Blog
PART III THE FASTEST (AND CHEAPEST) WAY TO IMPROVE CYBERSECURITY: REFORM REGULATION
A ONCE IN A LIFETIME OPPORTUNITY TO GET GOVERNMENT RIGHT...
Read MorePART II “The Fantasy of the Public Private Partnership & How Reauthorization of CISA Can Address It”
Attached is Part II of ISA’s series “A Once in...
Read MoreINTEREST GROWING IN ISA PROPOSAL TO ELIMINATE CYBER REGULATORY REDUNDANCIES
Earlier this week ISA posted the attached blog arguing that...
Read MoreINTERNET SECURITY ALLIANCE STATEMENT OF SUPPORT FOR THE PIVOTT ACT
The Internet Security Alliance (ISA) strongly supports Chairman Mark Green’s Cyber...
Read MoreDISRUPTION IN DC IS A GOOD THING FOR CYBER
PART ONE: A ONCE IN A LIFETIME OPPORTUNITY I know...
Read MoreISA CALLS FOR INCREASED PARTNERSHIPS ON CYBERSECURITY IN LATIN AMERICAN
Highlighting recent estimates that cyber-crime costs could rise to nearly...
Read MoreKEY BIPARTISAN SENATORS BACK ISA INSPIRED PIVOTT ACT ON WORKFORCE DEVELOPMENT
Today Senator Mike Rounds, (R-ND) Chairman of the Senate Armed...
Read MoreWE SPEND $70 BILLION ON CYBERSECURITY WITH NO WAY TO ASSESS ITS EFFECTIVENESS
It’s difficult to get precise numbers on our non-defense cybersecurity...
Read MoreTHOUGHTS ON SECURITY BY DESIGN/DEFAULT FOR WORLD ECONOMIC FORUM
Larry Clinton’s opening statement Last week I was honored to...
Read MoreWHITE HOUSE SHOULD LOOK TO BOARD’S GUIDENCE ON AI AND CYBERSECURITY – PART 2
The founder of the organization I am honored to lead...
Read MoreWHITE HOUSE SHOULD FOLLOW BOARD’S GUIDANCE ON NEW AI EXECUTIVE ORDER
Introduction by ISA President Larry Clinton There is tremendous anticipation...
Read MoreTHE KEY TO UNDERSTANDING SYSTEMIC CYBER RISK IS MARKET PENETRATION
Introduction by ISA President Larry Clinton The SolarWinds’ Orion software...
Read MoreCOMMERCIAL ECONOMICS ARE INSUFFICIENT TO DEFEND CRITICAL INFRASTRUCTURE FROM CYBER ATTACKS
Introduction by ISA President Larry Clinton Critical Infrastructure in the...
Read MoreFOR THE CYBER PUBLIC-PRIVATE PARTNERSHIP TO WORK THE REGULATORY MODEL NEEDS TO BE REFORMED
Introduction by ISA President Larry Clinton Biden Administration’s National Cybersecurity...
Read MoreDO CYBER REGULATIONS IMPROVE SECURITY? (SPOLIER ALERT: NO)
Introduction by ISA President Larry Clinton Many people new to...
Read MoreCYBERSECURITY REGULATION: DOING THE SAME THING AND FAILING
Introduction by ISA President Larry Clinton Although Albert Einstein probably...
Read MoreLESSONS PRIVATE SECTOR CAN TEACH THE GOVERNMENT ON FIGHTING CYBERCRIME
Introduction by Larry Clinton As we have documented past blogs...
Read MoreONE WAY TO GET CYBERCRIMINALS TO FUND LAW ENFORCEMENT
Introduction by Larry Clinton As we explained in previous blogs...
Read MoreWHAT CAN PINK DO FOR CYBER?
Introduction by Larry Clinton I expect virtually everyone who might...
Read MoreTIME TO MODERNIZE THE MILITARY’S ROLE IN CYBER CRIME DEFENSE
The release of the Department of Defense’s (DOD) 2023 Cyber...
Read MorePOSSIBLE MARKET INCENTIVE PROGRAMS TO PROMOTE SECURITY BY DESIGN AND DEFAULT
Introduction by ISA President Larry Clinton Last week we discussed...
Read MoreHOW CORPORATE BOARDS LOOK AT ARTICIFIAL INTELLIGENCE AND CYBER SECURITY (Part II)?
AI is the new black, in two senses. First, AI...
Read MoreHOW DO CORPORATE BOARDS LOOK AT ARTIFICIAL INTELLIGENCE AND CYBER SECURITY?
According to Politico it’s unofficial AI week on the Capitol...
Read MoreHOW TO DO SECURITY BY DESIGN AND DEFAULT – 10 BEST PRACTICES
In yesterday’s blog, (LINK) we highlighted the Biden Administration’s positive...
Read MoreSTOP BLAMING THE VICTIM: 7 PRINCIPLES SECURE BY DESIGN & DEFAULT
Introduction by ISA President Larry Clinton The reality is that...
Read MoreTHE VIRTUAL CYBERSECURITY ACADEMY—FREE CYBERSECURITY FOR THE GOVERNMENT!
You read that right. By creating a national virtual cybersecurity...
Read MoreCREATING A VIRTUAL CYBERSECURITY ACADEMY SHOULD BE OUR TOP PRIORITY
Introduction by ISA President Larry Clinton The federal government spends...
Read MoreTHE MOST IMPORTANT ISSUE IN CYBERSECURITY DOESN’T GET THE ATTENTION IT DEMANDS
What is the single most important public policy issue in...
Read MoreOMB CAN QUICKLY STOP REDUNDENT WASTEFUL HARMFUL CYBER REGULATIONS
In yesterdays’ post we praised the new national cybersecurity strategy...
Read MoreBIDEN CYBER IMPLEMENTATION PLAN: GREAT FIRST STEP –STUMBLES ON SECOND STEP (PART 1)
President Biden’s National Cybersecurity Strategy (NCS) and subsequent Implementation Plan...
Read MoreTWENTY-FIVE WAYS TO ENHANCE CYBERSECURITY WITHOUT NEW REGULATIONS
Absent a few notable exceptions, traditional regulation has not worked...
Read MoreSTREAMLING CYBERSECURITY REGULATION: AN ELEGANT SOLUTION
In science and public policy, a principal goal is to...
Read MoreINTERNET SECURITY ALLIANCE HIGHLIGHTS FOR JUNE 2023
House Homeland Security Chairman Mark Green hosted a private bi-partisan...
Read MoreCyber Director Position Remains Vacant: ISA Urges a New Strategy for Cybersecurity
In an increasingly interconnected world, cybersecurity has become a paramount...
Read MoreISA APPLAUDS DOD EFFORTS TO HELP SMALL COMPANIES ON COLLECTIVE DEFENSE — MORE WORK ON INCENTIVES NEEDED
BY LARRY CLINTON AND ANNA MISKELLY As the Pentagon’s Cybersecurity...
Read MoreCongress Taking Steps to Address the Biggest Technological Threat of Our Time
By Larry Clinton and Sarah Harmon This past week, the...
Read MoreINTERNET SECURITY ALLIANCE HIGHLIGHTS FOR MAY 2023
ISA meets with White House Cybersecurity Director’s staff to present...
Read MoreQUESTIONS FOR THE BOARD TO CONSIDER IN USING AI
It took Netflix two and a half years to reach...
Read MoreVIRTUAL CYBER ACADEMY WOULD SOLVE WORKFORCE ISSUE AND HELP REDUCE THE DEFICIT
An analysis of the proposal to create a national, virtual,...
Read MoreCHINA BEATING US ON TECH STANDARDS – BIDEN NATIONAL STRATEGY NEEDED
What could possibly be less sexy than setting technical standards?...
Read MoreRSA REPORT ON SECURE BY DESIGN — WE NEED AN HOV LANE
One of the many activities at RSA this week has...
Read MoreJoint Letter from ISA and AGB to House and Senate Appropriations Committee
Dear Congressional Members of the House and Senate Appropriations Committees:...
Read MoreWHAT IS BEST FOR SEC ON CYBER? OLD STYLE REGS OR NACD MODEL?
To begin with, we know the cyber risk oversight model...
Read MoreINTERNET SECURITY ALLIANCE HIGHLIGHTS FOR MARCH 2023
President Biden Releases new National Strategy for Cybersecurity. ISA had...
Read MoreINDEPENDENT REVIEW OF FIXING AMERICAN CYBERSECURITY
A Review of Fixing American Cybersecurity, Edited by Larry Clinton...
Read MoreSEC NEEDS A CYBER MODEL THAT WORKS
Writing in the February edition of Foreign Affairs CISA Director...
Read MoreThe SEC: The Elephant in the New National Cyber Strategy
The Biden Administration’s new National Cybersecurity Strategy is an important...
Read MoreFIRST DO NO HARM: THE MANTRA FOR NEW CYBER REGULATION
The traditional regulatory model – when applied to cybersecurity –...
Read MoreIndustry Leader: OMB Should Take Lead in Deconflicting Regs Under National Cyber Strategy
By Charlie Mitchell / March 13, 2023 Federal agencies should be...
Read MoreWHY CYBER REGULATIONS IN NATIONAL STRATEGY MAY NOT WORK
The new National Cybersecurity Strategy released last week calls for...
Read MoreTHREE QUICK STEPS TO IMPLEMENT THE NATIONAL CYBER STRATEGY (NOT WHAT YOU THINK)
There are probably various government agencies where regulators have already...
Read MoreIS REGULATION THE ANSWER TO OUR CYBERSECURITY PROBLEM (PART I)
There is a is a common misconception that cybersecurity regulation...
Read MoreIS THE CYBERSECURITY PROBLEM ONE ABOUT TECH OR ECONOMICS?
Spoiler alert: It’s both. However, virtually all of our efforts...
Read MoreUS CYBERSECURITY – OLD PRACTICES, NEW VISIONS
US cybersecurity policies have been inadequate for decades and need...
Read MoreFrom Pulitzer Prize winning author Byron Acohido on Last Watchdog.
The review (pasted below) is also available at AUTHOR Q&A:...
Read MoreTHE (ONLY) PATH FOR THE US TO WIN THE DIGITAL WAR WITH CHINA
In a series of posts over the past couple weeks...
Read MoreCAN THE US MATCH CHINA’S MILITARY-CIVIL FUSION MODEL? WILL IT?
In recent posts, we have described how over the last...
Read MoreHuawei is Just the Tip of the Spear in Digital Aggression
In our last post we documented how Huawei technology, thanks...
Read MoreHUAWEI MAKES OFFERS YOU CAN’T REFUSE ADVANCING CHINA’S GOALS
China’s Digital Silk Road Strategy integrates technology, economics, and politics...
Read MoreCISA SAYS WE NEED A NEW CYBERSECURITY MODEL; THEY GOT THAT RIGHT!
Last week, Foreign Affairs magazine published an article written by...
Read MoreCHINA’S DIGITAL STRATEGY IS THE THREAT BALLOONS & TIKTOK ARE TACTICS
In the past few weeks, China’s surveillance balloon and the...
