SlideShare uma empresa Scribd logo
1 de 1
UNOFFICIAL TEXT
PM-ISE statement for submission to US DHS request for comments
on White House Executive Order 13691 on ISAOs
(See DHS NOTICE FR Doc. 2015-04435, at
https://www.federalregister.gov/articles/2015/03/04/2015-04435/office-of-
cybersecurity-and-communications-national-protection-and-programs-directorate-
notice-of)
"The Standards Coordinating Council (SCC) is an advisory working group to the
Information Sharing and Access Interagency Policy Committee, co-chaired by the
Program Manager for the Information Sharing Environment (www.ise.gov), and
composed of open standards consortia and participating standards stakeholders:
www.standardscoordination.org The SCC provides a forum for cooperation among
open standards communities for identification of, and research on, open standards
and standards projects that support data transactions and exchanges useful to its
information sharing and safeguarding goals and objectives.
SCC's Project Interoperability, which can be accessed at
www.standardscoordination.org/project_interoperability, is a developing
community resource under which participating stakeholders are sharing methods
and use cases, and working towards an agreed common set of architectures and
practices for data sharing and governance.
SCC members believe that successful, widespread cyber risk information sharing, as
contemplated by the February 2015 White House executive order
(https://www.whitehouse.gov/the-press-office/2015/02/13/executive-order-
promoting-private-sector-cybersecurity-information-shari) can and will work, when
grounded in a voluntary, shared set of well-defined agreements and protocols, using
open standards that permit broad adoption and self-governance by sharing
communities. These standards are likely to embrace both technical data methods,
and business process and legal standards for risk sharing, information governance,
privacy protection and voluntary cooperation among independent public and
private parties. The best available standards and practices, in both cases, are likely
to come from more than one organization, and embrace multiple methods and
technologies. Also, cyber risk is global; similar information sharing activities are
underway in multiple regions and jurisdictions, sharing many of the same threats,
and providing additional potentially-relevant methodologies. The SCC is focused on
developing articulated guidance and options for implementing public- and private-
sector sharing communities: we will continue to publish and share our work with
DHS and all stakeholders, as resources to help achieve that goal."

Mais conteúdo relacionado

Mais procurados

International Journal of Web & Semantic Technology (IJWesT)
International Journal of Web & Semantic Technology (IJWesT)International Journal of Web & Semantic Technology (IJWesT)
International Journal of Web & Semantic Technology (IJWesT)dannyijwest
 
CountrySTAT / FENIX Overview 25 – 26 June 2015 FAO HQ, Rome
CountrySTAT / FENIX Overview 25 – 26 June 2015 FAO HQ, RomeCountrySTAT / FENIX Overview 25 – 26 June 2015 FAO HQ, Rome
CountrySTAT / FENIX Overview 25 – 26 June 2015 FAO HQ, RomeFAO
 
Data Without Borders
Data Without BordersData Without Borders
Data Without BordersAeolai
 
State of the Information Industry - stats and trends
State of the Information Industry - stats and trendsState of the Information Industry - stats and trends
State of the Information Industry - stats and trendsOutsell
 
A Return on Investment: Making the data work harder
A Return on Investment: Making the data work harderA Return on Investment: Making the data work harder
A Return on Investment: Making the data work harderJane Stevenson
 
SPC2019 - Managing Content Types in the Modern World
SPC2019 - Managing Content Types in the Modern WorldSPC2019 - Managing Content Types in the Modern World
SPC2019 - Managing Content Types in the Modern WorldMarc D Anderson
 
"FENIX platform OVERVIEW OF THE NEW SOFTWARE PLATFORM AND SYSTEM SETUP"
"FENIX platform OVERVIEW OF THE NEW SOFTWARE PLATFORM AND SYSTEM SETUP""FENIX platform OVERVIEW OF THE NEW SOFTWARE PLATFORM AND SYSTEM SETUP"
"FENIX platform OVERVIEW OF THE NEW SOFTWARE PLATFORM AND SYSTEM SETUP"FAO
 
SHARE Registry, October 2014
SHARE Registry, October 2014SHARE Registry, October 2014
SHARE Registry, October 2014SHARE
 
Open Data - CESBA Session 308 Dec 2, 2016
Open Data - CESBA Session 308 Dec 2, 2016Open Data - CESBA Session 308 Dec 2, 2016
Open Data - CESBA Session 308 Dec 2, 2016Jonathan Brown
 
