Suche senden
Hochladen
CYBERSECURITY LEGISLATION
•
Als PPTX, PDF herunterladen
•
0 gefällt mir
•
1,294 views
3.com
Folgen
Business
Technologie
Melden
Teilen
Melden
Teilen
1 von 14
Jetzt herunterladen
Empfohlen
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
Government Technology and Services Coalition
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
Paul Di Gangi
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
Dr. Ahmed Al Zaidy
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
Data Risks In A Digital Age
Data Risks In A Digital Age
padler01
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15
Dr. Ahmed Al Zaidy
Empfohlen
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
Government Technology and Services Coalition
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
Paul Di Gangi
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
Dr. Ahmed Al Zaidy
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
Data Risks In A Digital Age
Data Risks In A Digital Age
padler01
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
Dr. Ahmed Al Zaidy
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
Dr. Ahmed Al Zaidy
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
Abdullahi Arabo Jr (MEng, MBCS, PhD)
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
Dr. Ahmed Al Zaidy
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
NetIQ
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
Dr. Ahmed Al Zaidy
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Cohesive Networks
Enterprise cyber security
Enterprise cyber security
nsheel
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
AIIM International
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
Dr. Ahmed Al Zaidy
The State of Cyber
The State of Cyber
businessforward
IT compliance
IT compliance
Phan Vuong
Information Governance
Information Governance
Atle Skjekkeland
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
James Nesbitt
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10
Dr. Ahmed Al Zaidy
Capstone Final Presentation
Capstone Final Presentation
Kartik Uppal
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
Henry Draughon
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016
Arthit Kliangprom
Summary of smart building
Summary of smart building
Bayu imadul Bilad
Weitere ähnliche Inhalte
Was ist angesagt?
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
Dr. Ahmed Al Zaidy
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
Dr. Ahmed Al Zaidy
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
Abdullahi Arabo Jr (MEng, MBCS, PhD)
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
Dr. Ahmed Al Zaidy
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
NetIQ
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
Dr. Ahmed Al Zaidy
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Cohesive Networks
Enterprise cyber security
Enterprise cyber security
nsheel
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
AIIM International
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
Dr. Ahmed Al Zaidy
The State of Cyber
The State of Cyber
businessforward
IT compliance
IT compliance
Phan Vuong
Information Governance
Information Governance
Atle Skjekkeland
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
James Nesbitt
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10
Dr. Ahmed Al Zaidy
Capstone Final Presentation
Capstone Final Presentation
Kartik Uppal
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
Henry Draughon
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
Was ist angesagt?
(20)
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Enterprise cyber security
Enterprise cyber security
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
The State of Cyber
The State of Cyber
IT compliance
IT compliance
Information Governance
Information Governance
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10
Capstone Final Presentation
Capstone Final Presentation
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
Andere mochten auch
Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016
Arthit Kliangprom
Summary of smart building
Summary of smart building
Bayu imadul Bilad
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
John Weiler
Odroid Magazine March 2014
Odroid Magazine March 2014
Nanik Tolaram
DLT Solutions interview questions and answers
DLT Solutions interview questions and answers
getbrid665
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
mmata1031
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling Computers
DLT Solutions
Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016
Bradley McKinney
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Sean O'Connell
Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]
SAP Ariba
AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015
Ross McLendon
NMRESGI_El Paso Electric Grid Modernization_Bukowski
NMRESGI_El Paso Electric Grid Modernization_Bukowski
Sandia National Laboratories: Energy & Climate: Renewables
Solaris vs Linux
Solaris vs Linux
Grigale LTD
Makram thesis presentation
Makram thesis presentation
abdelqad
Carahsoft technology interview questions and answers
Carahsoft technology interview questions and answers
KeisukeHonda66
Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15
jdestefano
AQSIQ Successful Cases
AQSIQ Successful Cases
AQSIQ license
Cfmc pumps
Cfmc pumps
Century Fasteners & Machine
Presentación Ecopetrol
Presentación Ecopetrol
Ericka Chavez
Microbial Limit Test- An Over view
Microbial Limit Test- An Over view
Srinath Sasidharan
Andere mochten auch
(20)
Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016
