SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Obama’s Cybersecurity
Executive Order Falls Short
In his State of the Union address, President Obama announced that he
had signed an executive order (EO) on cybersecurity. The order uses a
standard-setting approach to improve cybersecurity. However, such a
model will only impose costs, encourage compliance over
security, keep the U.S. tied to past threats, and threaten innovation.


While the EO does take some positive steps in the area of information
sharing, these steps are hamstrung by the EO’s inability to provide
critical incentives such as liability protection. As a result, this order
could result in few modest changes, or it could result in substantial
negative effects.


The Scope of the Order
The EO uses a very broad definition of critical infrastructure, defining
it as “systems and assets, whether physical or virtual, so vital to the
United States that the incapacity or destruction of such systems and
assets would have a debilitating impact on security, national economic
security, national public health or safety, or any combination of those
matters.”
Such a broad definition could be understood to include systems normally
considered outside the cybersecurity conversation, such as agriculture.
While there is no way of knowing how far implementation will actually
go, this broad definition is certainly concerning.
Inhibited Information Sharing


In Section 4, the EO attempts to expand information sharing in several
noteworthy ways. It calls for the federal government to quickly move
unclassified information to the private sector and increase the number
of security clearances given to appropriate owners of covered
infrastructure. Additionally, the EO expands already existing
information-sharing systems such as the Defense Industrial Base (DIB)
Enhanced Cyber Services and Cyber Security/Information Assurance
Program. These objectives are worthwhile, and the President should be
applauded for including them.


However, these worthwhile pursuits will not be very effective because
the EO must rely completely on existing authorities. Essentially, it
directs government agencies to do a better job of sharing information
than they already are.
And where it does expand programs, such as with the DIB,
these efforts will not be effective without additional
incentives and protections to get more businesses involved.
These include liability, Freedom of Information Act (FOIA),
and regulatory-use protections.

The problem is that the EO cannot provide these important
protections—they can be created only by Congress. As a result, many
businesses will be reluctant to share their information for fear that
their proprietary information could be endangered by a FOIA request
or that an honest mistake might lead to a lawsuit being filed against
them. Regarding other private-to-private or private-to-government
solutions, the EO is silent.


Although the information-sharing provisions are limited, the privacy
protections for this limited sharing are actually where they should
be. The EO calls for consultation with privacy officers and oversight
reports on the order’s implementation. While some may find this
provision weak, effective oversight is the best way to respect
privacy concerns while not limiting information sharing that
enhances the nation’s security.
Standards and Mandatory Regulations
The true backbone of President Obama’s EO is a regulatory
framework set up in Sections 8 through 10. The EO directs the
National Institute of Standards and Technology (NIST) to develop
a “set of standards, methodologies, procedures, and processes
that align policy, business, and technological approaches to
address cyber risks.” This “Cybersecurity Framework” is an
attempt to collect cybersecurity best practices and standards of
conduct in one place. NIST has only 240 days to complete this
monumental task.


NIST is instructed to conduct an open, consultative process that
develops a comprehensive framework. This framework seeks
to provide a prioritized, flexible, repeatable, performance-
based, and cost-effective approach, including information
security measures and controls, to help owners and operators of
critical infrastructure identify, assess, and manage cyber risk.…
The Cybersecurity Framework will also identify areas for
improvement that should be addressed through future collaboration
with particular sectors and standards-developing organizations. To
enable technical innovation and account for organizational
differences, the Cybersecurity Framework will provide guidance that
is technology neutral and that enables critical infrastructure sectors
to benefit from a competitive market for products and services.
Completing such a task in 240 days is unrealistic.


Putting such timing concerns aside, how will the framework actually
operate? Section 8 leaves it to sector-specific agencies to provide
guidance for the voluntary adoption of the standards by their
respective industries. Additionally, the Department of Homeland
Security will “coordinate the establishment of a set of incentives to
promote participation” and adoptions of the framework. To
date, however, no one has been able to come up with incentives
strong enough to entice businesses to take up new standards, which
indicates that strong enough incentives might not exist.
Of course, no one knows what the framework will ultimately include.
If it recommends that the private sector do what it is already doing,
then it really does not do anything new. If it has new
recommendations, these will be adopted only if the
recommendations are truly worthwhile and if the incentive system
manages to overcome businesses’ concerns. While possible, this
scenario remains very unlikely.