The role of persistent identifiers in open research
The role of persistent identifiers in open researchThe role of persistent identifiers in open research
The role of persistent identifiers in open researchJisc
 
Digital Transformation of Middle East Administrations
Digital Transformation of Middle East AdministrationsDigital Transformation of Middle East Administrations
Digital Transformation of Middle East AdministrationsDr. Fotios Fitsilis
 
Opening the Gates: Will Open Data Initiatives Make Local Governments in the P...
Opening the Gates: Will Open Data Initiatives Make Local Governments in the P...Opening the Gates: Will Open Data Initiatives Make Local Governments in the P...
Opening the Gates: Will Open Data Initiatives Make Local Governments in the P...Open Data Research Network
 
Developing a persistent identifier roadmap for open access to UK research
Developing a persistent identifier roadmap for open access to UK researchDeveloping a persistent identifier roadmap for open access to UK research
Developing a persistent identifier roadmap for open access to UK researchJisc
 
A community response to the Jisc/UKRI PID project and its goals
A community response to the Jisc/UKRI PID project and its goalsA community response to the Jisc/UKRI PID project and its goals
A community response to the Jisc/UKRI PID project and its goalsJisc
 
Catrina Hopkins Final Project PowerPoint
Catrina Hopkins Final Project PowerPointCatrina Hopkins Final Project PowerPoint
Catrina Hopkins Final Project PowerPoint2230336
 
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16KC Digital Drive
 
OSFair2017 Workshop | OpenDataMonitor
OSFair2017 Workshop | OpenDataMonitorOSFair2017 Workshop | OpenDataMonitor
OSFair2017 Workshop | OpenDataMonitorOpen Science Fair
 
Clarin nl odijk-final_event_2015-03-13
Clarin nl odijk-final_event_2015-03-13Clarin nl odijk-final_event_2015-03-13
Clarin nl odijk-final_event_2015-03-13CLARIAH
 

Mais procurados (20)

International Journal of Web & Semantic Technology (IJWesT)
International Journal of Web & Semantic Technology (IJWesT)International Journal of Web & Semantic Technology (IJWesT)
International Journal of Web & Semantic Technology (IJWesT)
 
CountrySTAT / FENIX Overview 25 – 26 June 2015 FAO HQ, Rome
CountrySTAT / FENIX Overview 25 – 26 June 2015 FAO HQ, RomeCountrySTAT / FENIX Overview 25 – 26 June 2015 FAO HQ, Rome
CountrySTAT / FENIX Overview 25 – 26 June 2015 FAO HQ, Rome
 
Data Without Borders
Data Without BordersData Without Borders
Data Without Borders
 
State of the Information Industry - stats and trends
State of the Information Industry - stats and trendsState of the Information Industry - stats and trends
State of the Information Industry - stats and trends
 
A Return on Investment: Making the data work harder
A Return on Investment: Making the data work harderA Return on Investment: Making the data work harder
A Return on Investment: Making the data work harder
 
SPC2019 - Managing Content Types in the Modern World
SPC2019 - Managing Content Types in the Modern WorldSPC2019 - Managing Content Types in the Modern World
SPC2019 - Managing Content Types in the Modern World
 
LEISA Network Portal
LEISA Network PortalLEISA Network Portal
LEISA Network Portal
 
"FENIX platform OVERVIEW OF THE NEW SOFTWARE PLATFORM AND SYSTEM SETUP"
"FENIX platform OVERVIEW OF THE NEW SOFTWARE PLATFORM AND SYSTEM SETUP""FENIX platform OVERVIEW OF THE NEW SOFTWARE PLATFORM AND SYSTEM SETUP"
"FENIX platform OVERVIEW OF THE NEW SOFTWARE PLATFORM AND SYSTEM SETUP"
 
SHARE Registry, October 2014
SHARE Registry, October 2014SHARE Registry, October 2014
SHARE Registry, October 2014
 
Open Data - CESBA Session 308 Dec 2, 2016
Open Data - CESBA Session 308 Dec 2, 2016Open Data - CESBA Session 308 Dec 2, 2016
Open Data - CESBA Session 308 Dec 2, 2016
 
The role of persistent identifiers in open research
The role of persistent identifiers in open researchThe role of persistent identifiers in open research
The role of persistent identifiers in open research
 
Digital Transformation of Middle East Administrations
Digital Transformation of Middle East AdministrationsDigital Transformation of Middle East Administrations
Digital Transformation of Middle East Administrations
 
Opening the Gates: Will Open Data Initiatives Make Local Governments in the P...
Opening the Gates: Will Open Data Initiatives Make Local Governments in the P...Opening the Gates: Will Open Data Initiatives Make Local Governments in the P...
Opening the Gates: Will Open Data Initiatives Make Local Governments in the P...
 
