Cybersecurity Information Sharing

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

FDIC cybersecurity framework features four areas critical to bank security

Long gone are the days when a financial institution’s primary security concern was protecting cash in the bank vault, the Federal Deposit Insurance Corporation (FDIC) acknowledges in its recent article, “A Framework for...more

What’s In The Cybersecurity Act of 2015?

The Cybersecurity Act of 2015 became law on December 18, 2015. It’s the biggest piece of cybersecurity legislation passed by Congress in recent years. It authorizes and protects certain information-sharing for cybersecurity...more

FinCEN to Financial Institutions: Include Cyber Data in Suspicious Activity Reports (SARs)

As new legislation aimed at facilitating greater cybersecurity information sharing between private industry and government takes effect (i.e., Cybersecurity Information Sharing Act), FinCEN Director Jennifer Shasky Calvery...more

The Cybersecurity Act Of 2015

On December 18, 2015, the President signed into law the Cybersecurity Act of 2015 ("the Act"). The intent of the Act is to encourage more interaction between the government and the private sector, as well as within the...more

Washington Healthcare Update

This Week: Because of the Blizzard of 2016—also known as “Snowzilla”—in Washington, D.C., and other parts of the East Coast, this is a combined issue... The House of Representatives opted not to come back to town until next...more

Backdoors to encryption protocols vs. cybersecurity: weighing priorities in the U.S. and abroad

With the revelations that the Paris and San Bernardino attackers used encrypted communications to recruit, communicate and plan their attacks, the U.S. government is again pushing the tech industry to provide it backdoor...more

CISA Is Now Law—What It Means for Your Organization

After several fits and starts, Congress finally passed the Cyber Information Sharing Act of 2015 (CISA) as part of the omnibus budget bill. President Obama signed the bill into law on December 18, 2015. CISA allows—but...more

"Emerging Trends in Privacy and Cybersecurity"

Entering 2016, the relentless stream of cyberattacks continues unabated, having become a "business as usual" reality to which companies must adapt. All companies, regardless of size or industry, are potential targets, and the...more

Leadership team appointed for Cyber Threat Intelligence Integration Center

On January 7, 2016, Director of National Intelligence James Clapper announced the appointment of the leadership team that will head the new Cyber Threat Intelligence Integration Center (Center), which was announced by...more

New Cybersecurity Law – Are You Prepared?

On December 18, 2015, President Obama signed into law the Cybersecurity Act of 2015. Beginning at Division N, Public Law 114-113 deals with cyber threats and includes the means and methods by which the private sector may...more

Congress Enacts Major Cybersecurity Legislation

On December 18, 2015, Congress passed, and the President signed, the Cybersecurity Act of 2015, which provides authorization and liability protection for cybersecurity monitoring and information-sharing and authorization for...more

EU Directive On Cybersecurity Agreed

On 18 December 2015, the agreed text of the Network and Information Security Directive (the NIS Directive) was released. With cybersecurity firmly established as a key business risk, the introduction of specific laws in this...more

Appropriations Bill Has a Few Surprises

On December 18, the President signed into law H.R. 2029, the Consolidated Appropriations Act Of 2016, (the “Act”), the 887 page bill which avoided a closure of federal government functions. Beyond the massive funding of the...more

New Federal Law Protects Companies that Share Cyber Threat Information

On December 18, the President signed into law as part of the federal omnibus government spending package a number of cybersecurity provisions, most notably the “Cybersecurity Information Sharing Act of 2015” (CISA). CISA...more

Happy New Year – Cybersecurity Information Sharing Act

Just at the end of 2015, the Cybersecurity Information Sharing Act (CISA) was enacted into law as part of the omnibus spending measure passed by Congress and signed by President Obama at right before Christmas. The...more

President Obama Signs Cybersecurity Act of 2015 to Encourage Cybersecurity Information Sharing

On December 18, 2015, President Obama signed into law a $1.1 trillion omnibus spending bill that contained the Cybersecurity Act of 2015 (the “Act”), a compromise bill based on competing cybersecurity information sharing...more

Cyber Attack Information Sharing will Bring Liability Protections to Companies

On December 18, 2015, President Obama signed the 2016 Consolidated Appropriations Act. Included in this must-pass federal funding legislation is the Cybersecurity Act of 2015, which represents the most significant federal...more

Quantum Dawn 3: SIFMA’s Cybergames

It reads like a movie script: First, the financial services industry experiences a bout of firm-specific attacks in the form of distributed denial of service (DDoS), domain name system (DNS) poisoning, or breach of personally...more

NYDFS Letter: “Potential” Cybersecurity Regulations for Insurers

On November 9, 2015, the New York Department of Financial Services (NYDFS) issued a letter that describes what insurers can expect from the Department’s ongoing assessment of cybersecurity measures. The letter parallels...more

Development of Cybersecurity Information Sharing Standards

As the Obama administration continues to direct attention to cybersecurity, The University of Texas at San Antonio (“UTSA”) recently won an $11 million dollar grant to develop standards for so-called “Information Sharing and...more

White House Issues Cybersecurity Strategy And Implementation Plan Following Cybersecurity Sprint

On October 30, the White House released a memorandum to the heads of federal departments and agencies detailing the Cybersecurity Strategy and Implementation Plan (“CSIP”), a proposal designed to update and bolster federal...more

Cybersecurity Legislation Clears Important Senate Hurdle

After months of debate, the Senate passed cybersecurity legislation that if signed into law would enhance the sharing of information between the private sector and the federal government and provide important liability...more

Senate Passes Legislation To Ease Sharing Of Cybersecurity Threat Information

On October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (“CISA”), which addresses how companies can share cyber threat information with the federal government. The legislation aims to...more

Alert: Senate Passes Historic Information Sharing Bill

On October 27, the Cybersecurity Information Sharing Act (CISA) finally passed the Senate by a hefty margin of 74–21 (read the text of the bill as passed). Despite an escalation of opposition and rhetoric over the past couple...more

U.S. Senate Moves Forward On Cybersecurity Information-Sharing Legislation

On October 27, 2015, the U.S. Senate passed the Cybersecurity Information Sharing Act of 2015 ("CISA") by a vote of 74-21. CISA had been stalled in the Senate since its submission in April 2015 by Senators Diane Feinstein...more

112 Results
|
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×