SlideShare uma empresa Scribd logo
1 de 25
6th Annual Cyber Security Summit
2022: A Look At Cyber Policy
Prepared By: Dawn Yankeelov, Executive Director, Technology
Association of Louisville KY & President, Aspectx 6/17/2022
www.talklou.com @talklou dawny@talklou.com
THANK YOU TO TODAY’S SPONSORS!!!
• Workforce Development Defined
programs
• Development of Tech Talent (Youth)
• Registered IT Apprenticeship in
partnership
• IT Recruitment Fair (virtual or hybrid)
• Entrepreneurship & Innovation—
--Partnership with area organizations (i.e.
Amplify Louisville, Louisville Startup Week,
BLUE, Jamison Ministries, LCCC, and others)
DC Advocacy
– Tech and Business Legislation
– TECNA Public Policy Committee
• State Advocacy
– Working with KY Innovation & KSTC
on Key Tech Initiatives
– Participation with Infragard & Cyber
Work Group (KYDHS) in Cyber steps
-- Techfest
August 2023---5th Techfest, 2 ½ day
education forum covering tech trends
8/2/2022 (c) Copyright TALK. Confidential.
TALK Areas of Focus 2022
• STEAM
-- After school curriculum, including TechGirlz
programs, and Rad Science Skateboard Build
program with partnership from Marwood
Veneer + U of L Speed School/Engineering
Garage
• Monthly Tech TALK Meetups
Eight Live a Year for interested industry
professionals and those working in technology-
centric circles
• Cybersecurity
Efforts tied to workforce development, train-
the-teachers, and adult education
Cyber Collaborative (natl.)
Cyber Readiness Institute (natl.)
• 6th CyberSecurity Summit
June 17th, 2022 - to be held at Bellarmine
University for all cyber professionals
Special projects as desired—i.e. CyberUSA, KY
Dept. of Transportation partnership
June 13, 2022
https://fiscalnote.com/blog/2022-cybersecurity-legislation-regulation
The 2022 State of Cybersecurity Legislation and Regulation in the US -- Feb. 2022
--
One of the largest concerns for an organization is falling victim to a
cyberattack. A significant breach can result in monetary loss, damaged
reputation, and a drain in resources to remedy the situation. The risks are
apparent: cybercrimes increased 600 percent during the early months of the
global COVID-19 pandemic, and will cost the world an estimated $10.5 trillion by
the year 2025. Email spam folders are filled with phishing schemes, and IT
departments are constantly reporting attempts to breach organizational systems.
--
One key subtopic is whether an organization is allowed to pay in the event of a
ransomware attack. For example, New York (NY S 6806) and Hawaii (HB 2052)
have both introduced legislation to prohibit the payment of ransoms in the event of
a cybersecurity incident.
The Strengthening American Cybersecurity Act of 2022 creates reporting
requirements for critical infrastructure and “covered entities” and is intended to
shore up protection of American infrastructure – a critical step in mitigating future
attacks which could be devastating. -- Mar 15, 2022
For incidents, the act requires:
•Notice to be given to CISA within 72 hours
•A full description of the incident and vulnerabilities exploited, along with
what defenses were in place
•If known, contact information or additional details about the responsible
parties to be disclosed
•The type of information that may have been compromised to be disclosed
•Details and contact information from the impacted entity to be shared with
CISA
In addition to disclosing the above information, ransomware
attack disclosure has some other requirements:
•Notice must be given to CISA within 24 hours
•Date of payment, ransom payment demand (including type of virtual
currency), payment instructions and ransom amount must be disclosed
While the national government has yet to release comprehensive
security policies, they have published recommended actions. On
March 21, the White House released a cybersecurity fact sheet in
response to rising cyber warfare risks. Businesses should review
these and implement any steps they haven’t already.
These recommended actions include:
• Mandating multi-factor authentication (MFA)
• Using continuous threat-monitoring tools
• Encrypting and backing up data
