Department of Homeland Security Cybersecurity

The Department of Homeland Security is a federal executive department established in 2002 in response to the September 11th terrorist attacks. DHS was formed by combining twenty-two existing federal departments... more +
The Department of Homeland Security is a federal executive department established in 2002 in response to the September 11th terrorist attacks. DHS was formed by combining twenty-two existing federal departments and agencies. The consolidation was aimed at creating a better integrated, more effective organization to respond to terrorist attacks and other varied threats facing the United States and its territories.  less -
News & Analysis as of

White House Releases Policy Directive On Cyber Incident Coordination

On July 26, 2016, the White House approved a Presidential Policy Directive (“PPD”) on coordinating responses to cyber incidents that occur in the United States. The PPD seeks to clarify who in the federal government is...more

DHS Provides Guidance on Cyber Incident Reporting

The United States Department of Homeland Security (hereafter "DHS") has released helpful guidelines and points of contact for reporting cyber incidents to the Federal Government. Expanding on a discussion initially started in...more

Cybersecurity News & Notes – July 2016 #4

In Case You Missed It: U.S. Major party platforms address cybersecurity. The two major parties have released their 2016 election platforms, both of which include cybersecurity planks. The Republican platform’s perspective...more

Potential Risks and Rewards of Cybersecurity Information Sharing Under CISA

When President Obama signed into law the Cybersecurity Act of 2015, which was designed to facilitate information sharing on cybersecurity threats between the public and private sectors, proponents hailed it as “our best...more

Collaboration Key to Combatting Cyber Threats: Federal Government Issues Final Guidance Clarifying Liability Protection for...

On June 15, the Department of Homeland Security (DHS) and the Department of Justice (DOJ) jointly issued final guidance on how the private sector and government will communicate cyber threat data and defensive measures under...more

What Information Can You Share Under the Cybersecurity Information Sharing Act?

Last week, the U.S. Department of Homeland Security (“DHS”) and the U.S. Department of Justice (“DOJ”) provided guidance on an open question in the Cybersecurity Information Sharing Act (“CISA”): What type of information may...more

Cybersecurity News & Notes – July 2016

In Case You Missed It: Ruling in FTC v. Amazon Suggests a Way Forward for Companies Responding to Actions Brought by the FTC after a Data Breach. The FTC’s recent actions in the realm of data security have been predicated on...more

Georgia And Washington Strategize Cybersecurity Plan

At the midyear conference of the National Association of State Chief Information Officers (“NASCIO”) held on May 2, 2016, representatives from Georgia and Washington reported about their efforts to unify the different state...more

House Homeland Security Committee Holds Hearing On 2015 Cybersecurity Act

On June 15, 2016, the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies held a hearing to examine industry perspectives on the implementation of the Cybersecurity Act...more

Cybersecurity News and Notes: June 2016 #4

In Case You Missed It - The FTC settled with mobile advertising company InMobi for $950,000 in civil penalties, along with the implementation of a privacy program, based on the FTC’s charges that InMobi impermissibly...more

DHS Issues New Rules Governing Sharing of Cyberthreat Data

Last week, the Department of Homeland Security (“DHS”) released its Final Rules for private-sector information-sharing under the Cybersecurity Information Sharing Act of 2015 (“CISA”). CISA permits private companies to share...more

DHS and DOJ Release Updated Guidance for Sharing Cyber Threat Indicators and Defensive Measures

On June 15, in response to feedback from non-federal entities on guidance released in February, the Departments of Homeland Security (DHS) and Justice (DOJ) issued updated guidance for companies about sharing cyber threat...more

Updated Guidance on the Cybersecurity Information Sharing Act of 2015

Action Item: On June 15, 2016, the U.S. Department of Homeland Security (“DHS”) and the U.S. Department of Justice (“DOJ”) jointly issued a notice announcing the availability of the Cybersecurity Information Sharing Act of...more

“Interim” No More: DHS and DOJ Publish Final CISA Guidance on Cybersecurity Sharing

The Department of Homeland Security (DHS) and the Department of Justice (DOJ) have issued the long-awaited final procedures for both Federal and Non-Federal Entities under the Cybersecurity Information Sharing Act (CISA)...more

Share What You Know: Liability Protection for Private Entities that Share Cybersecurity Information Pursuant to Federal Guidelines

On February 16, the Department of Homeland Security (DHS) and the Department of Justice (DOJ) jointly issued preliminary guidance — with final guidance due later this month — on how the private sector and government will...more

Preparing for Increased Cybersecurity Information Sharing

Cybersecurity remains a top focus of government regulators, and the prevailing trend is to encourage information sharing between the government and private entities to combat cybersecurity threats. In line with this theme, on...more

A New Cybersecurity Regime and a New Regulation to Mandate Secure Information Systems for Government Contractors

Congress has enacted a recent wave of legislation to address ongoing cybersecurity threats; the Executive Branch, on May 12, 2016, adopted new cybersecurity regulations; and other Federal initiatives are underway and will...more

What Companies Need to Know About Cyber Threat Information Sharing Under CISA

Cyber threat information sharing has the potential to provide numerous benefits for organizations (both public and private) faced with cyberattacks, which are increasing in frequency and sophistication. Cyber threat...more

Senator Tom Carper Questions Office Of Management And Budget Regarding Emerging Cybersecurity Technologies

On April 8, 2016, U.S. Senator Tom Carper, the ranking Democratic member of the Senate Homeland Security and Governmental Affairs Committee, sent a letter to Shaun Donovan, Director of the Office of Management and Budget...more

CISA Guidance Clarifies How to Share Cyber Threat Information… but Issues Remain

The Cybersecurity Information Sharing Act of 2015 ("CISA"), enacted on December 18, 2015, as part of the omnibus Consolidated Appropriations Act[1], 2016, creates a voluntary process that encourages public and private sector...more

DHS Warns of New Ransomware Threats

The Department of Homeland Security (“DHS”) recently issued a joint alert with the Canadian Cyber Incident Response Centre warning of two new ransomware threats behind recent well-publicized attacks against healthcare...more

Cybersecurity and Data Privacy: Senate Finance Committee to Take Up Cybersecurity Legislation (4/16)

The New York State Senate Committee on Finance is set to take up two new bills this week relating to cybersecurity. The first bill, S.3405-A, would mandate that a cybersecurity assessment/report be prepared by the...more

House Homeland Security Committee Holds Cyber Insurance Hearing

On March 22, 2016, the Cybersecurity, Infrastructure Protection, and Security Technologies Subcommittee of the House Homeland Security Committee held a hearing entitled “The Role of Cyber Insurance in Risk Management.”...more

CISA Guidelines (Part 3): Guidance to Assist Non-Federal Entities

As we wrote previously, the federal government released several guidance documents last month implementing The Cybersecurity Information Sharing Act (CISA). Among these was the Guidance to Assist Non-Federal Entities to...more

Cybersecurity Information Sharing Act of 2014: What does it allow?

The Cybersecurity Information Sharing Act of 2014 was created to identify and share cyber threat indicators, which are pieces of information necessary to describe or identify “malicious reconnaissance;” a method of defeating...more

130 Results
|
View per page
Page: of 6
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×