SlideShare uma empresa Scribd logo
1 de 14
Cyber Security briefing to Congress
PPD21 and PPD22
By
……………

From

CSCSS
1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Agenda






Why are we here?
Is the legislation necessary or are the currently
available policy tools sufficient
Is new legislation is needed, what need should
be addressed and why
What authorities and protection should be
included? Why?

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Cyber security bills that have not been passed







Presidential Policy Directive-21 replaces
Homeland Security Presidential Directive-7 .
The Executive Order (EO) does not address all
the cyber crime issues and how they can be
resolved
NSA, FBI, and Department of Homeland Security
need legislation to proactively prevent cyber
attacks.
Both the military and civilians to have jurisdiction
over cyber attacks
1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Continued…





A situational awareness capability that addresses
both physical and cyber aspects
the cascading consequences of infrastructure
failures
Need to update the National Infrastructure
Protection Plan
There is also a

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Is the legislation necessary?










The legislation is necessary
It need to adequately cover the gaps unforeseen and
unaddressed by current legislation - Homeland
Security Presidential Directive-7
There have been developments in cyber crime
nature, frequency and design
All the critical infrastructure are at risk from cyber
attacks.
Federal Information Security Management Act to
govern federal government IT security
Critical infrastructure companies to meet minimum
cyber security regulations.
Revise the minimum cyber security regulation so as
to meet the increasing cases of cyber crimes
1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
What should the legislation address? Why?







The legislation should address Transparency and
User Protections.
The reason is that:
The government has already been involved in cyber
surveillance against the current laws
Private companies survey their employees,
customers and competitors
The privacy of the government and the private
companies

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Industrial espionage has impact ‘hacktivism’ and longest-term affect on share price

.

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Projected growth of cyber-security spending in
billions

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Authorities and protection to be included?







Private networks- save banks, private companies
and individual users from cybercrime
Banks- to protect the financial sectors and the
country's economy
Transport and communication networks-smooth
operations and stabilization of the economy
Sharing of critical cyber security information
between the government and the private sectors.
The stock market- Protect it from collapse.

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
The authorities











The Department of State, in coordination with DHS, SSAs,
and other Federal departments and agencies
The Department of Justice (DOJ), including the Federal
Bureau of Investigation (FBI)
The Department of the Interior, in collaboration with the
SSA for the Government Facilities Sector
The Department of Commerce (DOC), in collaboration
with DHS and other relevant Federal departments and
agencies
The IC, led by the Director of National Intelligence (DNI),
The General Services Administration, in consultation with
DOD, and DHS
The Nuclear Regulatory Commission (NRC)
The Federal Communications Commission, to the extent
permitted by law
1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Authorities and protection to be included?






Protect and defend computer systems and
networks attack
Thwart computer security threats against rights
and property
Use Information to investigate crimes to the
underlying security threat to individuals, and
national security
Previously opposed legislation have important
segments that can be used today

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
Recommendation








Using aggressive counter measures
Making the government collaborate with the private
sector
Protecting users ‘ privacy from the government and
private sector
The government and private companies do not
observe the democratic principles.
The government should extend their commitment to
openness in cyber security deals and issues
The banks are not sure about the liability concerns in
case they share the information
1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
References







National Security Council(May 2009), The Comprehensive
National Cybersecurity Initiative - (CNCI)
Fidelis, Richard. "Cyber Security - Freshfields Freshfields." Cyber Security - Freshfields - Freshfields. 31 Mar.
2013. 24 Nov. 2013
http://www.freshfields.com/en/insights/Cyber_security/
Menn, Joseph. "U.S. officials woo tech companies in new push
for cybersecurity law."Reuters. 07 Sept. 2013. Thomson
Reuters. 24 Nov. 2013
<http://www.reuters.com/article/2013/09/25/us-cybersecuritylaw-idUSBRE98O14S20130925>.
Sen. Rockefeller,, John D. "S.1353 - Cybersecurity Act of 2013
113th Congress (2013-2014) BILL." S.1353. 30 July 2013. 24
Nov. 2013 <http://beta.congress.gov/bill/113th/senate-bill/1353>.

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.
THANK

YOU

Any Questions?

1 (800) 6VISIBLE • www.visible.com
© 2004 Visible Systems Corporation. All rights reserved.