Read MoreCISA’s Todt, in foreword to new book, cites need for industry incentives and strengthened partnerships
By Charlie Mitchell / January 31, 2023 CISA chief of staff Kiersten...
Read MoreFIXING AMERICAN CYBERSECURITY WITH A STRATEGIC PARTNERSHIP AND TOOL-KITS
I’m delighted to announce that this week the Internet Security...
Read MoreINTERNET SECURITY ALLIANCE TOP 25 HIGHLIGHTS OF 2022
Independent research conducted by MIT finds the consensus cybersecurity principles...
Read MoreTHE INTERNET SECURITY ALLIANCE (ISA)
ISA’s Mission is to integrate advanced technology with economics and...
Read MoreMIT Research Documents Effectiveness of Consensus Cyber Risk Oversight Principles
Geneva, Switzerland/November 16/As the World Economic Forum’s annual Cybersecurity Summit...
Read MoreAs cyber attacks increase, here’s how CEOs can improve cyber resilience
Major Findings · The Cyber Risk Principles developed by the...
Read MoreISA PROPOSAL FOR A VIRTUAL CYBERSECURITY NATIONAL SERVICE ACADEMY
PREMISE ONE: CYBERSECURITY IS A NATIONAL DEFENSE IMPERATIVE Just as...
Read MoreTOP TEN REASONS FOR A VIRTUAL CYBERSECURITY SERVICE ACADEMY (Part 1)
In a series of recent posts, we have noted the...
Read MoreTHE CASE FOR A NATIONAL CYBERSECURITY ACADEMY, PART 2
EXECUTIVE SUMMARY In our last post we made the case...
Read MoreTHE CASE FOR A NATIONAL CYBERSECURITY ACADEMY, PART 1: A NATIONAL DEFENSE IMPERATIVE
We need to stop talking about the issue of...
Read MoreIT IS TIME FOR A NATIONAL CYBER SERVICES ACADEMY
Our service academies – West Point, Annapolis the Airforce and...
Read MoreISA Urges SEC To Take a Different Direction with Cybersecurity Reporting
In comments filed with the SEC Monday, the Internet Security...
Read MoreINGLIS PROPOSES CYBER SOCIAL CONTRACT: GREAT IDEA! NOW LET’S TALK TERMS
By Larry Clinton In the latest edition of Foreign Affairs,...
Read MoreRegulation of Cybersecurity Has Been Tried and It Doesn’t Work
By Larry Clinton The focus of the current series of...
Read MorePlayoffs Time: What Can Cyber Policymakers Learn from the NFL?
This blog series began by asserting that in the new...
Read MoreNew Year’s Cyber Resolution: Modernize Cyber Law Enforcement
By Larry Clinton In this series of posts, we have...
Read MoreNew Year’s Cyber Policy Resolution #1: Get Serious About Workforce Development
By Larry Clinton Last week, we discussed that we needed...
Read MoreA NEW YEAR’S CYBER RESOLUTION: LET’S START TALKING ABOUT THINGS THAT REALLY MATTER
By Larry Clinton, President and CEO, Internet Security Alliance I...
Read MoreGUEST BLOG: U.S. Acts against Huawei and ZTE, Allies Disadvantaged in Replicating “Rip and Replace”
By Sarina Krantzler, ISA Research Associate “The greatest victory is...
Read MoreGUEST BLOG: China’s Digital Strategy Threatens U.S. National Security & Diplomatic Partnerships
By Sarina Krantzler, ISA Research Associate This post is the...
Read MoreCYBERSECURITY: STAKEHOLDERS OR PARTNERS? RETURN ON REPORTING?
This week the House Homeland Security Cyber Subcommittee will hold...
Read MoreRethinking Ransomware: We Can Win If We Want To
I’m sure everyone reading this blog knows that about 2...
Read MoreRethinking Cyber Regulation Part II: Creating A Risk-Based Regulatory System
In our previous post, we noted that the new National...
Read MoreRethinking Cyber Regulation — Part I
Last Thursday’s confirmation hearing for Chris Inglis and Jen Easterly...
Read MoreNEW CYBER DIRECTOR NEEDS NEW CYBER THINKING
This post is a one in the “Rethink Cybersecurity” series....
Read MoreCan Chris Inglis Build an Effective Cyber Strategy?
In their 2019 book The Fifth Domain, Richard Clarke and...
Read MoreTreating Cybersecurity as an Economic Issue: Three Levels of Policy Action
On May 11, the chairs and ranking members of seven...
Read MoreCongressional Leaders Agree Cybersecurity is not just an IT Issue, finally
By now anyone who is reading this sort of blog...
Read MoreSolarium Chairs are Right: We Need a Cyber Social Contact
Cyberspace Solarium Commission co-chairs Sen. Angus King (I-ME) and Rep....
Read MoreRethinking Cybersecurity: An Idea Not Running Out of Gas
Although the massive cyberattack on Colonial Pipeline is depriving the...
Read MoreNew Federal CISO “Passionate” for Regulatory Streamlining: Action Required
At a recent meeting of the IT Sector Coordinating Council,...
Read MoreISA TO CONGRESS: SHOW CISA THE MONEY!
The Internet Security Alliance (ISA) is writing to the House...
Read MoreCybersecurity Demands a Collective Defense Model
The U.S. Constitution clearly states that among government’s obligations are...
Read MoreFor Cybersecurity, You Need Management Agility
Numerous factors propel us to rethink our approach to cybersecurity...
Read MoreCyber Leaders Call on Philanthropy to Help
FOR IMMEDIATE RELEASE Cyber Leaders Call on Philanthropy to Help...
Read MoreMUNICH CYBERSECURITY CONFERENCE ADOPTS RETHINK CYBERSECURITY AS THEME
We were delighted to see this week that the seventh...
Read MoreBiden Budget is Minimum Needed for Cybersecurity
Dear Members of the House and Senate Appropriations Committees: The...
Read MoreISA’s Clinton weighs in on need for cyber funding in legislation expanding broadband service
Internet Security Alliance president Larry Clinton is adding his voice...
Read More5,000 Practitioners Sign Up for ISA “Rethink Cyber” Campaign
Four months ago, the 22 sponsors of the Internet Security...
Read MoreWOULD YOU BUILD ROADS YOU KNEW WERE UNSAFE?
President Biden’s massive infrastructure proposal – dubbed infrastructure for the...
Read MoreMayorkas Vision: 2020 – Implementation, pretty retro
New Homeland Security Secretary Alejandro Mayorkas outlined his vision for...
Read MoreInfo Sharing: We Need to Learn from Our Successes
This post is a one in the “Rethink Cybersecurity” series....
Read MoreLawmakers moving on cyber incident-reporting bills; industry hopes to nudge discussion away from regulatory mandates
Members of Congress are moving toward a legislative push for...
Read MoreInternet Security Alliance, partners release consensus principles for boardroom cyber risk management
A trio of groups including the Internet Security Alliance has...
Read MoreWORLD ECONOMIC FORUM ISA & NACD RELEASE GLOBAL GUIDENCE ON CYBER
Although most of the ISA’s “Rethink Cybersecurity campaign” is targeted...
Read MoreFederal officials stress unprecedented levels of coordination as lawmakers continue probe of SolarWinds
Senators on the Homeland Security Committee took their turn probing...
Read MoreCISA TO CONGRESS: SHOW ME THE MONEY!!!
“We need to rethink our approach to managing cybersecurity,” said...
Read MoreThe Cyber Policy Path Forward
Guest Blog: Robert Mayer USTelecom’s Senior Vice President of Cybersecurity...
Read MoreA NEW ROLE FOR MILITARY IN NATION STATE CYBER ATTACKS
As Commander-In-Chief, the President is the ultimate strategic player in...
Read MoreWE NEED TO RETHINK THE MILITARY LAW ENFORCEMENT ROLE IN FIGHTING CYBERCRIME
As cyber-attacks, including from nation states, are accelerating and the...
Read MoreTIME TO DO SOMETHING ABOUT CYBER CRIME
For the past two weeks we have been documenting the...
Read MoreLegal Structures are a Barrier to Fighting Cybercrime
International jurisdictional disputes often keep law enforcement from effectively operating....
Read MoreDISORGANIZED LAW ENFORCEMENT AT THE CAPITOL: JUST LIKE CYBER
The lead story in today’s New York Times on the...
Read MoreTHE FEDS SHOULD LEARN FROM THE PRIVATE SECTOR IN FIGHTING CYBER CRIME
CrowdStrike just posted their latest research on cybercrime and found...
Read MorePUBLIC-PRIVATE PARTNERSHIP: PARENT-CHILD OR MARRIGE?
We are all in this together” has become one of...
Read MoreInternet Security Alliance: CMMC fails to account for the economics of small-business cybersecurity
The Pentagon’s Cybersecurity Maturity Model Certification program will fall short...
Read MoreAs holiday shopping season kicks in, cybersecurity group spotlights policy needs for securing retail sector
Cyber vulnerabilities in the retail sector, always a hot topic...
Read MoreISA’s Clinton cites need to go beyond NDAA in SolarWinds response; congressional researchers see ‘no easy fix’
Larry Clinton of the Internet Security Alliance says the massive...
Read MoreISA’s Clinton presses case against ‘traditional regulatory models’ for securing cyberspace
Industries covered by extensive cybersecurity requirements are not achieving better...
Read MoreU.S. officials characterize SolarWinds hack as ‘intelligence gathering’ operation, ‘likely Russian in origin
The U.S. homeland security and intelligence community in a statement...
Read MoreCyber agency demonstrates value to stakeholders amid SolarWinds, but insiders say the secret sauce must be preserved
The Cybersecurity and Infrastructure Agency has leaned into its role...
Read MoreISA’s Clinton presses case against ‘traditional regulatory models’ for securing cyberspace
Industries covered by extensive cybersecurity requirements are not achieving better...
Read MoreCISA’s Kolasky unveils ‘Systemic Cyber Risk Reduction Venture’ for critical infrastructure
CISA’s National Risk Management Center is launching a multifaceted “risk...
Read MoreGovernment’s own cyber shortcomings undermine calls for regulatory approach, says ISA’s Clinton
The federal government lacks the expertise to mandate effective cybersecurity...
Read MoreInternet Security Alliance’s Clinton makes case for providing cybersecurity funding in COVID relief package
Internet Security Alliance president Larry Clinton hopes to ensure cybersecurity...
Read MoreTech leads broad industry coalition urging inclusion of IT upgrade funds in COVID relief package
Major trade groups representing the technology and other sectors are...
Read MoreISA’s Clinton: ‘Huge mistake’ to expand use of ‘backward-looking,’ ineffective cyber reg model
Cyber regulation has generally created a “backward-looking” compliance approach to...
Read MoreWHY IS CYBER LAW ENFORCEMENT FAILING SO BADLY? (Part I)
The classic TV Drama Dragnet was famous for Lieutenant Joe...
Read MoreCyber Regulations Are Counter-Productive to True Security
The old model simply doesn’t work. All this analysis is...
Read MoreSome Reasons Why Cyber Regulation Doesn’t Work
In previous posts we have documented that independent research shows...