The real teeth to this system, however, are found in Section 10. This
section effectively directs all the sector-specific agencies to take the
voluntary framework and make it mandatory for their sectors
through either existing rules or additional rulemaking.

While these agencies might have some understanding of industry
concerns, mandatory regulations are still mandatory and will impose
costs. Additionally, regulations tend to promote an attitude of
compliance, not security, and in the case of cybersecurity, this
means compliance with outdated regulations. With technology and
cyber threats constantly evolving, regulations will always be stuck in
the past.
Finally, mandatory regulations will go a long way toward souring any
public-private partnership that the EO seeks in earlier sections. After
all, a partnership does not usually involve forcing one side to do what
the other one wants.


Coercion May Frighten Businesses into Action
The EO has one truly innovative policy: a confidential program that will
identify the critical cyber infrastructure “where a cybersecurity
incident could reasonably result in catastrophic regional or national
effects on public health or safety, economic security, or national
security.”


This is a subset of the earlier broader critical infrastructure definition.
Infrastructure owners who are identified as operating cyber critical
infrastructure will be notified of that fact and entitled to challenge the
notification. Once designation is final, nothing else happens.
However, if some cyber disaster later happens to one of those
secretly identified companies that had not implemented the
framework, the federal government would likely say, “We told you
so.” The bad press and potential lawsuits that could come from
such an announcement would inspire fear so powerful that this
provision will certainly be perceived as overly coercive.




How Congress Can Do Better on Cybersecurity
President Obama has signed his cybersecurity EO because he
believes this is the best way forward on cybersecurity. Instead of
following this flawed standards-based approach, however, Congress
should replace the EO with strong information-sharing provisions,
including robust liability, FOIA, and regulatory-use protections.
Such protections would enable strong and dynamic cybersecurity
efforts.

Weitere ähnliche Inhalte

Kürzlich hochgeladen

IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxSasikiranMarri
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxunark75
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptUsmanKaran
 

Kürzlich hochgeladen (9)

IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptx
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptx
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.ppt
 

Empfohlen

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Empfohlen (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Abney Associates Internet Technology Spain: Obama’s Cybersecurity Executive Order Falls Short