Mais conteúdo relacionado

Mais procurados

2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
Kartik Uppal
 
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
Henry Draughon
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
 

Mais procurados (20)

Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
 
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
 
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
IT compliance
IT complianceIT compliance
IT compliance
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
 
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 

Destaque

Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016
Arthit Kliangprom
 
DLT Solutions interview questions and answers
DLT Solutions interview questions and answersDLT Solutions interview questions and answers
DLT Solutions interview questions and answers
getbrid665
 
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
mmata1031
 
Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016
Bradley McKinney
 
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM ExperienceOracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Sean O'Connell
 
AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015
Ross McLendon
 
Makram thesis presentation
Makram thesis presentationMakram thesis presentation
Makram thesis presentation
abdelqad
 
Carahsoft technology interview questions and answers
Carahsoft technology interview questions and answersCarahsoft technology interview questions and answers
Carahsoft technology interview questions and answers
KeisukeHonda66
 
AQSIQ Successful Cases
AQSIQ Successful CasesAQSIQ Successful Cases
AQSIQ Successful Cases
AQSIQ license
 

Destaque (20)

Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016
 
Summary of smart building
Summary of smart buildingSummary of smart building
Summary of smart building
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
 
Odroid Magazine March 2014
Odroid Magazine March 2014Odroid Magazine March 2014
Odroid Magazine March 2014
 
DLT Solutions interview questions and answers
DLT Solutions interview questions and answersDLT Solutions interview questions and answers
DLT Solutions interview questions and answers
 
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
 
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersCross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling Computers
 
Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016
 
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM ExperienceOracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
 
Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]
 
AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015
 
NMRESGI_El Paso Electric Grid Modernization_Bukowski
NMRESGI_El Paso Electric Grid Modernization_BukowskiNMRESGI_El Paso Electric Grid Modernization_Bukowski
NMRESGI_El Paso Electric Grid Modernization_Bukowski
 
Solaris vs Linux
Solaris vs LinuxSolaris vs Linux
Solaris vs Linux
 
Makram thesis presentation
Makram thesis presentationMakram thesis presentation
Makram thesis presentation
 
Carahsoft technology interview questions and answers
Carahsoft technology interview questions and answersCarahsoft technology interview questions and answers
Carahsoft technology interview questions and answers
 
Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15
 
AQSIQ Successful Cases
AQSIQ Successful CasesAQSIQ Successful Cases
AQSIQ Successful Cases
 
Cfmc pumps
Cfmc pumpsCfmc pumps
Cfmc pumps
 
Presentación Ecopetrol
Presentación EcopetrolPresentación Ecopetrol
Presentación Ecopetrol
 
Microbial Limit Test- An Over view
Microbial Limit Test- An Over view Microbial Limit Test- An Over view
Microbial Limit Test- An Over view
 

Semelhante a CYBERSECURITY LEGISLATION

ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
 
4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing
schmiez
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
Lance Michalson
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
Utah Tech Labs
 

Semelhante a CYBERSECURITY LEGISLATION (20)

Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Sec
SecSec
Sec
 
4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing4b. P&C Insurance and The IOT - Z. Schmiesing
4b. P&C Insurance and The IOT - Z. Schmiesing
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps  - SharePoint Fest DCUnderstanding Federal IT Compliance in Three Steps  - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
 
HCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptxHCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptx
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 

Mais de 3.com

Managerial challenges of_information_technologyxx
Managerial challenges of_information_technologyxxManagerial challenges of_information_technologyxx
Managerial challenges of_information_technologyxx
3.com
 
Example of completed_project_eosp (1)
Example of completed_project_eosp (1)Example of completed_project_eosp (1)
Example of completed_project_eosp (1)
3.com
 
Interaction
InteractionInteraction
Interaction
3.com
 
MICROECONOMIC QUIZ
MICROECONOMIC QUIZMICROECONOMIC QUIZ
MICROECONOMIC QUIZ
3.com
 
Quizxxx
QuizxxxQuizxxx
Quizxxx
3.com
 
Problem set 1x
Problem set 1xProblem set 1x
Problem set 1x
3.com
 

Mais de 3.com (7)

Managerial challenges of_information_technologyxx
Managerial challenges of_information_technologyxxManagerial challenges of_information_technologyxx
Managerial challenges of_information_technologyxx
 
Example of completed_project_eosp (1)
Example of completed_project_eosp (1)Example of completed_project_eosp (1)
Example of completed_project_eosp (1)
 
Interaction
InteractionInteraction
Interaction
 
Based on your reading of gideon v
Based on your reading of gideon vBased on your reading of gideon v
Based on your reading of gideon v
 