Read MoreDefining success and mapping the road ahead for public-private partnership and critical infrastructure cybersecurity
Sean Atkins is a PhD candidate in security studies and international...
Read MoreWHY IS CYBERSECURITY INCLUDED IN THE COVID RELIEF BILL?
As we all know in addition to massive death and...
Read MoreGovernment’s own cyber shortcomings undermine calls for regulatory approach, says ISA’s Clinton
The federal government lacks the expertise to mandate effective cybersecurity...
Read MoreWhat is the World Economic Forum doing on cybersecurity – 6 principles to unite business in the fight against cybercrime
• The COVID-19 pandemic has opened more opportunities for cyberattacks....
Read MoreIf Government Can’t Regulate Itself, how can it Regulate Industry?
The foundational assumption of the expert agency regulatory model is...
Read MoreNEW CYBER PRINCIPLE SPEAKS TO “SOLARWINDS” STYLE ATTACKS
Today The World Economic Forum, in collaboration with the National...
Read MoreAN ADVERSARIAL REGULATORY MODEL IS ANTI-CYBERSECURITY
A major reason why we are not making progress in...
Read MoreCYBERSECURITY IS EASY AS NIST — NOT!
Virtually any proposed solution to the cybersecurity problem that begins...
Read MoreSECURING THE CAPITOL—SECURING THE INTERNET
Yesterday was Martin Luther King Day. Tomorrow is Presidential Inauguration...
Read MoreA RISK-BASED APPROACH TO NATIONAL CYBERSECURITY
ISA congratulates CISA’s National Risk Management Center, and Director Kolasky...
Read MoreCYBER REGULATION HAS BEEN TRIED AND IT DOESN’T WORK
In previous posts we have argued that the traditional regulatory...
Read MoreANALOG SECURITY METHODS ARE ILL-SUITED TO DIGITAL PROBLEMS
If anything characterizes the 21st century it is speed and...
Read MoreTRADITIONAL REGULATION (BEEN TRIED) WON’T WORK IN CYBERSPACE
Doing the same thing over and over and expecting different...
Read MoreTO ADDRESS SYSTEMIC CYBER RISK – FOLLOW THE MONEY, AGAIN
In the early blogs in this series we illustrated that...
Read MoreIMPORTANT DHS STEPS ON SYSTEMIC CYBER RISK BUT MORE WORK NEEDED
Recognizing the industry interplay, DHS recently moved to a new...
Read More“SMALLER” SYSTEMIC CYBER ATTACKS ARE HAPPENING – IT WILL GET WORSE
The world was caught by surprise in May 2017 by...
Read MoreTHE BIG ONE! CYBER SYSTEMIC RISK – NOT ENTITY RISK –IS INCREASING
The Russian attack on the SolarWinds software is destined to...
Read MoreINTERNET SECURITY ALLIANCE TOP 25 HIGHLIGHTS OF 2021
ISA, World Economic Forum, and National Association of Corporate Directors...
Read MoreInternet Security Alliance Top 25 Highlights of 2020
ISA top 25 ISA highlights for 2020 ISA AND National...
Read MoreWILL SOLAR WINDS FINALLY BLOW AWAY THE SIMPLITIC MODEL OF CYBERSECURITY?
Naturally, and appropriately Congress is beginning its review of the...
Read MoreCONGRESS DOES TWO THINGS WELL: NOTHING & OVERREACT
The man who founded the organization I work for, the...
Read MoreLawmakers plan probes into SolarWinds, underscore Solarium benefits; security pros cite need for fundamental shifts
House and Senate cybersecurity leaders already are planning to examine...
Read MoreIndustry cyber leader urges Biden: ‘Show us the money’ on commitment to cybersecurity
President-elect Biden should demonstrate his commitment to improving cybersecurity in...
Read MoreMR. BIDEN: ON CYBERSECURITY — SHOW US THE MONEY
President-elect Joe Biden’s response to the Russian cyber-attack, that could...
Read MoreSOLAR WINDS PROVES US NEEDS TO RETHINK CYBER POLICY — NDAA NOT ENOUGH
If the dramatic Solar Winds hack of multiple critical US...
Read MoreChina’s Digital Policy Has Consistently Integrated Economics
If you know the enemy and know yourself, you need...
Read MoreGuest Blog: Simple Solutions for a Complex Threat
By Scott Algeier, IT-ISAC Executive Director The IT-ISAC is happy...
Read MoreINNOVATION IN CYBERSECURITY: THE CYBERCRIME STOCK MARKET
The Russian attack on many US government cyber systems reported...
Read MoreLESSONS LEARNED FROM RUSSIAN HACK: WE NEED TO RETHINK OUR APPROACH
There are actually many lessons to be learned from the...
Read MoreMIT CONFERENCE (PART II): HOW ARE ON DOING CYBER POLICY? WE AGREE: BADLY
I was the optimist, I said I could stretch to...
Read MoreWe need to Match our Adversaries -It’s Time for a US Digital Strategy?
If you know the enemy and know yourself, you need...
Read MoreBIDEN: “WE NEED TO LEVEL WITH PEOPLE” – JUST AS TRUE ON CYBERCRIME AS COVID
In a major speech yesterday, President-elect Biden said that notwithstanding...
Read MoreChinese Tech: Spying Around the World They Just Can’t Say No
In earlier posts we documented that China through their comprehensive...
Read MoreSenate Report: US is Losing the Digital World to China
In previous posts we have documented that China has used...
Read MoreChina’s “Soft Power” Play Altering IT Standards BTW They are Winning
In previous blogs we discussed how China used theft of...
Read More5G Rip and Replace Chinese Tech is Too Little -Too late
This post is a one in the “Rethink Cybersecurity” series....
Read MoreCOVID-19 COVID PANDEMIC STRENGTHEN’S CHINA’S HAND
In an earlier post we demonstrated that US diplomatic efforts...
Read MoreThe Chinese Cyber Threat – Huawei Is Just the Beginning of the Problem
There has been substantial press in recent months about the...
Read MoreFirst Step in China Digital Strategy: Exploit Western Vulnerabilities
If the enemy leaves a door open, you must rush...
Read MoreWHAT IF COVID HAD HAPPENED IN 1990 INSTEAD OF 2020? OR 2030?
In early spring of 2020, the world underwent the largest...
Read MoreRETAILERS’ DILEMMA: GO DIGITAL & FACE CONSTANT ATTACKS OR GO BANKRUPT
This post is a one in the “Rethink Cybersecurity” series....
Read MoreWHAT IS THE SMART WAY TO GROW AND SECURE THE SMART GRID?
This post is a one in the “Rethink Cybersecurity” series....
Read MoreARE BANKS REALLY AT THE TOP OF THE CYBERSECURITY ECOSYSTEM?
This post is a one in the “Rethink Cybersecurity” series....
Read MoreInternet Security Alliance launches ‘national dialogue’ on a critical new phase in cyber efforts
The Internet Security Alliance wants to spark a dialogue in...
Read MoreWorld Economic Forum, National Association of Corporate Directors, and ISA Collaboration Shows Centrality of Economics in Cybersecurity
This post is a one in the “Rethink Cybersecurity” series....
Read MoreWorld Economic Forum, National Association of Corporate Directors, and Internet Security Alliance to Collaborate on Global Cyber Principles for Boards of Directors
WASHINGTON, Nov. 19, 2020 — The World Economic Forum (the...
Read MoreTHE BIG PROBLEM IN CYBER DEFENSE IS REALLY SMALL
This post is a one in the “Rethink Cybersecurity” series....
Read MoreMORE THAN MONEY: MEDICAL TECHNOLOGY CREATES RISKS TO HUMAN LIFE
Links to recent posts are available here Just a few...
Read MoreWe Invite You To Follow Our New Daily Cybersecurity Blog
Today, and for the next few months, the Internet Security...
Read MoreInternet Security Alliance launches ‘national dialogue’ on a critical new phase in cyber efforts
The Internet Security Alliance wants to spark a dialogue in...
Read MoreCybersecurity and a potential Biden White House: Past tech priorities resurrected
Even among those who have worked with him, Joe Biden...
Read MoreThinking Fast and Smart About Digital Transformation and Cybersecurity (by Larry Clinton)
American business was largely unprepared to fend off cyber criminals...
Read MorePODCAST – Larry Clinton – How Boards Are Responding to Injustice and Mounting Cyber Risk
Reflecting on how companies are responding to racial injustice; digital...
Read MoreThe Word of the Day isn’t Virus, its Agility
In 1929 the vibrant US economy went through the greatest...
Read MoreISA and NACD Collaborate on Cyber Conference Targeting Corporate Boards
The Internet Security Alliance (ISA) and the National Association of...
Read MoreQ&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level
Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks...
Read MoreISA’s Larry Clinton criticizes Pentagon proposal for ‘intrusive’ access to contractor networks
You know what’s worse than trying to share cybersecurity information?...
Read MoreInternet Security Alliance Applauds NIST Notice on Cyber and Enterprise Risk Management
FOR IMMEDIATE RELEASEContact:Larry Clinton, President and CEOInternet Security Alliancelclinton@isalliance.org(202) 236-0001...
Read MoreThe Coronavirus Pandemic Has Created Novel Cybersecurity Challenges — But It May Also Give Us a Solution to the Cybersecurity Workforce Problem
By Josh Higgins, Senior Director of Policy and Communications The...
Read MoreISA’s Larry Clinton: Current crisis offers chance to examine, address systemic risks to cybersecurity
The COVID-19 crisis reveals the inadequacy of the prevailing “operational”...
Read MoreKey industry group urges federal officials to quickly share risk-management best practices with businesses
The massive shift to work-at-home amid the COVID-19 crisis is...
Read MorePentagon and FCC, at different points on cyber regulation, underscore hybrid nature of U.S. government approach
The Defense Department is leading efforts to set mandatory cybersecurity...
Read MoreHandbook on cyber-risk management help Boards of Directors in Europe secure business resilience
Brussels, Belgium – Today, the Internet Security Alliance (ISA) and...
Read MoreCoronavirus Creates New Insider Cyber Threat and How to Treat It
Instantaneous, Unplanned, Digital Transformation Creates Massive Cyber Risk By Larry...
Read MoreISA Board of Directors Offers Cybersecurity Best Practices for COVID-19 Crisis
The outbreak of coronavirus globally has created a new reality...
Read MoreTop Ten Reasons Why Cybersecurity Is Like Coronavirus
By Larry Clinton I’m not saying cybersecurity and the coronavirus...
Read MoreTop Ten Reasons Why Cybersecurity Is Like Coronavirus
By Larry Clinton I’m not saying cybersecurity and the coronavirus...
Read MoreCyber Principle Two for Boards: Know Your Legal Obligations
This is the second in a series of blogs distilling...
Read MoreThese Are The Big Takeaways From This Year’s RSA Conference 2020
Henry Ford once said, “Coming together is a beginning, staying...
Read MoreThe First Principle of Cybersecurity — It’s Not an “IT” Issue
By Larry Clinton At last week’s RSA Conference, the National...
Read MoreInternet Security Alliance updates ‘handbook’ for corporate boards on managing cyber risks
The Internet Security Alliance has updated its “handbook” for corporate...