Summary of smart building
Summary of smart building
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
Odroid Magazine March 2014
Odroid Magazine March 2014
DLT Solutions interview questions and answers
DLT Solutions interview questions and answers
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling Computers
Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]
AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015
NMRESGI_El Paso Electric Grid Modernization_Bukowski
NMRESGI_El Paso Electric Grid Modernization_Bukowski
Solaris vs Linux
Solaris vs Linux
Makram thesis presentation
Makram thesis presentation
Carahsoft technology interview questions and answers
Carahsoft technology interview questions and answers
Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15
AQSIQ Successful Cases
AQSIQ Successful Cases
Cfmc pumps
Cfmc pumps
Presentación Ecopetrol
Presentación Ecopetrol
Microbial Limit Test- An Over view
Microbial Limit Test- An Over view
Ähnlich wie CYBERSECURITY LEGISLATION
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
jdenbryston
Cybersecurity
Cybersecurity
pronab Kurmi
Cybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
Mukesh Chinta
Cybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
journal ijrtem
Robots in The Chemical Industry
Robots in The Chemical Industry
IJRTEMJOURNAL
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
44CON
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
Sec
Sec
3.com
4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing
schmiez
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
NationalUnderwriter
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
Lance Michalson
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Adam Levithan
HCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptx
JordanKinobe1
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
JLL
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
Cyril Soeri
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Cohesive Networks
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
Utah Tech Labs
Legal and ethical aspects
Legal and ethical aspects
CAS
Ähnlich wie CYBERSECURITY LEGISLATION
(20)
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
Cybersecurity
Cybersecurity
Cybersecurity and Internet Governance
Cybersecurity and Internet Governance
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
Cybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
Robots in The Chemical Industry
Robots in The Chemical Industry
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Sec
Sec
4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
HCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptx
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
Legal and ethical aspects
Legal and ethical aspects
Mehr von 3.com
Managerial challenges of_information_technologyxx
Managerial challenges of_information_technologyxx
3.com
Example of completed_project_eosp (1)
Example of completed_project_eosp (1)
3.com
Interaction
Interaction
3.com
Based on your reading of gideon v
Based on your reading of gideon v
3.com
MICROECONOMIC QUIZ
MICROECONOMIC QUIZ
3.com
Quizxxx
Quizxxx
3.com
Problem set 1x
Problem set 1x
3.com
Mehr von 3.com
(7)
Managerial challenges of_information_technologyxx
Managerial challenges of_information_technologyxx
Example of completed_project_eosp (1)
Example of completed_project_eosp (1)
Interaction
Interaction
Based on your reading of gideon v
Based on your reading of gideon v
MICROECONOMIC QUIZ
MICROECONOMIC QUIZ
Quizxxx
Quizxxx
Problem set 1x
Problem set 1x
Kürzlich hochgeladen
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in Philippines
DavidSamuel525586
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
dollysharma2066
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
saniyaimamuddin
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
ictsugar
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
Data Analytics Company - 47Billion Inc.
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
callgirls2057
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
richard876048
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
Shashank Mehta
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
Call girls in Goa, +91 9319373153 Escort Service in North Goa
Cyber Security Training in Office Environment
Cyber Security Training in Office Environment
elijahj01012
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
ssuserf63bd7
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
ashishs7044
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
ashishs7044
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
Call girls in Goa, +91 9319373153 Escort Service in North Goa
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
Olivia Kresic
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
Shruti Mittal
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
ashishs7044
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
Shaun Heinrichs
PSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
Anamaria Contreras
Pitch deck sample detail for New Business Proposal
Pitch deck sample detail for New Business Proposal
Evelina300651
Kürzlich hochgeladen
(20)
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in Philippines
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
Cyber Security Training in Office Environment
Cyber Security Training in Office Environment
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
PSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
Pitch deck sample detail for New Business Proposal
Pitch deck sample detail for New Business Proposal
CYBERSECURITY LEGISLATION
1.