• Educating employees on best security practices
• Running emergency simulations to train quick responses
• Checking for and patching vulnerabilities like stolen
passwords
• Building relationships with government security offices
Yet it is estimated that half a million
cybersecuritypositions across the
public and private sectors remain
unfilled, and that gap is onlyexpected
to grow. To compound these
shortages, public and private sector
cybersecurityneeds are constantly
changingas technology and practices
evolve.
The recommendations
include securing
remote access
applications,
enforcing multifactor
authentication, and
developing and
exercising incident
response and recovery
plans.
The President’s Budget
increased cybersecurity funding
for fiscal year 2023 by
nearly 11%, but funding for K-12
cybersecurity education
continues to lag behind, as the
nation faces a shortfall of
over 714K cybersecurity
professionals.
With the support of
policymakers and the
involvement of industry leaders
from CISA, the Department of
Homeland Security (DHS), the
National Initiative for
Cybersecurity Education
(NICE), and the National
Science Foundation (NSF),
National Cybersecurity
Education Month is helping
improve access to K-12
cybersecurity education
nationwide and diversify the
talent pipeline with students
from all backgrounds.
The U.S. isn’t getting ahead of the cyber threat, experts say
June 6, 2022
https://www.washingtonpost.com/politics/2022/06/06/us-isnt-getting-ahead-cyber-threat-experts-say/
….the U.S. is either just as vulnerable to cyberattacks or even more
vulnerable today than it was five years ago.
That assessment, from a group of experts polled by The Cybersecurity 202, reflects a
half-decade during which government and industry have supercharged their efforts to
defend against devastating hacks from foreign governments and criminals — but the
bad guys have upped their game even more, most experts say.
--
“We become ever more vulnerable with each passing day,”
warned Lauren Zabierek, executive director of the Cyber
Project at the Harvard Kennedy School’s Belfer Center. “I don't
know where the bottom is.”
Heightened
Threat
Environment –
June 7, 2022
Cybersecurity needs to be top priority in
nation’s water utilities
https://thehill.com/opinion/cybersecurity
cybersecurity-needs-to-be-top-priority-
utilities/
5-16-2022
There are about 3,300 electric
utilities in the United States. The water
sector, however, has about 50,000
individual community systems, more
than half of which serve fewer than 500
customers.
ESTABLISHMENT OF CYBER UNITS, COMMITTEES,
TASK FORCES, AND STUDIES
Another shift in how legislators are approaching cybersecurity
is by creating government groups to study, implement, and
manage cybersecurity policies. Implementation of grant
programs (US HR 4910), establishment of cyber preparedness
teams (MD SB 754) or cyber civilian corps (IN HB 1274), and
investment in cyber workforces (US HR 6588) will bolster the
institutional knowledge organizations need to counter growing
threats.
Major cyber events, especially recently, have
changed how legislators approach policy.
Illinois has expanded the definition of a
“disaster” in the state’s Emergency
Management Agency Act to include
cybersecurity events (HB 3523), and New
York is considering whether ransomware
should be considered larceny (SB 8296).
May 24, 2022 -- Elections
https://www.ncsl.org/research/elections-and-campaigns/the-canvass-june-
2022.aspx
In recent years, states have also implemented cyber navigator programs—an
individual or team at the state level tasked with helping local election officials take
cybersecurity precautions. At least seven states—Florida, Illinois, Iowa,
Massachusetts, Michigan, Minnesota and Ohio—have such programs in
place. Illinois became the first state to establish a cyber navigator program after the
2016 election, and it did so through legislation.
https://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2021/08/25/facing-foreign-
election-foes-states-hire-cyber-navigators
TALK Public Policy 2022
TALK Public Policy 2022
TALK Public Policy 2022