Read MoreInternet Security Alliance and National Association of Corporate Directors Release New Guide for Cyber-Risk Oversight
FOR IMMEDIATE RELEASE Contact: Josh Higgins Internet Security Alliance 703-778-0083...
Read MoreCISA leaders, policy vets set for cyber conference with regs, deterrence and more on agenda
The annual RSA security conference launches today in San Francisco...
Read MoreCyber security to attract more venture capital investment, say analysts
The cyber-security market will continue to attract venture capital even...
Read MoreWHAT I HEARD AT THE G-20 CYBERSECURITY DIALOGUE THIS WEEK
WHAT I HEARD AT THE G-20 CYBERSECURITY DIALOGUE THIS WEEK...
Read MoreWhat I’ll Tell the G20 Cybersecurity Dialogue Meeting in Riyadh Today
By Larry Clinton I’m honored to be one of about...
Read MoreSolarium Commission Off to a Good Start: What’s Next (Part II)
Cyberspace Solarium Commission Co-Chair Sen. Angus King (I-ME) has “leaked”...
Read MoreISA: Solarium Commission is Off to a Good Start, Now What?
In 2016 the ISA published a 12-step program for Congress...
Read MoreInternet Security Alliance Top 25 Highlights of 2019
INTERNET SECURITY ALLIANCE TOP 25 HIGHLIGHTS FOR THE YEAR 2019...
Read MoreISA Board to Team-Teach Cybersecurity Course at Wharton
The Internet Security Alliance (ISA) Board of Directors has accepted...
Read MoreCyware Labs awarded as ‘Excellent Threat Intelligence Solutions’ at National Cyber Security Summit
Bengaluru: Cyware Labs, a leading product-based cybersecurity company has recently been...
Read MoreISA Announces Second Asian Handbook for Boards and Cyber
FOR IMMEDIATE RELEASE Contact: Larry Clinton President and CEO, Internet...
Read MoreAgency gets praise for risk management; efforts advance along broad front
The Cybersecurity and Infrastructure Security Agency’s “risk management” philosophy needs...
Read MoreISA’S CLINTON: GDPR SHOWS “FUNDAMENTAL MISUNDERSTANDING” OF CYBER PROBLEM
The Internet Security Alliance’s President Larry Clinton suggested that one...
Read MoreISA’s Clinton: Government shift to risk management is positive, but must accelerate
The federal government is gradually shifting to a “risk management”...
Read MoreISA’s Clinton calls for procurement-based incentives, critiques Pentagon certification plans
A key private-sector leader is criticizing an initiative aimed at...
Read MoreDHS Risk Management Center Head to Keynote International Cyber-Risk Event
Bob Kolasky, Director of the National Risk Management Center in...
Read MoreGlobal Consensus of Industry to Address Cyber Reaches Asia, Is Government Far Behind?
by Larry Clinton Yes, they are. While corporate boards of...
Read MoreKEIDANREN to promote ISA corporate governance cybersecurity principles in Japan
FOR IMMEDIATE RELEASE Contact: Larry Clinton President and CEO, Internet...
Read MoreU.S., German, and Latin American Boards and Cybersecurity: Similarities and Differences
by Larry Clinton In a field seemingly overpopulated with remarkably...
Read MoreISA and European Directors Announce Partnership to Create a Pan-European Culture of Cybersecurity
Brussels, Belgium – Today the Internet Security Alliance (ISA) and...
Read MoreSOMETHING TO BE AWARE OF THIS OCTOBER
by Larry Clinton I have opined in the past, somewhat...
Read MoreCYBERSECURITY COMES TO LATIN AMERICA
by Larry Clinton On Friday I was honored to provide...
Read MoreOrganization of American States, ISA to unveil cybersecurity oversight handbook for corporate boards at OAS Symposium in Santiago
FOR IMMEDIATE RELEASE Contact: Larry Clinton President and CEO, Internet...
Read MoreISA, NACD, and DHS Will Discuss Cybersecurity “From the Top Down”
FOR IMMEDIATE RELEASE Contact: Larry Clinton President and CEO, Internet...
Read MoreNACD AND ISA TO EXPAND COLLABORATION INTERNATIONALLY ON CYBERSECURITY FOR BOARDS OF DIRECTORS
FOR IMMEDIATE RELEASE Contact: Susan Oliver NACD susanboliver@gmail.com 703-216-4078 Josh...
Read MoreDHS Taking Steps in the Right Direction on Cyber Risk Management
by Larry Clinton Perhaps the one thing virtually everyone in...
Read MoreMandatory Cybersecurity Training for Congress: What Kind of Training?
by Larry Clinton Last week, the bipartisan Select Committee on...
Read MoreCapital One Breach Highlights the Danger of Insider Threats
by Josh Higgins When companies think about cybersecurity threats, they...
Read MoreAccountability in Cybersecurity is a Two-Way Street
The biggest story in cybersecurity this past week was the...
Read MorePODCAST – Larry Clinton – How to enhance cybersecurity risk oversight
EY Webinar – June 24, 2019 Larry Clinton
Read MoreRegulators: Don’t Make the Same Cyber Mistakes Over Again
It’s not news that cyber-attacks are increasing both in number...
Read MoreMAN BITES DOG: State Regulators Want Cyber Reg Reform
Yesterday Congressman Cedric Richmond, Chair of the House Homeland Subcommittee...
Read MoreBrush with Greatness: A Chat with a Man Who May Be the Tipping Point Toward Effective Cybersecurity
by Larry Clinton The greatest cyber risk an organization can...
Read MoreCorporate Directors Take the Next Step on Cybersecurity: Where’s Congress?
by Larry Clinton In Chicago this week the National Association...
Read MoreWe Need Sensible Cybersecurity Regulations – More Is Not Necessarily Better
by Larry Clinton When the ISA published the Cybersecurity Social Contract three...
Read MoreISA Leads Executive Education Course on Cybersecurity Today at Wharton School
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreISA Announces All-Star Faculty for Wharton School Class on Cybersecurity
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreExperts from GE and FIS Help Students Deal with the Inevitable: Cyber Attacks
Once upon a time, industry experts would caution students and...
Read MoreCyber Experts Will Help Wharton Students Address the “Most Vexing Challenge”
The insider threat has become one of the biggest threats...
Read MoreInternet Security Alliance to educate executives on cybersecurity during UPenn Wharton School program
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreThe EU Privacy Law is Not Working, But Why?
by Larry Clinton In 2016 the European Union enacted arguably...
Read MoreInternet Security Alliance developing cyber handbook for European corporate boards
The Internet Security Alliance has announced plans to develop a...
Read MoreEuropean corporate boards agree to create European adaptation of Cyber-Risk Oversight Handbook
by Larry Clinton This week the board of directors of...
Read MoreInternet Security Alliance calls on White House to ‘harmonize’ cyber regulations
The industry-based Internet Security Alliance is pressing the White House...
Read MoreWashington Can Help States Face Cybersecurity Threats by Harmonizing Regulations
by Dan Lips The National Governors Association is meeting in...
Read MoreCongress Needs Training in Cybersecurity — The Right Kind of Training
by Larry Clinton Kudos to Representatives Kathleen Rice (D)...
Read MoreU.S.-Japanese Cyber Collaboration Needs to Include the Private Sector
by Larry Clinton While much of the attention on President...
Read MoreAnnual FBI Internet Crime Report Finds $2.7 Billion in Losses in 2018
Internet-enabled crime was responsible for $2.7 billion in losses in...
Read MoreShould we start regulating cybersecurity in the supply chain? Not so fast.
Supply chain has become the hot topic in cybersecurity inside the...
Read MoreISA President Larry Clinton Calls for New Cyber Paradigm at Munich Security Conference
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreISA Top 2018 Highlights
ISA appointed industry co-chair (DHS is government co-chair) of the...
Read MoreWe need a new approach to cyber risk assessment
“Garbage in, garbage out.” For years, cyber risk assessments have...
Read MoreNew cyber security event in Germany discusses pros and cons of emerging technology
A new cyber security event is bringing companies such as...
Read MoreInternet Security Alliance Board of Directors to meet with top State Department cyber official Strayer
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreISA briefs UK officials at British Embassy on cybersecurity for companies, corporate boards of directors
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreOne year later: Two security industry specialists offer views on the cyber world post-Equifax
Two leading cybersecurity professionals — one whose firm offers cyber...
Read MoreInternet Security Alliance renews call for ‘incentives’ following Def Con meeting
Department of Homeland Security official at Def Con last week...
Read MoreAt DEFCON, DHS Gets it Right on Cyber – We Need to Rethink Incentives
When DHS Assistant Secretary for Cyber Security Jeanette Manfra addressed...
Read MoreU.S. Chamber of Commerce, industry groups urge Senate passage of DHS cyber agency bill
A coalition of almost two dozen industry groups led by...
Read MoreIndustry leaders say ‘serious’ policy talks led way to DHS cyber summit
Department of Homeland Security officials have engaged in extensive policy...
Read MoreDHS announces cyber summit as platform for advancing risk-management initiatives
The Department of Homeland Security today formally announced its July...
Read MoreCyber summit could be a much-needed win for Nielsen
The Department of Homeland Security’s planned July 31 cybersecurity summit...
Read MoreISA Sees Evolving Strategy in Homeland Security Secretary’s Recommendations on “Collective Defense”
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreQuestions linger as DHS eyes strategic boost from ‘cyber summit’
The Department of Homeland Security’s planned July 31 cybersecurity summit...
Read MoreInternet Security Alliance & Wharton School Join Executive Education Program on Cybersecurity
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreISA releases international cyber-risk handbooks for German, UK boards of directors
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreTop cybersecurity executives join ISA delegation to World Economic Forum’s new cyber center
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreFollowing Bossert resignation, ISA President Larry Clinton details cyber governance best practices, ongoing policy efforts at U.S. Embassy in London
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreISA to release handbook helping UK boards of directors manage cybersecurity risks
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreISA and BSI to Unveil Cyber-Risk Handbook for German Boards of Directors
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security...
Read MoreISA Supports Acceleration of the NIST Cybersecurity Framework
(WASHINGTON, D.C.) – All or part of the below statement...
Read MoreComments on NIST Cybersecurity Framework 1.1 (Draft 2)
January 19, 2018 Andrea Arbeleaz National Institute of Standards and...
Read MoreISA Calls for New Approach to Cybersecurity in the New Year
(WASHINGTON, D.C.) – In a blog published this morning, Internet...
Read MoreHappy New Year: We Need a New Approach to Cybersecurity
By Larry Clinton We all know we are losing...
Read MoreISA Praises Advancements in new NIST Cybersecurity Framework
(WASHINGTON, D.C.) – The following statement may be attributed to...
Read MoreWharton School Asks ISA to Create Executive Education Program on Cybersecurity
(WASHINGTON, D.C.) – The Internet Security Alliance (ISA) has accepted...
Read MoreISA and German Government to Collaborate on Cyber Handbook for German Boards of Directors
(WASHINGTON, D.C.) – The Internet Security Alliance (ISA) and the...
