SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Cyber Security briefing to Congress
PPD21 and PPD22
By
……………

From

CSCSS
1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Agenda






Why are we here?
Is the legislation necessary or are the currently
available policy tools sufficient
Is new legislation is needed, what need should
be addressed and why
What authorities and protection should be
included? Why?

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Cyber security bills that have not been passed







Presidential Policy Directive-21 replaces
Homeland Security Presidential Directive-7 .
The Executive Order (EO) does not address all
the cyber crime issues and how they can be
resolved
NSA, FBI, and Department of Homeland Security
need legislation to proactively prevent cyber
attacks.
Both the military and civilians to have jurisdiction
over cyber attacks
1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Continued…





A situational awareness capability that addresses
both physical and cyber aspects
the cascading consequences of infrastructure
failures
Need to update the National Infrastructure
Protection Plan
There is also a

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Is the legislation necessary?










The legislation is necessary
It need to adequately cover the gaps unforeseen and
unaddressed by current legislation - Homeland
Security Presidential Directive-7
There have been developments in cyber crime
nature, frequency and design
All the critical infrastructure are at risk from cyber
attacks.
Federal Information Security Management Act to
govern federal government IT security
Critical infrastructure companies to meet minimum
cyber security regulations.
Revise the minimum cyber security regulation so as
to meet the increasing cases of cyber crimes
1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
What should the legislation address? Why?







The legislation should address Transparency and
User Protections.
The reason is that:
The government has already been involved in cyber
surveillance against the current laws
Private companies survey their employees,
customers and competitors
The privacy of the government and the private
companies

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Industrial espionage has impact ‘hacktivism’ and longest-term affect on share price

.

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Projected growth of cyber-security spending in
billions

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Authorities and protection to be included?







Private networks- save banks, private companies
and individual users from cybercrime
Banks- to protect the financial sectors and the
country's economy
Transport and communication networks-smooth
operations and stabilization of the economy
Sharing of critical cyber security information
between the government and the private sectors.
The stock market- Protect it from collapse.

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
The authorities











The Department of State, in coordination with DHS, SSAs,
and other Federal departments and agencies
The Department of Justice (DOJ), including the Federal
Bureau of Investigation (FBI)
The Department of the Interior, in collaboration with the
SSA for the Government Facilities Sector
The Department of Commerce (DOC), in collaboration
with DHS and other relevant Federal departments and
agencies
The IC, led by the Director of National Intelligence (DNI),
The General Services Administration, in consultation with
DOD, and DHS
The Nuclear Regulatory Commission (NRC)
The Federal Communications Commission, to the extent
permitted by law
1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Authorities and protection to be included?






Protect and defend computer systems and
networks attack
Thwart computer security threats against rights
and property
Use Information to investigate crimes to the
underlying security threat to individuals, and
national security
Previously opposed legislation have important
segments that can be used today

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Recommendation








Using aggressive counter measures
Making the government collaborate with the private
sector
Protecting users ‘ privacy from the government and
private sector
The government and private companies do not
observe the democratic principles.
The government should extend their commitment to
openness in cyber security deals and issues
The banks are not sure about the liability concerns in
case they share the information
1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
References







National Security Council(May 2009), The Comprehensive
National Cybersecurity Initiative - (CNCI)
Fidelis, Richard. "Cyber Security - Freshfields Freshfields." Cyber Security - Freshfields - Freshfields. 31 Mar.
2013. 24 Nov. 2013
http://www.freshfields.com/en/insights/Cyber_security/
Menn, Joseph. "U.S. officials woo tech companies in new push
for cybersecurity law."Reuters. 07 Sept. 2013. Thomson
Reuters. 24 Nov. 2013
<http://www.reuters.com/article/2013/09/25/us-cybersecuritylaw-idUSBRE98O14S20130925>.
Sen. Rockefeller,, John D. "S.1353 - Cybersecurity Act of 2013
113th Congress (2013-2014) BILL." S.1353. 30 July 2013. 24
Nov. 2013 <http://beta.congress.gov/bill/113th/senate-bill/1353>.

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
THANK

YOU

Any Questions?

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Dr. Ahmed Al Zaidy
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Dr. Ahmed Al Zaidy
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...NetIQ
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Dr. Ahmed Al Zaidy
 
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Cohesive Networks
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyAIIM International
 
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Dr. Ahmed Al Zaidy
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Dr. Ahmed Al Zaidy
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final PresentationKartik Uppal
 
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Henry Draughon
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianPECB
 

Was ist angesagt? (20)

Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
 
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
 
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
IT compliance
IT complianceIT compliance
IT compliance
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
 
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 

Andere mochten auch

Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016Arthit Kliangprom
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelJohn Weiler
 
Odroid Magazine March 2014
Odroid Magazine March 2014Odroid Magazine March 2014
Odroid Magazine March 2014Nanik Tolaram
 