Developing a persistent identifier roadmap for open access to UK research
Developing a persistent identifier roadmap for open access to UK researchDeveloping a persistent identifier roadmap for open access to UK research
Developing a persistent identifier roadmap for open access to UK research
 
A community response to the Jisc/UKRI PID project and its goals
A community response to the Jisc/UKRI PID project and its goalsA community response to the Jisc/UKRI PID project and its goals
A community response to the Jisc/UKRI PID project and its goals
 
Catrina Hopkins Final Project PowerPoint
Catrina Hopkins Final Project PowerPointCatrina Hopkins Final Project PowerPoint
Catrina Hopkins Final Project PowerPoint
 
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16
Tony Luppino - Law, Technology & Public Policy at UMKC - GCS16
 
OSFair2017 Workshop | OpenDataMonitor
OSFair2017 Workshop | OpenDataMonitorOSFair2017 Workshop | OpenDataMonitor
OSFair2017 Workshop | OpenDataMonitor
 
Clarin nl odijk-final_event_2015-03-13
Clarin nl odijk-final_event_2015-03-13Clarin nl odijk-final_event_2015-03-13
Clarin nl odijk-final_event_2015-03-13
 
Patient rights
Patient rightsPatient rights
Patient rights
 

Destaque

Potential OASIS Geothermal Energy standards project
Potential OASIS Geothermal Energy standards projectPotential OASIS Geothermal Energy standards project
Potential OASIS Geothermal Energy standards projectJamie Clark
 
Briefing on OASIS XLIFF OMOS TC 20160121
Briefing on OASIS XLIFF OMOS TC 20160121Briefing on OASIS XLIFF OMOS TC 20160121
Briefing on OASIS XLIFF OMOS TC 20160121Jamie Clark
 
Global Geothermal Summit, Oct. 12, 2011
Global Geothermal Summit, Oct. 12, 2011Global Geothermal Summit, Oct. 12, 2011
Global Geothermal Summit, Oct. 12, 2011ThinkGeoEnergy
 
REFF Germany, Feb. 29, 2012
REFF Germany, Feb. 29, 2012REFF Germany, Feb. 29, 2012
REFF Germany, Feb. 29, 2012ThinkGeoEnergy
 
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...Jamie Clark
 
Complementary trust: IDEF Registry and Kantara cross-attestation
Complementary trust: IDEF Registry and Kantara cross-attestationComplementary trust: IDEF Registry and Kantara cross-attestation
Complementary trust: IDEF Registry and Kantara cross-attestationJamie Clark
 
OASIS: open source and open standards: internet of things
OASIS: open source and open standards: internet of thingsOASIS: open source and open standards: internet of things
OASIS: open source and open standards: internet of thingsJamie Clark
 
Presentation on Geothermal Energy
Presentation on Geothermal EnergyPresentation on Geothermal Energy
Presentation on Geothermal Energynibeditamishra
 

Destaque (8)

Potential OASIS Geothermal Energy standards project
Potential OASIS Geothermal Energy standards projectPotential OASIS Geothermal Energy standards project
Potential OASIS Geothermal Energy standards project
 
Briefing on OASIS XLIFF OMOS TC 20160121
Briefing on OASIS XLIFF OMOS TC 20160121Briefing on OASIS XLIFF OMOS TC 20160121
Briefing on OASIS XLIFF OMOS TC 20160121
 
Global Geothermal Summit, Oct. 12, 2011
Global Geothermal Summit, Oct. 12, 2011Global Geothermal Summit, Oct. 12, 2011
Global Geothermal Summit, Oct. 12, 2011
 
REFF Germany, Feb. 29, 2012
REFF Germany, Feb. 29, 2012REFF Germany, Feb. 29, 2012
REFF Germany, Feb. 29, 2012
 
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
 
Complementary trust: IDEF Registry and Kantara cross-attestation
Complementary trust: IDEF Registry and Kantara cross-attestationComplementary trust: IDEF Registry and Kantara cross-attestation
Complementary trust: IDEF Registry and Kantara cross-attestation
 
OASIS: open source and open standards: internet of things
OASIS: open source and open standards: internet of thingsOASIS: open source and open standards: internet of things
OASIS: open source and open standards: internet of things
 