Read MoreISA’s Clinton Suggests Cybersecurity Awareness Month is Out-Dated
(WASHINGTON, D.C.) – In a speech at the National Press...
Read MoreGerman & US Associations Join Forces to Strengthen International Cybersecurity
(WASHINGTON, D.C.) – Germany’s largest networking platform in the field...
Read MoreISA to Lead Joint DHS – IT Sector Cybersecurity Policy Initiative
(WASHINGTON, D.C.) – Internet Security Alliance (ISA) President Larry Clinton...
Read MoreIs it Time to Sunset Cybersecurity Awareness Month?
Sunsetting Cyber Awareness Month.blog.1017October 2, 2017 By Larry Clinton Raise...
Read MoreEnabling better Cybersecurity Information Sharing with Small and Medium-sized Partners
By Jeff Brown “Information sharing” is one of the most...
Read MoreCybersecurity and the Resilient Mindset
By Cindy Fornelli If you spend some time around the...
Read MoreISA AND CYBER-SECURITY COUNCIL OF GERMANY TO WORK TOGETHER
(WASHINGTON, D.C.) – The Internet Security Alliance (ISA) announced today...
Read MoreView from the C-Suite
ONE RUNS MARATHONS. Another writes young adult sci-fi. Still another...
Read MoreEye on Atlanta: Larry Clinton, President, Internet Security Alliance: A Roadmap for Improving Cyber Preparedness
As company leaders have become better educated about the evolving...
Read MorePetya Provides Context for Briefing Council on Foreign Relations
It appears the dust was just settling from the global...
Read MoreISA TO BRIEF COUNCIL ON FOREIGN RELATIONS ON CYBERSECURITY
(WASHINGTON, D.C.) – Internet Security Alliance President Larry Clinton will...
Read MoreMaintaining Cybersecurity During Mergers & Acquisitions
Mergers and acquisitions are risky times. Headlines treat the combination...
Read MoreBoard Directors Need to Have Discussions on Which Risks to Avoid, Which Risks to Accept, and Which to Mitigate Through Insurance
Total cybersecurity is an unrealistic goal. Cybersecurity is a continuum...
Read MoreDirectors Need to Set the Standards and Expectations for Management to Establish Well-Staffed and Well-Funded Cyber-Risk Framework
Much like any response plan, a cybersecurity framework is only...
Read MoreBoards Need Access to Adequate Cybersecurity Expertise – And Need to Give it Adequate Time on Meeting Agendas
Cyber literacy can be considered similar to financial literacy –...
Read MoreBoards Need to Be Aware of Evolving Cyber-Legal Landscape
Boards of directors face several versions of risk from cyber...
Read MoreHHS Points The Way Forward For Improved Cybersecurity
Last month President Trump issued an Executive Order on cybersecurity...
Read MoreISA Workforce Development Specific Recommendations and the Presidential Commission on Enhancing National Cybersecurity
ISA Workforce Development Recommendations Source: Chapter 9 of The Cybersecurity...
Read MoreISA Utilities Sector Specific Recommendations and the Presidential Commission on Enhancing National Cybersecurity
ISA Telecom Sector Recommendations Source: Chapter 8 of The Cybersecurity...
Read MoreISA Telecom Sector Specific Recommendations and the Presidential Commission on Enhancing National Cybersecurity
ISA Telecom Sector Recommendations Source: Chapter 8 of The Cybersecurity...
Read MoreISA Information Technology Sector Specific Recommendations and the Presidential Commission on Enhancing National Cybersecurity
ISA Information Technology Sector Recommendations Source: Chapter 7 of The...
Read MoreISA Manufacturing Sector Specific Recommendations and the Presidential Commission on Enhancing National Cybersecurity
ISA Manufacturing Sector Recommendations Source: Chapter 10 of The Cybersecurity...
Read MoreISA Insurance Sector Specific Recommendations and the Presidential Commission on Enhancing National Cybersecurity
ISA Insurance Sector Recommendations Source: Chapter 14 of The Cybersecurity...
Read MoreISA Healthcare Sector Specific Recommendations and the Presidential Commission on Enhancing National Cybersecurity
ISA Healthcare Sector Recommendations Source: Chapter 4 of The Cybersecurity...
Read MoreISA Financial Sector Specific Recommendations and the Presidential Commission on Enhancing National Cybersecurity
ISA Financial Sector Recommendations Source: Chapter 5 of The Cybersecurity...
Read MoreISA Defense Industrial Base Sector Specific Recommendations and the Presidential Commission on Enhancing National Cybersecurity
ISA Defense Industrial Base Sector Recommendations Source: Chapter 3 of...
Read MoreISA Auditing Recommendations and the Presidential Commission on Enhancing National Cybersecurity
ISA Auditing Recommendations Source: Chapter 13 of The Cybersecurity Social...
Read MoreISA Agriculture Sector Recommendations and the Presidential Commission on Enhancing National Cybersecurity
ISA Agriculture Sector Recommendations Source: Chapter 11 of The Cybersecurity...
Read MoreISA and Recommendations from the Presidential Commission for Enhancing National Cybersecurity
ISA Policy Positions Source: “A Twelve-Step Program for Implementing the...
Read MoreC-Suite: Cybersecurity is #1 Issue, ISA Report
SC Media Reports: It’s been a topic of discussion for some...
Read MoreBrainstorming on Information Security Best Practices Highlights the 2017 Chicago CISO Executive Leadership Summit
Chief Information Security Officers (CISOs) recognize that collaboration is key...
Read MoreCybersecurity Principle Number 1 for Boards – It’s Not Just About “IT”
It has now become clear that cyber-risk needs oversight at...
Read MoreInternet Security Alliance: NIST framework metrics should focus on threats
The National Institute of Standards and Technology should focus on...
Read MoreMetrics? What Metrics? Finding the Missing Link to the NIST Cybersecurity Framework
The NIST Cybersecurity Framework (NIST CSF) is one of the...
Read MoreCYBER SUMMIT FOR CORPORATE DIRECTORS FEATURES DIVERSE SPEAKERS
(WASHINGTON, D.C.) – The second annual cybersecurity summit specifically targeted...
Read MoreTop 25 ISA Accomplishments in 2016
Top 25 ISA Accomplishments in 2016 PricewaterhouseCooper’s 2016 Global...
Read MoreHow the Trump Budget Would Fund Cybersecurity
The Donald Trump administration, in its proposed fiscal year 2018...
Read MoreModernizing Government Technology Act Passes House
The House of Representatives has passed the Modernizing Government Technology...
Read MoreEye on Chicago: Going on the Offensive to Win the Cyber War
HMG Strategy Reports: Taking a defensive approach to cybersecurity isn’t...
Read MoreISA APPLAUDS TRUMP ADMINISTRATION’S NEW CYBERSECURITY EXECUTIVE ORDER
(WASHINGTON, D.C.) – The Internet Security Alliance (ISA) supports President...
Read MoreCongressional memo on President Trump Cybersecurity Executive Order 13800
The Internet Security Alliance (ISA) supports President Trump’s new executive...
Read MoreAssessing the Latest Draft Cybersecurity Executive Order
The latest draft version of the Trump administration’s cybersecurity executive...
Read MoreNIST work on framework update quietly proceeds amid hubbub over Trump cyber agenda
The National Institute of Standards and Technology is diligently reviewing...
Read MoreIndustry raises concerns with NIST approach to supply-chain risks in cyber framework update
Industry groups across sectors are raising concerns with various aspects...
Read MoreCongress returns, but the real cybersecurity action is taking place off the Hill
Lawmakers return to Capitol Hill this week with a few...
Read MoreBusiness lobby pushes back on NIST Framework measurement plans
Business lobbying groups are pushing back on plans by federal...
Read MoreInternet Security Alliance: Framework metrics would help businesses prioritize efforts
The Internet Security Alliance is calling for metrics that allow...
Read MoreInternet Security Alliance (ISA) and the FAIR Institute Joint Comments on the National Institute of Standards and Technology Cybersecurity Framework Proposed Version 1.1 Update
The Internet Security Alliance (ISA) is a multi-sector trade association...
Read MoreInternet Security Alliance (ISA), Fair Institute File Joint Comments on National Institute of Standards and Technologies (NIST) Framework
WASHINGTON, D.C.) – The Internet Security Alliance and the FAIR...
Read MoreLarry Clinton’s Statement to U.S. Senate Committee on Commerce, Science, and Transportation
CYBERSECURITY IS NOT AN “IT” ISSUE. TO ADDRESS IT EFFECTIVELY...
Read MoreCYBER REGULATION FACT SHEET SHOWS GOVERNMENT MANDATES ARE COUNTER-PRODUCTIVE
(WASHINGTON, D.C.) – The Internet Security Alliance today released a...
Read MoreMetrics abound, but who should be required to measure cyber effectiveness remains a key question
The government has suggested many ways to use metrics to...
Read MoreLatest Executive Order Draft Promotes Risk-Based Approach
The latest version of the draft of a cybersecurity executive...
Read MoreReform the Defense Supply Chain to Face the Realities of Conflict in the Digital Age
For centuries, we’ve operated under the principle that nations are...
Read MoreHouse bill requiring cyber audits by NIST could overhaul agency’s role
Having the National Institute of Standards and Technology audit other...
Read MoreISA SEES BILL ON NIST FRAMEWORK AS STEP IN THE RIGHT DIRECTION
(WASHINGTON, D.C.) – The Internet Security Alliance said today that...
Read MoreBill Seeks Metrics for NIST Cybersecurity Framework
Legislation calling on the National Institute of Standards and Technology...
Read MoreWhy Isn’t There An Academy Awards Ceremony for Cybersecurity
Let me spare you the suspense, because we don’t deserve...
Read MoreCyber Risk Management Guidance for Corporate Directors
Cyber risk management is an increasingly important challenge for organizations...
Read MoreSeven Basic Cybersecurity Measures As Revealed By Wisdom Of The Crowd
Individual experts offer good advice, but when many people agree...
Read MoreFive Principles for Stronger Board Oversight of Cybersecurity
One of the most important jobs of the board is...
Read MoreMovement in the Right Direction on Cyber Security
While the bulk of mainstream news coverage on cyber issues...
Read MoreIT Security Employment Soars to Record High
The number of people employed in the United States as...
Read MoreUpdated cyber ‘handbook’ for business leaders examines changing legal, threat landscape
The updated “Cyber-Risk Oversight” handbook for corporate directors released Thursday...
Read MoreBoards of directors, managers at center of cybersecurity handbook for industry
The server room might be an obvious choice for a...
Read MoreWhy risk management is critical in cybersecurity
If you’re a federal cyber official, the advice in a...
Read MoreFormer DHS head urges Trump to see economic dangers from cyberattacks
Last week’s U.S. intelligence report tracing Russia’s cyber-meddling with the...
Read MoreISA PRAISES EFFORT TO REFORM CYBER SECURITY AUDITING PRACTICES
(WASHINGTON, D.C.) – “The reality is that in most companies...
Read MoreInternet Security Alliance (ISA) Comments to the American Institute of CPA’s (AICPA) on the Creation of a Risk Management Methodology
The Internet Security Alliance congratulates the American Institute of CPAs’...