DLT Solutions interview questions and answers
DLT Solutions interview questions and answersDLT Solutions interview questions and answers
DLT Solutions interview questions and answersgetbrid665
 
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108mmata1031
 
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersCross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersDLT Solutions
 
Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016Bradley McKinney
 
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM ExperienceOracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM ExperienceSean O'Connell
 
Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]SAP Ariba
 
AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015Ross McLendon
 
Solaris vs Linux
Solaris vs LinuxSolaris vs Linux
Solaris vs LinuxGrigale LTD
 
Makram thesis presentation
Makram thesis presentationMakram thesis presentation
Makram thesis presentationabdelqad
 
Carahsoft technology interview questions and answers
Carahsoft technology interview questions and answersCarahsoft technology interview questions and answers
Carahsoft technology interview questions and answersKeisukeHonda66
 
Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15jdestefano
 
AQSIQ Successful Cases
AQSIQ Successful CasesAQSIQ Successful Cases
AQSIQ Successful CasesAQSIQ license
 
Presentación Ecopetrol
Presentación EcopetrolPresentación Ecopetrol
Presentación EcopetrolEricka Chavez
 
Microbial Limit Test- An Over view
Microbial Limit Test- An Over view Microbial Limit Test- An Over view
Microbial Limit Test- An Over view Srinath Sasidharan
 

Andere mochten auch (20)

Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016
 
Summary of smart building
Summary of smart buildingSummary of smart building
Summary of smart building
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
 
Odroid Magazine March 2014
Odroid Magazine March 2014Odroid Magazine March 2014
Odroid Magazine March 2014
 
DLT Solutions interview questions and answers
DLT Solutions interview questions and answersDLT Solutions interview questions and answers
DLT Solutions interview questions and answers
 
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
 
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersCross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling Computers
 
Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016
 
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM ExperienceOracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
 
Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]
 
AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015
 
NMRESGI_El Paso Electric Grid Modernization_Bukowski
NMRESGI_El Paso Electric Grid Modernization_BukowskiNMRESGI_El Paso Electric Grid Modernization_Bukowski
NMRESGI_El Paso Electric Grid Modernization_Bukowski
 
Solaris vs Linux
Solaris vs LinuxSolaris vs Linux
Solaris vs Linux
 
Makram thesis presentation
Makram thesis presentationMakram thesis presentation
Makram thesis presentation
 
Carahsoft technology interview questions and answers
Carahsoft technology interview questions and answersCarahsoft technology interview questions and answers
Carahsoft technology interview questions and answers
 
Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15
 
AQSIQ Successful Cases
AQSIQ Successful CasesAQSIQ Successful Cases
AQSIQ Successful Cases
 
Cfmc pumps
Cfmc pumpsCfmc pumps
Cfmc pumps
 
Presentación Ecopetrol
Presentación EcopetrolPresentación Ecopetrol
Presentación Ecopetrol
 
Microbial Limit Test- An Over view
Microbial Limit Test- An Over view Microbial Limit Test- An Over view
Microbial Limit Test- An Over view
 

Ähnlich wie CYBERSECURITY LEGISLATION

Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptjdenbryston
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical IndustryIJRTEMJOURNAL
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesingschmiez
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareNationalUnderwriter
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps  - SharePoint Fest DCUnderstanding Federal IT Compliance in Three Steps  - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DCAdam Levithan
 
HCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptxHCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptxJordanKinobe1
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioJLL
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?Utah Tech Labs
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 

Ähnlich wie CYBERSECURITY LEGISLATION (20)

Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Sec
SecSec
Sec
 
4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps  - SharePoint Fest DCUnderstanding Federal IT Compliance in Three Steps  - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
 
HCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptxHCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptx
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 

Mehr von 3.com

Managerial challenges of_information_technologyxx
Managerial challenges of_information_technologyxxManagerial challenges of_information_technologyxx
Managerial challenges of_information_technologyxx3.com
 
Example of completed_project_eosp (1)
Example of completed_project_eosp (1)Example of completed_project_eosp (1)
Example of completed_project_eosp (1)3.com
 
Interaction
InteractionInteraction
Interaction3.com
 
Based on your reading of gideon v
Based on your reading of gideon vBased on your reading of gideon v
Based on your reading of gideon v3.com
 
MICROECONOMIC QUIZ
MICROECONOMIC QUIZMICROECONOMIC QUIZ
MICROECONOMIC QUIZ3.com
 
Quizxxx
QuizxxxQuizxxx
Quizxxx3.com
 
Problem set 1x
Problem set 1xProblem set 1x
Problem set 1x3.com
 

Mehr von 3.com (7)

Managerial challenges of_information_technologyxx
Managerial challenges of_information_technologyxxManagerial challenges of_information_technologyxx
Managerial challenges of_information_technologyxx
 
Example of completed_project_eosp (1)
Example of completed_project_eosp (1)Example of completed_project_eosp (1)
Example of completed_project_eosp (1)
 
