecurity” closes. Companies of all...more

House Passes Three Bipartisan Cybersecurity Bills to Protect Critical Infrastructure

On July 28, 2014, the House of Representatives passed three bills aimed at enhancing the cybersecurity efforts of the Department of Homeland Security (DHS) in certain critical infrastructure sectors, including the energy...more

House of Representatives Passes SAFETY Act Amendment

The U.S. House of Representatives took a major positive step towards increasing the nation’s cyber security posture today when, on a voice vote, it passed H.R. 3696, the “National Cybersecurity and Critical Infrastructure...more

Will the Cybersecurity Framework Create a New Standard Operating Procedure for Businesses?

On February 12, 2013, President Barack Obama issued Executive Order 13636 (EO 13636) entitled “Improving Critical Infrastructure Cybersecurity.”EO 13636 noted the importance of cybersecurity for the nation’s security and...more

Cybersecurity Is Not Just an IT Issue; It’s an IG Issue

For leaders and counsel in many organizations, the word “cybersecurity” typically triggers concerns about the IT department, conjuring images of hackers and requiring unfamiliar terminology such as “firewalls” and...more

The New Cybersecurity Framework—A Roadmap for All Companies

The recent string of well-publicized data breaches has demonstrated that cyber criminals are targeting companies of all sizes and in all industries. Even companies with the most sophisticated security systems admit that the...more

With Cyberattacks on the Rise, White House Releases Cybersecurity Framework

Given the apparent vulnerabilities evidenced by recent cyberattacks to big-box retailers, cybersecurity remains a top priority for both the federal government and private sector. On February 12, the National Institute of...more

97 Results
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.