Read MoreISA SAYS CYBER COMMISSION SHOWS STRENGTHENED CONSENSUS ON CYBER POLICY DIRECTION
(WASHINGTON, D.C.) – The Internet Security Alliance (ISA) welcomes the...
Read MoreCybersecurity Takes its Place in the Boardroom
Those recognized by the National Association of Corporate Directors in...
Read MoreISA HONORED FOR WORK WITH CORPORATE DIRECTORS ON CYBERSECURITY
(WASHINGTON, D.C.) – The National Association of Corporate Directors (NACD)...
Read MoreSC Magazine – Editor’s Choice Award for Outstanding Leadership in Cyber Security
ISA RECEIVES NATIONAL AWARD FOR CYBER SECURITY LEADERSHIP – SC...
Read MoreISA SUPPORTS CHAIRMAN MICHAEL MCCAUL’S EFFORTS TO REORGANIZE DHS
(WASHINGTON, D.C.) – The Internet Security Alliance announced today its...
Read More10 Cheap Tricks to Improve Our Cybersecurity: Part I
On September 15, 2016, the Internet Security Alliance will publish...
Read MoreIMPACT OF BREXIT VOTE ON CYBER SECURITY: Private Sector Needs To Act Responsibly
While I don’t see, much if any, short term operational...
Read MoreISA Present McCurdy Award To Sens. Burr and Feinstein
PRESS RELEASE FOR IMMEDIATE RELEASE June 8, 2016 CONTACT: LARRY...
Read MoreThe Next Administration Needs To Pick Up The Pace
By: Larry Clinton, CEO/President THE NEXT ADMINISTRATION NEEDS TO PICK...
Read MoreGovernment Needs To Get Its Own Act Together With Respect To Cybersecurity
By: Larry Clinton, CEO/President Last week, I commented that given...
Read MoreDear Cyber Commission, We Don’t Need a New Plan
By: Larry Clinton, CEO/PRESIDENT A wise person once said every...
Read MoreFarms Big and Small Prime Targets for Cyber Attacks
Public News Service Reports: Officials from the FBI and the...
Read MoreInternet Security Alliance Appoints David Perera as Assistant Vice President
The Internet Security Alliance (ISA) is delighted to announce that...
Read MoreClinton Briefs Sector Coordinating Council On Encryption Project
March 18, 2016 – FOR IMMEDIATE RELEASE: Washington,...
Read MoreISA Receives National Award For Cyber Security Leaders
PRESS RELEASE March 3, 2016 – FOR IMMEDIATE RELEASE: Washington,...
Read MoreTrump Leading The Democratic Candidate
PRESS RELEASE March 1, 2016 – Washington, DC TRUMP THE...
Read MoreLeading Figures in Cybersecurity and Privacy Advocate for an End to the War Between Privacy and Security
PR Newswire Reports: The ‘Digital Equilibrium Project’ works to bring...
Read MoreISA Hails Launch Of Digital Equilibrium Project
PRESS RELEASE February 22, 2016 – WASHINGTON DC ISA HAILS...
Read MoreIndustry Coalition Urges Specific Agenda To NIST On Cyber Security Framework
PRESS RELEASE February 21st, 2016 – FOR IMMEDIATE RELEASE: Washington,...
Read MoreInternet Security Alliance (ISA) Joint Comments with American Gas Association (AGA), Utilities Telecom Council (UTC), Edison Electric Institute (EEI), Association of American Railroads (AAR), and CompTIA to the National Institute of Standards and Technology on “Framework for Improving Critical Infrastructure Cybersecurity”
We want to thank NIST both for the opportunity to...
Read MoreISA Praises Administration For Budget Increases For Cyber Security
PRESS RELEASE February 9 2016 – FOR IMMEDIATE RELEASE: Washington,...
Read MoreObama Creating Federal Ciso Post
Bank Info Security Reports: President Obama is creating the position...
Read MoreTop 25 ISA Achievements in 2015
ISA Top 25 Achievements in 2015 PricewaterhouseCoopers releases its annual...
Read MoreCybersecurity underfunded, industry tells congress
GCN Reports: Agency IT managers who believe they do not...
Read MoreSchooling Uncle Sam
Politico Reports: Here’s the cybersecurity three-step the federal government should...
Read MoreAmerica is loosing the ‘Cyber Arms Race’
The Daily Caller Reports: The federal government is falling behind in...
Read MoreLarry Clinton Testimony – House – “Cyber Security: What the Federal Government Can Learn from the Private Sector”
Joint Hearing before the Subcommittee on Research and Technology (Committee...
Read MoreISA Tells Congress What Government Should Learn About Cyber Security
PRESS RELEASE January 7, 2016 – FOR IMMEDIATE RELEASE: Washington,...
Read MoreCongress Set to Enact Cyberthreat Information-Sharing Law
GovInfoSecurity Reports: After years of failing to enact cyberthreat information-sharing...
Read MoreInternet Security Alliance president outlines cyber partnership best practices
Inside Cybersecurity Reports: A new study by Internet Security Alliance...
Read MoreIndustry wary of power grab by feds on cybersecurity
Washington Examiner Reports: The National Institute of Standards and Technology...
Read MoreProspect of regulation hovers over cyber policy landscape
SC Magazine Reports: As 2015 nears an end, the industry-led,...
Read MoreNIST process could help address cyber reg concerns in finance sector
Inside Cybersecurity Reports: Financial sector representatives are looking to an...
Read MoreISA’s Clinton: Failure to implement executive order spurs regulatory push
Inside Cybersecurity Reports: Incomplete efforts to implement President Obama’s “visionary”...
Read MoreTop 25 ISA Accomplishments in 2014
Top 25 ISA Highlights 2014 ISA Board approves new 3-year...
Read MoreCyber security bill passes Senate muster
BusinessInsurance.com Reports: Passage of long-awaited cyber security legislation will be...
Read MoreDHS insurance report could inform development of cyber info-sharing standards
Inside Cybersecurity Reports: A federal report that proposes hacked companies...
Read MoreAppetites for more: Government actions
SC Magazine Reports: Appetites for more: Government actions (10.1.2015) Cybersecurity...
Read MoreAppliance takeover?: Internet of Things
em>SC Magazine Reports: Had the recently departed filmmaker Wes Craven...
Read MoreDHS selection for info-share standards role praised, questioned
Inside Cybersecurity Reports: The Department of Homeland Security is earning...
Read MoreDHS nears pivotal decision on standards body for new info-sharing entities
Inside Cybersecurity Reports: President Obama’s push to broaden the sharing...
Read MoreDHS Workshop Marks Key Phase of Obama’s Cyber Information Sharing Push
Inside Cybersecurity Reports: The Department of Homeland Security will convene...
Read MoreISA’s Clinton on List Of 100 Most Influential In Corporate Governance
Dark Reading Reports: The Internet Security Alliance (ISA) is proud...
Read MoreEvolving Threat Landscape Demands Executives Understand Cyber Risk
Today.US Reports: In the wake of a number of recent...
Read MoreConcerns over cyber security reach corporate boardrooms of Michigan manufacturers
MiBiz Reports: Manufacturing executives in West Michigan and nationwide worry...
Read MoreInternet Security Alliance (ISA) Comments to Department of Homeland Security on the Initiative to Identify Best Practices for Information Sharing and Analysis Organizations (ISAO)
The March 4, 2015 Federal Register Notice announcing the March...
Read MoreInternet Security Alliance (ISA) Comments to the Commission on Enhancing National Cybersecurity
Topics Addressed This section of our comments addresses issues faced...
Read MoreMajor Indian Trade Group Seeks Alliance with ISA
In November of 2013, Larry Clinton, the President and CEO...
Read MoreISA Featured on PBS, FOX Business, NYT, WSJ, CBS, CNN International, MSNBC, C-SPAN, CNBC & Other Media Outlets
As the issue of cyber security grows increasingly more...
Read MoreDHS Under Secretary Spaulding inserts ISA recommendations on cyber risk into new National Infrastructure Protection Plan
The National Infrastructure Protection Plan (NIPP) established a strategic direction...
Read MoreWhite House Releases “Cyber Space Policy Review” — ISA is Most Cited Source
Released in 2009, the Cyber Space Policy Review was the...
Read MoreISA Hosts Conference on Cyber Security at White House Featuring DHS Secretary
The Internet Security Alliance hosted an invitation-only event at the...
Read MoreISA takes Lead Role in Construction of NIST Framework
In response to the February 2013 executive order released by...
Read MoreObama’s Cybersecurity Executive Order 13636
In February 2013, President Obama issued Executive Order 13636: Improving...
Read MoreNACD Asks ISA For Best Practices Guide
<h3>NACD asks ISA to create best practices guide for corporate...
Read MoreISA Criteria For Assessing The Cybersecurity Exec Order
Click Here for Full Document EXECUTIVE SUMMARY – ASSESSING PRESIDENT...
Read MoreINTERNET SECURITY ALLIANCE AND CYBER SECURITY COUNCIL OF GERMANY ANNOUNCE INDUSTRY ALLIANCE FOR TRANSCONTINENTAL CYBER SECURITY
PRESS RELEASE January 24, 2014 – FOR IMMEDIATE RELEASE: Washington, DC...
Read MoreTop 25 ISA Accomplishments of 2013
Top 25 ISA Accomplishments in 2013 President Obama releases his...
Read MoreDIGIT INTERVIEWS – Larry Clinton, Cyber Security Expert
In an increasingly digital world, where the Internet is starting...
Read MoreMedia Asks ISA To Comment On WH Cyber Order
ISA on CNBC On February 13, 2013, following the release...
Read MoreInternet Security Alliance (ISA) Comments to the National Institute of Standards and Technology on “Developing a Framework to Improve Critical Infrastructure Cybersecurity”
Current Risk Management Practices: NIST solicits information about how organizations...
Read More“Cyber Czar” Praises ISA on Health Care Program
In an unusual move, the White House’s cyber security lead,...
Read MoreISA Testimony Leads To Bipartisan Cyber Incentives Effort
ISA’s long-standing efforts to create an economically viable and sustainable...
Read MoreISA Leads Effort W/DHS To “Reboot” Ind-Govt Partership
Since the crafting of the National Infrastructure Protection Plan (NIPP),...
Read MoreISA Briefs FDIC On ISA’s Financial Cyber Risk Program
Starting in 2006, the ISA began its program on the...
Read MoreISA and Michael Chertoff Keynote World Nuclear Security Event
The World Institute of Nuclear Security (WINS) contacted the ISA...
Read MoreISA Briefs Congress On Information Sharing
Information sharing is one of the most important tools in...
Read MoreCOMMERCE SECRETARY: ISA Mobile Security Work Top Achievement
A year after President Obama issued his “Cyberspace Policy Review,” ...
Read MoreISA Briefs NATO Cyber Centre For Excellence
While many of ISA’s member companies are U.S.-based, virtually all...
Read MoreISA Releases Cyber Supply Chain Roadmap
The ISA launched its first supply chain program in...