  • 2. In his State of the Union address, President Obama announced that he had signed an executive order (EO) on cybersecurity. The order uses a standard-setting approach to improve cybersecurity. However, such a model will only impose costs, encourage compliance over security, keep the U.S. tied to past threats, and threaten innovation. While the EO does take some positive steps in the area of information sharing, these steps are hamstrung by the EO’s inability to provide critical incentives such as liability protection. As a result, this order could result in few modest changes, or it could result in substantial negative effects. The Scope of the Order The EO uses a very broad definition of critical infrastructure, defining it as “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”
  • 3. Such a broad definition could be understood to include systems normally considered outside the cybersecurity conversation, such as agriculture. While there is no way of knowing how far implementation will actually go, this broad definition is certainly concerning. Inhibited Information Sharing In Section 4, the EO attempts to expand information sharing in several noteworthy ways. It calls for the federal government to quickly move unclassified information to the private sector and increase the number of security clearances given to appropriate owners of covered infrastructure. Additionally, the EO expands already existing information-sharing systems such as the Defense Industrial Base (DIB) Enhanced Cyber Services and Cyber Security/Information Assurance Program. These objectives are worthwhile, and the President should be applauded for including them. However, these worthwhile pursuits will not be very effective because the EO must rely completely on existing authorities. Essentially, it directs government agencies to do a better job of sharing information than they already are.
  • 4. And where it does expand programs, such as with the DIB, these efforts will not be effective without additional incentives and protections to get more businesses involved. These include liability, Freedom of Information Act (FOIA), and regulatory-use protections. The problem is that the EO cannot provide these important protections—they can be created only by Congress. As a result, many businesses will be reluctant to share their information for fear that their proprietary information could be endangered by a FOIA request or that an honest mistake might lead to a lawsuit being filed against them. Regarding other private-to-private or private-to-government solutions, the EO is silent. Although the information-sharing provisions are limited, the privacy protections for this limited sharing are actually where they should be. The EO calls for consultation with privacy officers and oversight reports on the order’s implementation. While some may find this provision weak, effective oversight is the best way to respect privacy concerns while not limiting information sharing that enhances the nation’s security.
  • 5. Standards and Mandatory Regulations The true backbone of President Obama’s EO is a regulatory framework set up in Sections 8 through 10. The EO directs the National Institute of Standards and Technology (NIST) to develop a “set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks.” This “Cybersecurity Framework” is an attempt to collect cybersecurity best practices and standards of conduct in one place. NIST has only 240 days to complete this monumental task. NIST is instructed to conduct an open, consultative process that develops a comprehensive framework. This framework seeks to provide a prioritized, flexible, repeatable, performance- based, and cost-effective approach, including information security measures and controls, to help owners and operators of critical infrastructure identify, assess, and manage cyber risk.…
  • 6. The Cybersecurity Framework will also identify areas for improvement that should be addressed through future collaboration with particular sectors and standards-developing organizations. To enable technical innovation and account for organizational differences, the Cybersecurity Framework will provide guidance that is technology neutral and that enables critical infrastructure sectors to benefit from a competitive market for products and services. Completing such a task in 240 days is unrealistic. Putting such timing concerns aside, how will the framework actually operate? Section 8 leaves it to sector-specific agencies to provide guidance for the voluntary adoption of the standards by their respective industries. Additionally, the Department of Homeland Security will “coordinate the establishment of a set of incentives to promote participation” and adoptions of the framework. To date, however, no one has been able to come up with incentives strong enough to entice businesses to take up new standards, which indicates that strong enough incentives might not exist.
  • 7. Of course, no one knows what the framework will ultimately include. If it recommends that the private sector do what it is already doing, then it really does not do anything new. If it has new recommendations, these will be adopted only if the recommendations are truly worthwhile and if the incentive system manages to overcome businesses’ concerns. While possible, this scenario remains very unlikely. The real teeth to this system, however, are found in Section 10. This section effectively directs all the sector-specific agencies to take the voluntary framework and make it mandatory for their sectors through either existing rules or additional rulemaking. While these agencies might have some understanding of industry concerns, mandatory regulations are still mandatory and will impose costs. Additionally, regulations tend to promote an attitude of compliance, not security, and in the case of cybersecurity, this means compliance with outdated regulations. With technology and cyber threats constantly evolving, regulations will always be stuck in the past.
  • 8. Finally, mandatory regulations will go a long way toward souring any public-private partnership that the EO seeks in earlier sections. After all, a partnership does not usually involve forcing one side to do what the other one wants. Coercion May Frighten Businesses into Action The EO has one truly innovative policy: a confidential program that will identify the critical cyber infrastructure “where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.” This is a subset of the earlier broader critical infrastructure definition. Infrastructure owners who are identified as operating cyber critical infrastructure will be notified of that fact and entitled to challenge the notification. Once designation is final, nothing else happens.
  • 9. However, if some cyber disaster later happens to one of those secretly identified companies that had not implemented the framework, the federal government would likely say, “We told you so.” The bad press and potential lawsuits that could come from such an announcement would inspire fear so powerful that this provision will certainly be perceived as overly coercive. How Congress Can Do Better on Cybersecurity President Obama has signed his cybersecurity EO because he believes this is the best way forward on cybersecurity. Instead of following this flawed standards-based approach, however, Congress should replace the EO with strong information-sharing provisions, including robust liability, FOIA, and regulatory-use protections. Such protections would enable strong and dynamic cybersecurity efforts.