Interaction
InteractionInteraction
Interaction
 
Based on your reading of gideon v
Based on your reading of gideon vBased on your reading of gideon v
Based on your reading of gideon v
 
MICROECONOMIC QUIZ
MICROECONOMIC QUIZMICROECONOMIC QUIZ
MICROECONOMIC QUIZ
 
Quizxxx
QuizxxxQuizxxx
Quizxxx
 
Problem set 1x
Problem set 1xProblem set 1x
Problem set 1x
 

Kürzlich hochgeladen

Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Pitch deck sample detail for New Business Proposal
Pitch deck sample detail for New Business ProposalPitch deck sample detail for New Business Proposal
Pitch deck sample detail for New Business ProposalEvelina300651
 

Kürzlich hochgeladen (20)

Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Pitch deck sample detail for New Business Proposal
Pitch deck sample detail for New Business ProposalPitch deck sample detail for New Business Proposal
Pitch deck sample detail for New Business Proposal
 

CYBERSECURITY LEGISLATION

  • 1. Cyber Security briefing to Congress PPD21 and PPD22 By …………… From CSCSS 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 2. Agenda     Why are we here? Is the legislation necessary or are the currently available policy tools sufficient Is new legislation is needed, what need should be addressed and why What authorities and protection should be included? Why? 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 3. Cyber security bills that have not been passed     Presidential Policy Directive-21 replaces Homeland Security Presidential Directive-7 . The Executive Order (EO) does not address all the cyber crime issues and how they can be resolved NSA, FBI, and Department of Homeland Security need legislation to proactively prevent cyber attacks. Both the military and civilians to have jurisdiction over cyber attacks 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 4. Continued…     A situational awareness capability that addresses both physical and cyber aspects the cascading consequences of infrastructure failures Need to update the National Infrastructure Protection Plan There is also a 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 5. Is the legislation necessary?        The legislation is necessary It need to adequately cover the gaps unforeseen and unaddressed by current legislation - Homeland Security Presidential Directive-7 There have been developments in cyber crime nature, frequency and design All the critical infrastructure are at risk from cyber attacks. Federal Information Security Management Act to govern federal government IT security Critical infrastructure companies to meet minimum cyber security regulations. Revise the minimum cyber security regulation so as to meet the increasing cases of cyber crimes 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 6. What should the legislation address? Why?      The legislation should address Transparency and User Protections. The reason is that: The government has already been involved in cyber surveillance against the current laws Private companies survey their employees, customers and competitors The privacy of the government and the private companies 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 7. Industrial espionage has impact ‘hacktivism’ and longest-term affect on share price . 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 8. Projected growth of cyber-security spending in billions 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 9. Authorities and protection to be included?      Private networks- save banks, private companies and individual users from cybercrime Banks- to protect the financial sectors and the country's economy Transport and communication networks-smooth operations and stabilization of the economy Sharing of critical cyber security information between the government and the private sectors. The stock market- Protect it from collapse. 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 10. The authorities         The Department of State, in coordination with DHS, SSAs, and other Federal departments and agencies The Department of Justice (DOJ), including the Federal Bureau of Investigation (FBI) The Department of the Interior, in collaboration with the SSA for the Government Facilities Sector The Department of Commerce (DOC), in collaboration with DHS and other relevant Federal departments and agencies The IC, led by the Director of National Intelligence (DNI), The General Services Administration, in consultation with DOD, and DHS The Nuclear Regulatory Commission (NRC) The Federal Communications Commission, to the extent permitted by law 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 11. Authorities and protection to be included?     Protect and defend computer systems and networks attack Thwart computer security threats against rights and property Use Information to investigate crimes to the underlying security threat to individuals, and national security Previously opposed legislation have important segments that can be used today 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 12. Recommendation       Using aggressive counter measures Making the government collaborate with the private sector Protecting users ‘ privacy from the government and private sector The government and private companies do not observe the democratic principles. The government should extend their commitment to openness in cyber security deals and issues The banks are not sure about the liability concerns in case they share the information 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 13. References     National Security Council(May 2009), The Comprehensive National Cybersecurity Initiative - (CNCI) Fidelis, Richard. "Cyber Security - Freshfields Freshfields." Cyber Security - Freshfields - Freshfields. 31 Mar. 2013. 24 Nov. 2013 http://www.freshfields.com/en/insights/Cyber_security/ Menn, Joseph. "U.S. officials woo tech companies in new push for cybersecurity law."Reuters. 07 Sept. 2013. Thomson Reuters. 24 Nov. 2013 <http://www.reuters.com/article/2013/09/25/us-cybersecuritylaw-idUSBRE98O14S20130925>. Sen. Rockefeller,, John D. "S.1353 - Cybersecurity Act of 2013 113th Congress (2013-2014) BILL." S.1353. 30 July 2013. 24 Nov. 2013 <http://beta.congress.gov/bill/113th/senate-bill/1353>. 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 14. THANK YOU Any Questions? 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.