Mais conteúdo relacionado

Semelhante a TALK Public Policy 2022

Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportLandon Harrell
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017NgocHaBui1
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docxhallettfaustina
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxbriancrawford30935
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docxjessiehampson
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityPaul Ferrillo
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]Lucy Kitchin
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Cybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeCybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeJulie Evans
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfAlexandre Pinheiro
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptxIT Company Dubai
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...TraintechTde
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Semelhante a TALK Public Policy 2022 (20)

Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final Report
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docx
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurity
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
The Impact of Technology on the Profession
The Impact of Technology on the ProfessionThe Impact of Technology on the Profession
The Impact of Technology on the Profession
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeCybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and Practice
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdf
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Mais de Dawn Yankeelov

A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021Dawn Yankeelov
 
Discussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding ReopeningDiscussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding ReopeningDawn Yankeelov
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Dawn Yankeelov
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
The Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitThe Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitDawn Yankeelov
 
Cyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David CarterCyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David CarterDawn Yankeelov
 
Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt. Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt. Dawn Yankeelov
 
Cybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISOCybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISODawn Yankeelov
 
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachLegal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachDawn Yankeelov
 
Kentucky's Cyber Enclave
Kentucky's Cyber EnclaveKentucky's Cyber Enclave
Kentucky's Cyber EnclaveDawn Yankeelov
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Dawn Yankeelov
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in HealthcareRCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in HealthcareDawn Yankeelov
 
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'SellisKentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'SellisDawn Yankeelov
 
PSST: Seamless Data Solutions
PSST:  Seamless Data Solutions PSST:  Seamless Data Solutions
PSST: Seamless Data Solutions Dawn Yankeelov
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in Healthcare RCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare Dawn Yankeelov
 
Cybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresCybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresDawn Yankeelov
 
Understanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KYUnderstanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KYDawn Yankeelov
 
Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys Dawn Yankeelov
 

Mais de Dawn Yankeelov (20)

A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
 
Discussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding ReopeningDiscussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding Reopening
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
The Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitThe Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your Toolkit
 
Cyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David CarterCyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David Carter
 
Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt. Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt.
 
Cybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISOCybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISO
 
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachLegal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
 
Kentucky's Cyber Enclave
Kentucky's Cyber EnclaveKentucky's Cyber Enclave
Kentucky's Cyber Enclave
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in HealthcareRCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare
 
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'SellisKentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
 
PSST: Seamless Data Solutions
PSST:  Seamless Data Solutions PSST:  Seamless Data Solutions
PSST: Seamless Data Solutions
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in Healthcare RCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare
 
Cybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresCybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech Adventures
 
How I Will Phish You
How I Will Phish You How I Will Phish You
How I Will Phish You
 
Understanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KYUnderstanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KY
 
Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

TALK Public Policy 2022

  • 1. 6th Annual Cyber Security Summit 2022: A Look At Cyber Policy Prepared By: Dawn Yankeelov, Executive Director, Technology Association of Louisville KY & President, Aspectx 6/17/2022 www.talklou.com @talklou dawny@talklou.com
  • 2. THANK YOU TO TODAY’S SPONSORS!!!
  • 3.
  • 4. • Workforce Development Defined programs • Development of Tech Talent (Youth) • Registered IT Apprenticeship in partnership • IT Recruitment Fair (virtual or hybrid) • Entrepreneurship & Innovation— --Partnership with area organizations (i.e. Amplify Louisville, Louisville Startup Week, BLUE, Jamison Ministries, LCCC, and others) DC Advocacy – Tech and Business Legislation – TECNA Public Policy Committee • State Advocacy – Working with KY Innovation & KSTC on Key Tech Initiatives – Participation with Infragard & Cyber Work Group (KYDHS) in Cyber steps -- Techfest August 2023---5th Techfest, 2 ½ day education forum covering tech trends 8/2/2022 (c) Copyright TALK. Confidential. TALK Areas of Focus 2022 • STEAM -- After school curriculum, including TechGirlz programs, and Rad Science Skateboard Build program with partnership from Marwood Veneer + U of L Speed School/Engineering Garage • Monthly Tech TALK Meetups Eight Live a Year for interested industry professionals and those working in technology- centric circles • Cybersecurity Efforts tied to workforce development, train- the-teachers, and adult education Cyber Collaborative (natl.) Cyber Readiness Institute (natl.) • 6th CyberSecurity Summit June 17th, 2022 - to be held at Bellarmine University for all cyber professionals Special projects as desired—i.e. CyberUSA, KY Dept. of Transportation partnership
  • 5.
  • 6.
  • 7.
  • 9. https://fiscalnote.com/blog/2022-cybersecurity-legislation-regulation The 2022 State of Cybersecurity Legislation and Regulation in the US -- Feb. 2022 -- One of the largest concerns for an organization is falling victim to a cyberattack. A significant breach can result in monetary loss, damaged reputation, and a drain in resources to remedy the situation. The risks are apparent: cybercrimes increased 600 percent during the early months of the global COVID-19 pandemic, and will cost the world an estimated $10.5 trillion by the year 2025. Email spam folders are filled with phishing schemes, and IT departments are constantly reporting attempts to breach organizational systems. -- One key subtopic is whether an organization is allowed to pay in the event of a ransomware attack. For example, New York (NY S 6806) and Hawaii (HB 2052) have both introduced legislation to prohibit the payment of ransoms in the event of a cybersecurity incident.
  • 10. The Strengthening American Cybersecurity Act of 2022 creates reporting requirements for critical infrastructure and “covered entities” and is intended to shore up protection of American infrastructure – a critical step in mitigating future attacks which could be devastating. -- Mar 15, 2022 For incidents, the act requires: •Notice to be given to CISA within 72 hours •A full description of the incident and vulnerabilities exploited, along with what defenses were in place •If known, contact information or additional details about the responsible parties to be disclosed •The type of information that may have been compromised to be disclosed •Details and contact information from the impacted entity to be shared with CISA In addition to disclosing the above information, ransomware attack disclosure has some other requirements: •Notice must be given to CISA within 24 hours •Date of payment, ransom payment demand (including type of virtual currency), payment instructions and ransom amount must be disclosed
  • 11. While the national government has yet to release comprehensive security policies, they have published recommended actions. On March 21, the White House released a cybersecurity fact sheet in response to rising cyber warfare risks. Businesses should review these and implement any steps they haven’t already. These recommended actions include: • Mandating multi-factor authentication (MFA) • Using continuous threat-monitoring tools • Encrypting and backing up data • Educating employees on best security practices • Running emergency simulations to train quick responses • Checking for and patching vulnerabilities like stolen passwords • Building relationships with government security offices
  • 12. Yet it is estimated that half a million cybersecuritypositions across the public and private sectors remain unfilled, and that gap is onlyexpected to grow. To compound these shortages, public and private sector cybersecurityneeds are constantly changingas technology and practices evolve.
  • 13.
  • 14. The recommendations include securing remote access applications, enforcing multifactor authentication, and developing and exercising incident response and recovery plans.
  • 15. The President’s Budget increased cybersecurity funding for fiscal year 2023 by nearly 11%, but funding for K-12 cybersecurity education continues to lag behind, as the nation faces a shortfall of over 714K cybersecurity professionals. With the support of policymakers and the involvement of industry leaders from CISA, the Department of Homeland Security (DHS), the National Initiative for Cybersecurity Education (NICE), and the National Science Foundation (NSF), National Cybersecurity Education Month is helping improve access to K-12 cybersecurity education nationwide and diversify the talent pipeline with students from all backgrounds.
  • 16. The U.S. isn’t getting ahead of the cyber threat, experts say June 6, 2022 https://www.washingtonpost.com/politics/2022/06/06/us-isnt-getting-ahead-cyber-threat-experts-say/ ….the U.S. is either just as vulnerable to cyberattacks or even more vulnerable today than it was five years ago. That assessment, from a group of experts polled by The Cybersecurity 202, reflects a half-decade during which government and industry have supercharged their efforts to defend against devastating hacks from foreign governments and criminals — but the bad guys have upped their game even more, most experts say. -- “We become ever more vulnerable with each passing day,” warned Lauren Zabierek, executive director of the Cyber Project at the Harvard Kennedy School’s Belfer Center. “I don't know where the bottom is.”
  • 18. Cybersecurity needs to be top priority in nation’s water utilities https://thehill.com/opinion/cybersecurity cybersecurity-needs-to-be-top-priority- utilities/ 5-16-2022 There are about 3,300 electric utilities in the United States. The water sector, however, has about 50,000 individual community systems, more than half of which serve fewer than 500 customers.
  • 19.
  • 20. ESTABLISHMENT OF CYBER UNITS, COMMITTEES, TASK FORCES, AND STUDIES Another shift in how legislators are approaching cybersecurity is by creating government groups to study, implement, and manage cybersecurity policies. Implementation of grant programs (US HR 4910), establishment of cyber preparedness teams (MD SB 754) or cyber civilian corps (IN HB 1274), and investment in cyber workforces (US HR 6588) will bolster the institutional knowledge organizations need to counter growing threats.
  • 21. Major cyber events, especially recently, have changed how legislators approach policy. Illinois has expanded the definition of a “disaster” in the state’s Emergency Management Agency Act to include cybersecurity events (HB 3523), and New York is considering whether ransomware should be considered larceny (SB 8296).
  • 22. May 24, 2022 -- Elections https://www.ncsl.org/research/elections-and-campaigns/the-canvass-june- 2022.aspx In recent years, states have also implemented cyber navigator programs—an individual or team at the state level tasked with helping local election officials take cybersecurity precautions. At least seven states—Florida, Illinois, Iowa, Massachusetts, Michigan, Minnesota and Ohio—have such programs in place. Illinois became the first state to establish a cyber navigator program after the 2016 election, and it did so through legislation. https://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2021/08/25/facing-foreign- election-foes-states-hire-cyber-navigators