Read MoreHouse GOP Task Force Report On Cybersecurity Adopts ISA Recommend
In the 112th Congress, a high-level task force convened by...
Read MoreISA Hosts White House Event on Cybersecurity And Economy
On June 6, 2012, the Internet Security Alliance hosted an...
Read MoreBill Would Have Businesses Foot Cost Of Cyberwar
Business executives and national security leaders are of one mind...
Read MoreBILL WOULD HAVE BUSINESSES FOOT COST OF CYBERWAR
By Tom Gjelten Business executives and national security leaders are...
Read MoreBill Would Have Businesses Foot Cost of Cyberwar
By Tom Gjelten (National Public Radio (NPR) – Morning Edition) Business...
Read MoreMitigating PHI Danger In The Cloud
By Rick Kam For all of its benefits, cloud computing poses...
Read MoreCybersecurity Bill Passes, Obama Threatens Veto
The Cyber Intelligence Sharing and Protection Act, which has been...
Read MoreCybersecurity Bill Passes, Obama Threatens Veto
By David Goldman (CNN) NEW YORK (CNNMoney) — The House of...
Read MoreSecurity Legislation: IT Insider with ISA’s Larry Clinton
There are a number of cybersecurity bills hotly debated on...
Read MoreGroup Calls For Public-Private Alliance To Protect Cyberspace
By Andrew Feinberg (The Hill) As Congress turns its focus to...
Read MoreMilitarisation of cyberspace: how the global power struggle moved online
Rise of cyber-attacks on critical infrastructure on both sides of...
Read MoreMILITARISATION OF CYBERSPACE: How The Global Power Struggle Moved Online
Rise of cyber-attacks on critical infrastructure on both sides of...
Read MoreData Breaches Of Small Business, Including Doctor Offices, On The Rise
A report says cyber criminals are seeking what they consider...
Read MoreDebriefing The PHI Report: Determining The True Cost Of A Data Breach
DEBRIEFING THE PHI REPORT: DETERMINING THE TRUE COST OF A...
Read MoreMarch 21 Free Webinar to Highlight Finding From The Financial Impact of Breached Protected Health Information
NEW YORK, — On Wednesday, March 21, 2012, at 2:00...
Read MoreCybersecurity Bill Faces Uncertain Future In Fight Over Regulation
By Gerry Smith (Huffington Post) WASHINGTON — It is a scenario...
Read MoreBluecross Blueshied of Tennessee Fined $1.5 Million
By Integracon The Department of Health and Human Services is...
Read MoreNew Report Highlights The Costs of Document Security Breaches for Healthcare Providers
The American National Standards Institute has released a report emphasizing...
Read MoreHealthcare Security Pros Need To Speak The Language Of Finance
Experts say PHI protectors can’t pay for data protection because...
Read MoreANSI Releases Business Case For Safeguarding PHI Data
The American National Standards Institute (ANSI) has released a report...
Read MoreFREE WEBINAR: How To Calculate The Cost Of A Data Breach And What To Do About It
Clearwater Compliance, a prominent HIPAA-HITECH compliance consultancy and software provider,...
Read More5 Things CIOs Need To Know About Funding The Protections Of PHI
By Michelle McNickle With groups recently banding together to demand a...
Read MoreData Theft Costs Tennesse Blue Cross Big Bucks
Blue Cross Blue Shield of Tennessee agrees to pay $1.5...
Read MoreHow To Calculate The Cost Of A Hospital Data Breach
By Ron Shinkman Although hospital operators know that a data breach...
Read More5 Best Practices for HIPAA Security
By Michelle McNickle The risk of protected health information being breached...
Read MoreThe Benefits And Limitations of Cyberinsurance
By Risk Management Magazine The Information Age. The Digital Age. The...
Read MoreOCR “Chomping On The Bit” To Audit Business Associates For HIPAA Hi-Tech Compliance
By Jack Anderson CEO Compliance Helper Here is a quote...
Read MoreData Breaches Put Patients At Risk For Identity Theft
DATA BREACHES PUT PATIENTS AT RISK FOR IDENTITY THEFT By:...
Read MoreNew ANSI Report Calls For Enhanced Security To Safeguard Protected Health Information
Report is a call to action for healthcare to invest...
Read MoreOR: Portland Psychiatrist Alerting Patients Personal Information Stolen
By Dissent Nick Budnick reports: A Northwest Portland psychiatrist is putting...
Read MoreNew Report Calls For Enhanced Security To Safeguard Protected Health Insurance
By Steve Campbell With the release of the recent The Financial Impact...
Read MoreReport Offers PHI Security Guidance, Metrics for Breach Cost Analysis
To view the original article please click here. By Brian Eastwood...
Read MoreFinancial Impact Of Breached Protected Health Information Report Helps IT Pros Make The Business Case For Patient Data Protection
By Ericka Chickowski As the number of healthcare data breaches continues...
Read MorePHI Project Release Report About Health Care Data Security
PHI PROJECT RELEASE REPORT ABOUT HEALTH CARE DATA SECURITY On...
Read MoreSecurity Experts At A Loss For Words
By Abraham To view the original article please click here. No it...
Read MoreANSI Publishes Report On Security Breaches
By AuntMinnie.com Staff Writers The Identity Theft Prevention and Identity...
Read MoreHealthcare Security Pros Need To Speak The Language of Finance
Experts say PHI protectors can’t pay for data protection because...
Read MoreRallying Support For Security Investments
New Method for Quantifying Breach Costs, Justifying Spending By Howard...
Read MoreHealthcare Industry CIOs, CSOs Must Improve Security
By Thor Olavsrud Given that stolen medical records can bring $50...
Read MoreANSI: Know The Impact Of A Breach Before It Occurs
To view the original article please click here. As adoption rates...
Read MoreREPORT: Securing Protect Health Information ‘Not Always A Top Priority’
By Renee Boucher Ferguson A comprehensive new report released this week, outlines the...
Read MoreNew Report Calls For Enhanced Security To Safeguard Protected Health Information
5-Step Method Provides Health Care Organizations with Tool to Estimate...
Read MoreTightened Cyber Security Required For Digital Healthcare Adoption
By Kris The U.S. government is encouraging healthcare organisations to utilise...
Read MoreHealthcare Industry CIOs, CSOs Must Improve Security
By Thor Olavsrud Given that stolen medical records can bring $50...
Read MoreVERIZON: Outside Threats Dominate Data Breaches
By: Simply Security Outside attacks were most responsible for data...
Read MoreQuantifying The Financial Risk Of Privacy Breach
How much should a company handling Protected Health Information (PHI)[1]spend...
Read MoreStandards Body Releases E-Health Hack Calculator
By Aliya Sternstein Faced with the reality that health care data...
Read MoreStudy Blames Digital Health Data Breaches on Lack of Funding, Support
By Chris Strohm WASHINGTON — Insufficient funding and lack of executive...
Read More5 Steps To Estimate Potential Costs Of A Data Breach
By Kathleen Roney The American National Standards Institute, The Santa Fe...
Read MoreReport Urges Health Care To Assess Financial Impact Of Data Breaches
By Brian T. Horowitz As the Obama administration provides incentives for meaningful...
Read MoreNew Alliance Makes Case For Tighter Reins On Health Info
Bernie Monegain, Editor To view the original article please click here....
Read MoreHealth Organization Lagging In Ensuring Data Privacy, Security
To view the original article please click here. Many health care...
Read MoreFormula Helps Health-Care Industry Estimate Cost Of A Data Breach
Puget Sound Business Journal by Emily Parkhurst , Staff Writer...
Read MoreProtect Health Data, Report Urges
By John Pulley March 5, 2012 The time and money spent protecting...
Read MoreA New Report Examines The Financial Impact of Breaches Of Protected Health Information
AND WAYS TO DEVELOP A BUSINESS CASE FOR ENHANCE PROTECTION...
Read More5 Steps To Assess Health Data Breach Risks
New report delves into the threats healthcare providers face for...
Read MorePHI PROJECT: Don’t Ignore Breach Consequences
March 05, 2012 | Bernie Monegain, Contributing Editor Several healthcare...
Read More7 Keys To Understanding The Financial Impact Of Breached PHI
March 05, 2012 | Michelle McNickle, New Media Producer To...
Read MoreDigital Health Data At Risk From Manager Support, Study Finds
By Chris Strohm – Mar 5, 2012 12:01 AM ET Insufficient...
Read MoreANSI To Release Health Info Security Report
A March 5 news conference to unveil it will include...
Read MoreTax Breaks Considered To Improve Cybersecurity on Vital Networks
By Chris Strohm (Bloomberg) To view the original article please click...
Read MoreANALYSIS: Government Must ‘Modernize’ Cyber Defense
By Jack Moore (Federal News Radio) Even as the House...
Read MoreFeds Should Provide Industry With Cybersecurity Data And Incentives, Experts Testify
(Info Security) The US communications industry needs better information sharing,...
Read MoreExperts Disagree On Focus Of Cybersecurity Legislation
By Molly Bernhart Walker (FierceIT) Cybersecurity legislation is needed, agreed...
Read MoreSecurity Experts Ask House For Light Regulatory Touch
Technology industry representatives — looking to prevent an additional set...
Read MoreCyber Regulation Lost In A Time Machine
Jettisoning Old Ideas about Securing Vital IT Networks By Eric...
Read MoreCyber Security and the Private Sector
House Energy and Commerce Subcommitte on Communications and Technology Witnesses...
Read MoreCYBERSECURITY: Threats To Communications Networks And Private-Sector Responses
To view the original article please click here. The Subcommittee on...
Read MoreEntrust President and CEO Outlines Cybersecurity Dangers
CONNER SPEAKS DURING CONGRESSIONAL SUBCOMMITTEE HEARING Entrust executive provides insight...
Read MoreTHE CIRCUIT: Amazon and Viacom Strike A Deal
CYBERSECURITY HEARING, SPRINT EARNINGS By Hayley Tsukayama (The Washington Post)...
Read MoreHouse Subcom Serious About Cybersecurity
Experts Say Threat is Growing, as Roles of MSOs,Other ISPs...
Read MoreLegal, Policy Frameworks Can Hamper Cybersecurity
By William Jackson (GCN) Tools are available to counter many...
Read MoreCybersecurity Experts: Major Telecom Providers Are Secure
By Gautham Nagesh (The Hill) The major telecom providers have...
Read MoreOVERNIGHT TECH: Telecom Subpanel Tackles Cybersecurity
By Brendan Sasso and Gautham Nagesh THE LEDE: The House...
Read MoreSAAS, APTS And Asymmetric Risk The Spotlight As Security Threats
By Bernard Golden (CIO-IN) I had the opportunity to speak...
Read MoreSenate Cyber Legislation Facing Industry Resistance Over Cost
By Eric Engleman and Chris Strohm Jan. 31 (Bloomberg) —...
Read MoreSecurity Software Program Essentials
COMPUTER INTERNET SECURITY SOFTWARE PROGRAM By Ona (Apollomozi) Using your...
Read MoreInternet Security Alliance Gathers At NAM
By Matthew Lavoie (Shopfloor) Chairman of the House Intelligence Committee...