Presentation on Geothermal Energy
Presentation on Geothermal EnergyPresentation on Geothermal Energy
Presentation on Geothermal Energy
 

Semelhante a PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)

Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationmikeecholscyber
 
2014 09-10 Share PSI 2.0 talk: Scottish Linked Data Interest Group
2014 09-10 Share PSI 2.0 talk: Scottish Linked Data Interest Group2014 09-10 Share PSI 2.0 talk: Scottish Linked Data Interest Group
2014 09-10 Share PSI 2.0 talk: Scottish Linked Data Interest GroupPeterWinstanley1
 
Please don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxPlease don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxmattjtoni51554
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive OrderBooz Allen Hamilton
 
Blockchain Technology Adoption Effect Onknowledge Management State of the Art...
Blockchain Technology Adoption Effect Onknowledge Management State of the Art...Blockchain Technology Adoption Effect Onknowledge Management State of the Art...
Blockchain Technology Adoption Effect Onknowledge Management State of the Art...ijmvsc
 
BLOCKCHAIN TECHNOLOGY ADOPTION EFFECT ONKNOWLEDGE MANAGEMENT STATE OF THE ART...
BLOCKCHAIN TECHNOLOGY ADOPTION EFFECT ONKNOWLEDGE MANAGEMENT STATE OF THE ART...BLOCKCHAIN TECHNOLOGY ADOPTION EFFECT ONKNOWLEDGE MANAGEMENT STATE OF THE ART...
BLOCKCHAIN TECHNOLOGY ADOPTION EFFECT ONKNOWLEDGE MANAGEMENT STATE OF THE ART...ijmvsc
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks IJECEIAES
 
The Momentum of Open Standards - a Pragmatic Approach to Software Interoperab...
The Momentum of Open Standards - a Pragmatic Approach to Software Interoperab...The Momentum of Open Standards - a Pragmatic Approach to Software Interoperab...
The Momentum of Open Standards - a Pragmatic Approach to Software Interoperab...ePractice.eu
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.CSCJournals
 
Social Space for Geospatial Information
Social Space for Geospatial InformationSocial Space for Geospatial Information
Social Space for Geospatial InformationNaturNetPlus
 
Social Space for Geospatial Information
Social Space for Geospatial InformationSocial Space for Geospatial Information
Social Space for Geospatial InformationNaturNetPlus
 
Ist africa paper_ref_115_doc_3988
Ist africa paper_ref_115_doc_3988Ist africa paper_ref_115_doc_3988
Ist africa paper_ref_115_doc_3988Karel Charvat
 
Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1Andrew Coakley
 
A Roadmap for CrossBorder Data Flows: Future-Proofing Readiness and Cooperati...
A Roadmap for CrossBorder Data Flows: Future-Proofing Readiness and Cooperati...A Roadmap for CrossBorder Data Flows: Future-Proofing Readiness and Cooperati...
A Roadmap for CrossBorder Data Flows: Future-Proofing Readiness and Cooperati...Peerasak C.
 
Governmental Linked Data
Governmental Linked DataGovernmental Linked Data
Governmental Linked DataHaklae Kim
 

Semelhante a PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial) (20)

Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
 
2014 09-10 Share PSI 2.0 talk: Scottish Linked Data Interest Group
2014 09-10 Share PSI 2.0 talk: Scottish Linked Data Interest Group2014 09-10 Share PSI 2.0 talk: Scottish Linked Data Interest Group
2014 09-10 Share PSI 2.0 talk: Scottish Linked Data Interest Group
 
Please don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxPlease don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docx
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
Blockchain Technology Adoption Effect Onknowledge Management State of the Art...
Blockchain Technology Adoption Effect Onknowledge Management State of the Art...Blockchain Technology Adoption Effect Onknowledge Management State of the Art...
Blockchain Technology Adoption Effect Onknowledge Management State of the Art...
 