MICROECONOMIC QUIZ
MICROECONOMIC QUIZMICROECONOMIC QUIZ
MICROECONOMIC QUIZ
 
Quizxxx
QuizxxxQuizxxx
Quizxxx
 
Problem set 1x
Problem set 1xProblem set 1x
Problem set 1x
 

Último

Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
instagramfab782445
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 

Último (20)

Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 

CYBERSECURITY LEGISLATION

  • 1. Cyber Security briefing to Congress PPD21 and PPD22 By …………… From CSCSS 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 2. Agenda     Why are we here? Is the legislation necessary or are the currently available policy tools sufficient Is new legislation is needed, what need should be addressed and why What authorities and protection should be included? Why? 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 3. Cyber security bills that have not been passed     Presidential Policy Directive-21 replaces Homeland Security Presidential Directive-7 . The Executive Order (EO) does not address all the cyber crime issues and how they can be resolved NSA, FBI, and Department of Homeland Security need legislation to proactively prevent cyber attacks. Both the military and civilians to have jurisdiction over cyber attacks 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 4. Continued…     A situational awareness capability that addresses both physical and cyber aspects the cascading consequences of infrastructure failures Need to update the National Infrastructure Protection Plan There is also a 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 5. Is the legislation necessary?        The legislation is necessary It need to adequately cover the gaps unforeseen and unaddressed by current legislation - Homeland Security Presidential Directive-7 There have been developments in cyber crime nature, frequency and design All the critical infrastructure are at risk from cyber attacks. Federal Information Security Management Act to govern federal government IT security Critical infrastructure companies to meet minimum cyber security regulations. Revise the minimum cyber security regulation so as to meet the increasing cases of cyber crimes 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 6. What should the legislation address? Why?      The legislation should address Transparency and User Protections. The reason is that: The government has already been involved in cyber surveillance against the current laws Private companies survey their employees, customers and competitors The privacy of the government and the private companies 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 7. Industrial espionage has impact ‘hacktivism’ and longest-term affect on share price . 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 8. Projected growth of cyber-security spending in billions 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 9. Authorities and protection to be included?      Private networks- save banks, private companies and individual users from cybercrime Banks- to protect the financial sectors and the country's economy Transport and communication networks-smooth operations and stabilization of the economy Sharing of critical cyber security information between the government and the private sectors. The stock market- Protect it from collapse. 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 10. The authorities         The Department of State, in coordination with DHS, SSAs, and other Federal departments and agencies The Department of Justice (DOJ), including the Federal Bureau of Investigation (FBI) The Department of the Interior, in collaboration with the SSA for the Government Facilities Sector The Department of Commerce (DOC), in collaboration with DHS and other relevant Federal departments and agencies The IC, led by the Director of National Intelligence (DNI), The General Services Administration, in consultation with DOD, and DHS The Nuclear Regulatory Commission (NRC) The Federal Communications Commission, to the extent permitted by law 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 11. Authorities and protection to be included?     Protect and defend computer systems and networks attack Thwart computer security threats against rights and property Use Information to investigate crimes to the underlying security threat to individuals, and national security Previously opposed legislation have important segments that can be used today 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 12. Recommendation       Using aggressive counter measures Making the government collaborate with the private sector Protecting users ‘ privacy from the government and private sector The government and private companies do not observe the democratic principles. The government should extend their commitment to openness in cyber security deals and issues The banks are not sure about the liability concerns in case they share the information 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 13. References     National Security Council(May 2009), The Comprehensive National Cybersecurity Initiative - (CNCI) Fidelis, Richard. "Cyber Security - Freshfields Freshfields." Cyber Security - Freshfields - Freshfields. 31 Mar. 2013. 24 Nov. 2013 http://www.freshfields.com/en/insights/Cyber_security/ Menn, Joseph. "U.S. officials woo tech companies in new push for cybersecurity law."Reuters. 07 Sept. 2013. Thomson Reuters. 24 Nov. 2013 <http://www.reuters.com/article/2013/09/25/us-cybersecuritylaw-idUSBRE98O14S20130925>. Sen. Rockefeller,, John D. "S.1353 - Cybersecurity Act of 2013 113th Congress (2013-2014) BILL." S.1353. 30 July 2013. 24 Nov. 2013 <http://beta.congress.gov/bill/113th/senate-bill/1353>. 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.
  • 14. THANK YOU Any Questions? 1 (800) 6VISIBLE • www.visible.com © 2004 Visible Systems Corporation. All rights reserved.