Read MoreInternet Security Alliance Endorses Cyber Security Legislation
By Anthony Freed (InfoSec Island) To view the original article...
Read MoreCSPAN: The Communicators on cybersecurity and privacy issues
Marc Rotenberg and Larry Clinton, two critics of the Obama...
Read MoreRSA: Internet Security Alliance President Larry Clinton
By Anthony Freed (InfoSec Island) Larry Clinton is President and...
Read MoreARCHIVED 6/27/11
To view the original article please click here. ADMINISTRATION’S CYBERSECURITY PROPOSAL...
Read MoreTrade, Civil Liberties Groups Urge Cybersecurity Incentives
Grant Gross (IDG News ), PC World, 03/09/2011 To view...
Read MoreIndustry Groups Push For Security Incentives, Not Laws
Angela Moscaritolo, DC Magazine, 03/09/2011 Instead of imposing additional security...
Read MoreISA Endorses Industry-Civil Liberties Cybersecurity Document
The Internet Security Alliance is pleased be a part of an...
Read MoreARCHIVED 3/8/11
REPORT: CYBERSECURITY BILLS SHOULD OFFER INCENTIVES, NOT STRICT STANDARDS William...
Read MoreADVANCED PERSISTENT THREAT: Industrial Strength Hacking
Expert Voices Thought Leader: Sounil Yu By Sounil Yu (Booz...
Read MoreARCHIVED 12/17/10
To view the original article please click here. CYBERSECURITY PROVISIONS STRIPPED...
Read MoreTranscript: Is The Web Becoming Less Secure? – PBS News Hour
In the wake of the Gawker Media hacking over the...
Read MoreARTICLE 12/9/10
To view the original article please click here. PRO-WIKILEAKS CYBERATTACKS SHOW...
Read MoreARCHIVED 12/9/10
To view the original article please click here. PRO-WIKILEAKS CYBERATTACKS SHOW...
Read MoreARCHIVED 11/29/10
To view the original article please click here. CYBERSECURITY EXPERTS SAY...
Read MoreInterview With Internet Security Alliance President And CEO Larry Clinton
Focus By Anthony Freed, Managing Editor, Infosec Island Network Introduction I recently had...
Read MoreARCHIVED 8/10/10
PRIVATE SECTOR FACES OBSTACLES TO IMPROVE CYBERSECURITY EFFORTS Kamala Lane,...
Read MoreARCHIVED 7/28/10
To view the original article please click here. CYBERSECURITY CONFERENCE CONSIDERS...
Read MoreARCHIVED 7/15/10
To view the original article please click here. WHITE HOUSE, EXECUTIVES...
Read MoreARCHIVED 7/15/10
To view the original article please click here. CYBERSECURITY CONSENSUS: “WE...
Read MoreWhite House Cybersecurity Chief Calls Meeting To Discuss President’s Agenda
Jaikumar Vijayan, ComputerWorld, 07/13/2010 White House cybersecurity coordinator Howard Schmidt...
Read MoreISA Asked To Assess Cybersecurity Future For Allied Military Conference
ISA President Larry Clinton has been asked to detail the...
Read MoreARCHIVED 6/24/10
CYBERSECURITY DRAFT WOULD NARROW CONTENTIOUS PROVISION ON INTERNET CONTROL Tim...
Read MoreISA To Take Part In A Congressional Cybersecurity Caucus Event
Who: ISA President Larry Clinton and ISA Board Member, Jeff Brown,...
Read MoreARCHIVED 5/24/10
To view the original article please click here. CYBER THREATS: SOMETIMES...
Read MoreARCHIVED 5/19/10
To view the original article please click here. COMMERCE DEPARTMENT OPENS...
Read MoreCYBER ATTACKS: Movie Fiction Or Real Life Fact
Who: The technical experts are Ken Silva, Chief Technology Officer for...
Read MoreISA To Lead National Security Sector At Worldwide Cybersecurity Summit
Internet Security Alliance President Larry Clinton has been asked to...
Read MoreARCHIVED 4/6/10
To view the original article please click here. CYBERSECURITY BEST PITCHED...
Read MoreARCHIVED 4/6/10
CYBERSECURITY EFFORTS ENJOY INDUSTRY BLESSINGS Tim Starks, CQ Today Online...
Read MoreGOOGLE ATTACKS HIGHLIGHT GROWING PROBLEM OF CYBERSECURITY THREATS
To view the original article please click here. GOOGLE ATTACKS HIGHLIGHT...
Read MoreARCHIVED 3/17/10
To view the original article please click here. EMERGENCY INTERNET CONTROL...
Read MoreARCHIVED 2/17/10
To view the original article please click here. CYBERSECURITY BATTLE NEEDS...
Read MoreARCHIVED 2/9/10
To view the original article please click here. A PRIVATE-PUBLIC PARTNERSHIP...
Read MoreARCHIVED 2/9/10
To view the original article please click here. MELISSA HATHAWAY AWARDED...
Read MoreARCHIVED 2/9/10
To view the original article please click here. BRINGING CYBERSECURITY TO...
Read MoreCybersecurity Event Featuring Melissa Hathaway
What: The ISA will present Melissa Hathaway with an award for...
Read MoreARCHIVED 2/1/10
To view the original article please click here. MALICIOUS FIRMWARE COULD...
Read MoreARCHIVED 1/15/10
To view the original article please click here. CYBERSECURITY BATTLE NEEDS...
Read MoreARCHIVED 12/10/09
To view the original article please click here. INTERNET SECURITY ALLIANCE...
Read MoreARCHIVED 12/7/09
CYBERSECURITY BATTLE NEEDS ‘SENSE OF URGENCY,’ EXPERT SAYS William Matthews,...
Read MoreARCHIVED 12/7/09
To view the original article please click here. CYBERSECURITY OVERHAUL RECOMMENDED...
Read MoreISA Report Lays Out Framework For Cyber Security
The Internet Security Alliance (ISA) released a new report today...
Read MoreARCHIVED 12/3/09
To view the original article please click here. GROUP OFFERS ALTERNATIVE...
Read MoreARCHIVED 12/3/09
To view the original article please click here. ISALLIANCE DELIVERS CYBER...
Read MoreARCHIVED 11/19/09
To view the original article please click here. U.S. CYBERSECURITY CAN...
Read MoreARCHIVED 11/17/09
To view the original article please click here. OBAMA ADMINISTRATION UNSURE...
Read MoreCYBERSECURITY: Preventing Terrorist Attacks And Protecting Privacy in Cyberspace
Senate Judiciary Committee Subcommittee on Terrorism and Homeland Security To...
Read MoreISA Discusses Joint ANSI/ISA Project To Develop An Enterprise Wide Cybersecurity Framework
Internet Security Alliance (ISA) President Larry Clinton will describe the...
Read MoreDR and ISA Met With Members Of The European Commission
Direct Computer Resources, Inc. (DCR) and the Internet Security Alliance...
Read MoreState Department Sends Larry Clinton To Estonia
At the request of the US State Department ISA President...
Read MoreEducation’s Critical Role In Cybersecurity
By Larry Clinton (Educause) Larry Clinton is President/CEO of the...
Read MoreISA Testifies Before Congress About Market Incentives For Cyber Security
The President of the Internet Security Alliance told the House...
Read MoreC-SPAN: House Energy and Commerce Subcommittee on Communications and Technology
C-SPAN, House Energy and Commerce Subcommitte on Communications and Technology Witnesses...
Read MoreCYBERSECURITY: Network Threats And Policy Challenges
To view the original video please click here. Subcommittee on Communications,...
Read MoreISA Releases Social Contract For Cyber Security
The Board of Directors of the Internet Security Alliance (ISA)...
Read MoreISA Joins DHS And NIST In Promoting VOIP Security
The Internet Security Alliance, in conjunction with the Department of...
Read MoreISA President Testifies Before House Subcomittee
In testimony before the House Subcommittee on Cyber Security Wednesday...
Read MoreEnhancing And Implementing The Cybersecurity Elements Of The Sector Specific Plans
Mr. Larry Clinton, President, Internet Security Alliance, 2500 Wilson Blvd. Arlington, VA 22201-3834,...
Read MoreISA Board Member Hickey Testifies Before Congress
“Ideologically motivated cyber attacks are increasing in volume, sophistication and...
Read MoreThe Communication Sector Coordinating Council And Cyber Security
J. Michael Hickey, Vice President – Government Affairs, National Security Policy, Verizon, 10/31/2007...
Read MoreISA Testifies Before The House Information Policy Committee
In testimony today before the House Information Policy Committee of...
Read MoreISA Board Chairman Testifies Before House Committee On Government Reform
Ken Silva, VeriSign’s Chief Security Officer, and Chairman of the...
Read MoreCYBER GROUPS: A Review Of Public And Private Efforts To Secure Our Nation’s Internet Infrastructure
CYBER GROUPS: A REVIEW OF PUBLIC AND PRIVATE EFFORTS TO...
Read MoreCYBERSECURITY: Protecting America’s Critical Infrastructure, Economy, And Consumers
To view the original article please click here. Larry Clinton, Chief...
Read MoreSECURING CYBERSPACE: What Exactly Should We Be Doing?
By Larry Clinton (Cutter IT) To view the article please click...
Read MoreSECURING CYBERSPACE: Is It Time To Rethink Our Strategy?
By Larry Clinton (Cutter IT) To view the article please click...
Read MoreH.R. 285: Department of Homeland Security Cybersecurity Enhancement Act of 2005
To view the original article please click here. Subcommittee On Economic Security,...
Read MoreProtecting Our Nation’s Cyber Space: Educational Awareness For The Cyber Citizen
To view the original article please click here. Subcommittee On Technology,...
Read MoreThe DHS Infrastructure Protection Division; Public-Private Partnerships To Secure Critical Infrastructures
To view the original article please click here. Subcommittee On Infrastructure ...
Read MoreCOMPUTER VIRUSES: The Disease, The detection, And The Prescription For Protection
Subcommittee on Telecommunications and the Internet, 11/6/2003 Mr. John W....
Read MoreCOMPUTER VIRUSES: The Disease, The Detection, And The Prescription For Protection
Testimony of Richard D. Pethia Director, CERT® Coordination Center Software...
Read MoreCyber Security Policy Briefing
Internet security executives spoke about programs designed to provide better...
Read MoreC-Span Cyber Security Policy Briefing
Internet security executives spoke about programs designed to provide better...
Read MoreC-Span 2 Cyber Security Policy Briefing
C-SPAN 2 Internet security executives spoke about programs designed to...
Read MoreCYBER SECURITY: Private-Sector Efforts Addressing Cyber Threats
Subcommittee on Commerce, Trade, and Consumer Protection 11/15/2001 Mr. Dave...
Read MoreHOLES IN THE NET: Security Risks And The e-Consumer
MONDAY, JULY 16, 2001 U.S. SENATE, SUBCOMMITTEE ON SCIENCE, TECHNOLOGY,...
Read MoreFighting Cybercrime: Efforts by Private Business Interests
Testimony of Dave McCurdy, President, Electronic Industries Alliance To view the original...
Read More