BLOCKCHAIN TECHNOLOGY ADOPTION EFFECT ONKNOWLEDGE MANAGEMENT STATE OF THE ART...
BLOCKCHAIN TECHNOLOGY ADOPTION EFFECT ONKNOWLEDGE MANAGEMENT STATE OF THE ART...BLOCKCHAIN TECHNOLOGY ADOPTION EFFECT ONKNOWLEDGE MANAGEMENT STATE OF THE ART...
BLOCKCHAIN TECHNOLOGY ADOPTION EFFECT ONKNOWLEDGE MANAGEMENT STATE OF THE ART...
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
 
Introduction to linked data
Introduction to linked dataIntroduction to linked data
Introduction to linked data
 
The Momentum of Open Standards - a Pragmatic Approach to Software Interoperab...
The Momentum of Open Standards - a Pragmatic Approach to Software Interoperab...The Momentum of Open Standards - a Pragmatic Approach to Software Interoperab...
The Momentum of Open Standards - a Pragmatic Approach to Software Interoperab...
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Linked data migrational framework
Linked data migrational frameworkLinked data migrational framework
Linked data migrational framework
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.
 
Social Space for Geospatial Information
Social Space for Geospatial InformationSocial Space for Geospatial Information
Social Space for Geospatial Information
 
Social Space for Geospatial Information
Social Space for Geospatial InformationSocial Space for Geospatial Information
Social Space for Geospatial Information
 
Ist africa paper_ref_115_doc_3988
Ist africa paper_ref_115_doc_3988Ist africa paper_ref_115_doc_3988
Ist africa paper_ref_115_doc_3988
 
Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1
 
A Roadmap for CrossBorder Data Flows: Future-Proofing Readiness and Cooperati...
A Roadmap for CrossBorder Data Flows: Future-Proofing Readiness and Cooperati...A Roadmap for CrossBorder Data Flows: Future-Proofing Readiness and Cooperati...
A Roadmap for CrossBorder Data Flows: Future-Proofing Readiness and Cooperati...
 
Governmental Linked Data
Governmental Linked DataGovernmental Linked Data
Governmental Linked Data
 
Information Sharing and Protection
Information Sharing and ProtectionInformation Sharing and Protection
Information Sharing and Protection
 

Mais de Jamie Clark

NSTIC draft bylaws August 2012 w comments
NSTIC draft bylaws August 2012 w commentsNSTIC draft bylaws August 2012 w comments
NSTIC draft bylaws August 2012 w commentsJamie Clark
 
NSTIC draft charter August 2012 w comments
NSTIC draft charter August 2012 w commentsNSTIC draft charter August 2012 w comments
NSTIC draft charter August 2012 w commentsJamie Clark
 
NSTIC draft bylaws july 2012
NSTIC draft bylaws july 2012NSTIC draft bylaws july 2012
NSTIC draft bylaws july 2012Jamie Clark
 
NSTIC draft charter february 2012
NSTIC draft charter february 2012NSTIC draft charter february 2012
NSTIC draft charter february 2012Jamie Clark
 
Beijing MoST standards + IPR conference Clark-OASIS-2011
Beijing MoST standards + IPR conference Clark-OASIS-2011Beijing MoST standards + IPR conference Clark-OASIS-2011
Beijing MoST standards + IPR conference Clark-OASIS-2011Jamie Clark
 
Abbie Barbir ITU IIW-update
Abbie Barbir ITU IIW-updateAbbie Barbir ITU IIW-update
Abbie Barbir ITU IIW-updateJamie Clark
 
Cathy Medich SC system standards
Cathy Medich SC system standardsCathy Medich SC system standards
Cathy Medich SC system standardsJamie Clark
 
Oasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficialOasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficialJamie Clark
 
EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831Jamie Clark
 
Standards brainstorming: NSTIC/IIW13
Standards brainstorming: NSTIC/IIW13Standards brainstorming: NSTIC/IIW13
Standards brainstorming: NSTIC/IIW13Jamie Clark
 
CESI SOA Standards Conference Beijing 2010
CESI SOA Standards Conference Beijing 2010 CESI SOA Standards Conference Beijing 2010
CESI SOA Standards Conference Beijing 2010 Jamie Clark
 
Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008Jamie Clark
 
Oasis: Standards & the Cloud June2011
Oasis: Standards & the Cloud June2011Oasis: Standards & the Cloud June2011
Oasis: Standards & the Cloud June2011Jamie Clark
 
LISA OASIS-feb2011
LISA OASIS-feb2011LISA OASIS-feb2011
LISA OASIS-feb2011Jamie Clark
 
Open source eu-ict-ipr-clark-2010final
Open source eu-ict-ipr-clark-2010finalOpen source eu-ict-ipr-clark-2010final
Open source eu-ict-ipr-clark-2010finalJamie Clark
 
Clark : Global process, local needs
Clark : Global process, local needsClark : Global process, local needs
Clark : Global process, local needsJamie Clark
 

Mais de Jamie Clark (16)