Cyber Security briefing
to Congress PPD21 and PPD22 By …………… From CSCSS 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
2.
Agenda Why are we
here? Is the legislation necessary or are the currently available policy tools sufficient Is new legislation is needed, what need should be addressed and why What authorities and protection should be included? Why? 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
3.
Cyber security bills
that have not been passed Presidential Policy Directive-21 replaces Homeland Security Presidential Directive-7 . The Executive Order (EO) does not address all the cyber crime issues and how they can be resolved NSA, FBI, and Department of Homeland Security need legislation to proactively prevent cyber attacks. Both the military and civilians to have jurisdiction over cyber attacks 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
4.
Continued… A situational awareness
capability that addresses both physical and cyber aspects the cascading consequences of infrastructure failures Need to update the National Infrastructure Protection Plan There is also a 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
5.
Is the legislation
necessary? The legislation is necessary It need to adequately cover the gaps unforeseen and unaddressed by current legislation - Homeland Security Presidential Directive-7 There have been developments in cyber crime nature, frequency and design All the critical infrastructure are at risk from cyber attacks. Federal Information Security Management Act to govern federal government IT security Critical infrastructure companies to meet minimum cyber security regulations. Revise the minimum cyber security regulation so as to meet the increasing cases of cyber crimes 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
6.
What should the
legislation address? Why? The legislation should address Transparency and User Protections. The reason is that: The government has already been involved in cyber surveillance against the current laws Private companies survey their employees, customers and competitors The privacy of the government and the private companies 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
7.
Industrial espionage has
impact ‘hacktivism’ and longest-term affect on share price . 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
8.
Projected growth of
cyber-security spending in billions 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
9.
Authorities and protection
to be included? Private networks- save banks, private companies and individual users from cybercrime Banks- to protect the financial sectors and the country's economy Transport and communication networks-smooth operations and stabilization of the economy Sharing of critical cyber security information between the government and the private sectors. The stock market- Protect it from collapse. 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
10.
The authorities The Department
of State, in coordination with DHS, SSAs, and other Federal departments and agencies The Department of Justice (DOJ), including the Federal Bureau of Investigation (FBI) The Department of the Interior, in collaboration with the SSA for the Government Facilities Sector The Department of Commerce (DOC), in collaboration with DHS and other relevant Federal departments and agencies The IC, led by the Director of National Intelligence (DNI), The General Services Administration, in consultation with DOD, and DHS The Nuclear Regulatory Commission (NRC) The Federal Communications Commission, to the extent permitted by law 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
11.
Authorities and protection
to be included? Protect and defend computer systems and networks attack Thwart computer security threats against rights and property Use Information to investigate crimes to the underlying security threat to individuals, and national security Previously opposed legislation have important segments that can be used today 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
12.
Recommendation Using aggressive counter
measures Making the government collaborate with the private sector Protecting users ‘ privacy from the government and private sector The government and private companies do not observe the democratic principles. The government should extend their commitment to openness in cyber security deals and issues The banks are not sure about the liability concerns in case they share the information 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
13.
References National Security Council(May
2009), The Comprehensive National Cybersecurity Initiative - (CNCI) Fidelis, Richard. "Cyber Security - Freshfields Freshfields." Cyber Security - Freshfields - Freshfields. 31 Mar. 2013. 24 Nov. 2013 http://www.freshfields.com/en/insights/Cyber_security/ Menn, Joseph. "U.S. officials woo tech companies in new push for cybersecurity law."Reuters. 07 Sept. 2013. Thomson Reuters. 24 Nov. 2013 <http://www.reuters.com/article/2013/09/25/us-cybersecuritylaw-idUSBRE98O14S20130925>. Sen. Rockefeller,, John D. "S.1353 - Cybersecurity Act of 2013 113th Congress (2013-2014) BILL." S.1353. 30 July 2013. 24 Nov. 2013 <http://beta.congress.gov/bill/113th/senate-bill/1353>. 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
14.
THANK YOU Any Questions? 1 (800)
6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
Jetzt herunterladen