Cybersecurity Cybersecurity Framework

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Patriot Act Reauthorization Debate Delays Cybersecurity Legislation

In This Issue: - Industry Liability Protections and Standards - Legislative Timeframe - Additional Notification Bill Expected - Conclusion - For More Information - Excerpt from Industry...more

Insurance Regulatory Bellwether: NAIC Adopts 12 Principles for Effective Cybersecurity for Regulators

The National Association of Insurance Commissioners (“NAIC”) is all over cybersecurity. On April 16, 2015, as a part of its aggressive work plan to help the insurance sector come up with an effective cybersecurity framework...more

Cybersecurity Workforce Measures Present Business Opportunities

As part of the federal government’s efforts to address cybersecurity needs in our age of state-sponsored hacking and other high-profile data breaches, the Department of Homeland Security (DHS) will soon undertake a...more

Secretary Of Homeland Security Seeks Cooperation Between Public And Private Sectors In Fight Against Cybercriminals

On April 21, 2015, Department of Homeland Security (“DHS”) Secretary Jeh Johnson spoke at the annual RSA Conference 2015. In his remarks, Johnson explained that, while the DHS was established primarily to focus on...more

Privacy & Cybersecurity Update - March 2015

In This Issue: - Dismissal in P.F. Chang’s Data Breach Case Shows Challenge Plaintiffs Face in Such Actions - Eleventh Circuit Court of Appeals Decision Underscores the Need to Evaluate Insurance Programs for Cyber...more

Effective cybersecurity: 8 questions for you and your team

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

A New Cyber World Framework to Strengthen Agency Information Security

Manufacturers, defense suppliers and other federal contractors may benefit from a new cybersecurity law intended to safeguard agency information and help bolster defenses to future cyber threats. The Federal Information...more

BSA Releases European Union Cybersecurity Dashboard

On March 3, BSA/The Software Alliance, a software industry advocacy group, released the EU Cybersecurity Dashboard: A Path to a Secure European Cyberspace (the “EU Dashboard”), an analysis of data security laws and policies...more

Higher Ed Legal Update, March 2015

Colleges and universities across America have recognized that unmanned aerial vehicles (UASs) – also known as drones -- have broad academic applications. Indeed, the Federal Aviation Administration reports that of the 900...more

Current UK Thinking on Cybersecurity

2014 contained a series of high profile data breaches, including the recent Sony breach in relation to the Hollywood film release of The Interview. It is expected that globally 2015 will focus further on fighting privacy and...more

Solving the Legal Challenges of Trustworthy Online Identity

In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions – “Who are you?” and “How can you prove it?” – is fast becoming a critical requirement for online business...more

The Government's Strategy to Combat the "Cyber Arms Race"

In the midst of ongoing, escalating and increasingly troublesome reports of large-scale corporate cyber breaches, the federal government is trying to fight back more forcefully with a dual strategy to shore up agency...more

The Private Sector’s Role in the New Face of Homeland Security

The Obama administration recently announced the creation of the Cyber Threat Intelligence Integration Center (CTIIC), a new governmental agency created to prevent cyber threats by analyzing and integrating digital...more

GAO Puts Cybersecurity and Privacy High Atop High Risk List

Agency Assessment Comes as President Signs Executive Order Increasing Cyber Sharing with the Private Sector Late last year, this post speculated whether 2015 would become “the Year of Cybersecurity.” Though 2015 is still...more

White House Holds Cybersecurity Summit at Stanford University

On Friday, February 13, 2015, President Obama delivered the keynote speech and signed an executive order on cybersecurity information sharing at the White House cybersecurity and privacy summit held at Stanford University. ...more

White House Creates New Federal Agency To Combat Cyber-Threats

The White House, on February 10, 2015, announced the creation of a new federal agency, the Cyber Threat and Intelligence Integration Center (“CTIIC” or the “Center”), to combat cyber-threats by coordinating digital...more

Update on President Obama’s “Summit on Cybersecurity and Consumer Protection,” Part II: The Executive Order

As a follow up to our summary of the key takeaways from the White House’s first Summit on Cybersecurity and Consumer Protection, the centerpiece of which was President Obama’s signing of a new Executive Order, “Promoting...more

President Obama Issues Executive Order Promoting Private Sector Cybersecurity Information Sharing

On Friday, February 13, 2015, President Obama signed an executive order, Promoting Private Sector Cybersecurity Information Sharing (the “EO”), designed to encourage private companies to share information regarding threats to...more

Is 2015 the Year of Data Protection?

The growing frequency, impact and sophistication of cyberattacks in the U.S. and abroad have highlighted the need to address America's lack of a unified federal cybersecurity framework. No single congressional committee or...more

NIST Releases Guidelines for Vetting the Security of Mobile Applications Used by Businesses and Their Employees

Companies and their employees are increasingly using mobile devices and mobile applications (apps) to improve connectivity, communication and productivity. Unfortunately, these same companies may be unintentionally exposing...more

Farewell, Federal Cybersecurity Incentives?

Administration Takes Private Sector Incentives Off the Table, While Obama Calls for $14 Billion in FY 2016 Budget to Strengthen Government’s Cybersecurity Efforts The White House’s Cybersecurity Coordinator Michael...more

President Obama Announces New Cybersecurity Proposals

On January 13, President Obama visited the National Cybersecurity and Communications Integration Center to announce a variety of legislative and administrative proposals, many of which were updates to his 2011 Cybersecurity...more

A New Kind of Architecture: The President’s New Agenda on Cybersecurity

If you watched President Obama’s State of the Union Address on January 20, you know that passing comprehensive cybersecurity legislation will be a central focus during his final two years in office. The President actually...more

World Economic Forum Releases Framework to Quantify Cyber Threats

In conjunction with its annual meeting this week, the World Economic Forum released a report on its current efforts to develop a common framework to model and quantify the impact and risk of cyber threats. The report...more

Sharing is Caring: The OCC Testifies Before the Senate Banking Committee

On December 10, 2014, Valerie Abend, Senior Critical Infrastructure Officer for the Office of the Comptroller of the Currency (OCC) testified before the U.S. Senate Committee on Banking, Housing, and Urban Affairs on the...more

123 Results
|
View per page
Page: of 5

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×