NSTIC draft bylaws August 2012 w comments
NSTIC draft bylaws August 2012 w commentsNSTIC draft bylaws August 2012 w comments
NSTIC draft bylaws August 2012 w comments
 
NSTIC draft charter August 2012 w comments
NSTIC draft charter August 2012 w commentsNSTIC draft charter August 2012 w comments
NSTIC draft charter August 2012 w comments
 
NSTIC draft bylaws july 2012
NSTIC draft bylaws july 2012NSTIC draft bylaws july 2012
NSTIC draft bylaws july 2012
 
NSTIC draft charter february 2012
NSTIC draft charter february 2012NSTIC draft charter february 2012
NSTIC draft charter february 2012
 
Beijing MoST standards + IPR conference Clark-OASIS-2011
Beijing MoST standards + IPR conference Clark-OASIS-2011Beijing MoST standards + IPR conference Clark-OASIS-2011
Beijing MoST standards + IPR conference Clark-OASIS-2011
 
Abbie Barbir ITU IIW-update
Abbie Barbir ITU IIW-updateAbbie Barbir ITU IIW-update
Abbie Barbir ITU IIW-update
 
Cathy Medich SC system standards
Cathy Medich SC system standardsCathy Medich SC system standards
Cathy Medich SC system standards
 
Oasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficialOasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficial
 
EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831
 
Standards brainstorming: NSTIC/IIW13
Standards brainstorming: NSTIC/IIW13Standards brainstorming: NSTIC/IIW13
Standards brainstorming: NSTIC/IIW13
 
CESI SOA Standards Conference Beijing 2010
CESI SOA Standards Conference Beijing 2010 CESI SOA Standards Conference Beijing 2010
CESI SOA Standards Conference Beijing 2010
 
Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008
 
Oasis: Standards & the Cloud June2011
Oasis: Standards & the Cloud June2011Oasis: Standards & the Cloud June2011
Oasis: Standards & the Cloud June2011
 
LISA OASIS-feb2011
LISA OASIS-feb2011LISA OASIS-feb2011
LISA OASIS-feb2011
 
Open source eu-ict-ipr-clark-2010final
Open source eu-ict-ipr-clark-2010finalOpen source eu-ict-ipr-clark-2010final
Open source eu-ict-ipr-clark-2010final
 
Clark : Global process, local needs
Clark : Global process, local needsClark : Global process, local needs
Clark : Global process, local needs
 

Último

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 

Último (20)

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 

PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)

  • 1. UNOFFICIAL TEXT PM-ISE statement for submission to US DHS request for comments on White House Executive Order 13691 on ISAOs (See DHS NOTICE FR Doc. 2015-04435, at https://www.federalregister.gov/articles/2015/03/04/2015-04435/office-of- cybersecurity-and-communications-national-protection-and-programs-directorate- notice-of) "The Standards Coordinating Council (SCC) is an advisory working group to the Information Sharing and Access Interagency Policy Committee, co-chaired by the Program Manager for the Information Sharing Environment (www.ise.gov), and composed of open standards consortia and participating standards stakeholders: www.standardscoordination.org The SCC provides a forum for cooperation among open standards communities for identification of, and research on, open standards and standards projects that support data transactions and exchanges useful to its information sharing and safeguarding goals and objectives. SCC's Project Interoperability, which can be accessed at www.standardscoordination.org/project_interoperability, is a developing community resource under which participating stakeholders are sharing methods and use cases, and working towards an agreed common set of architectures and practices for data sharing and governance. SCC members believe that successful, widespread cyber risk information sharing, as contemplated by the February 2015 White House executive order (https://www.whitehouse.gov/the-press-office/2015/02/13/executive-order- promoting-private-sector-cybersecurity-information-shari) can and will work, when grounded in a voluntary, shared set of well-defined agreements and protocols, using open standards that permit broad adoption and self-governance by sharing communities. These standards are likely to embrace both technical data methods, and business process and legal standards for risk sharing, information governance, privacy protection and voluntary cooperation among independent public and private parties. The best available standards and practices, in both cases, are likely to come from more than one organization, and embrace multiple methods and technologies. Also, cyber risk is global; similar information sharing activities are underway in multiple regions and jurisdictions, sharing many of the same threats, and providing additional potentially-relevant methodologies. The SCC is focused on developing articulated guidance and options for implementing public- and private- sector sharing communities: we will continue to publish and share our work with DHS and all stakeholders, as resources to help achieve that goal."