ISA Defense Industrial Base Sector Specific Recommendations and the Presidential Commission on Enhancing National Cybersecurity

ISA Defense Industrial Base Sector Recommendations Source: Chapter 3 of The Cybersecurity Social Contract: Implementing a Market-Based Model for Cybersecurity Presidential Commission on Enhancing National Cybersecurity Institute a Tiered Maturity Model for Grading Cybersecurity Competency “The fundamental problem with the cybersecurity regulatory compliance model in the defense sector is that it is a compliance model. […]

ISA Auditing Recommendations and the Presidential Commission on Enhancing National Cybersecurity

ISA Auditing Recommendations Source: Chapter 13 of The Cybersecurity Social Contract: Implementing a Market-Based Model for Cybersecurity Presidential Commission on Enhancing National Cybersecurity The Regulatory Systems that Come into Play in Breach Situations Should Allow for an Appropriate Assessment of Cyber Defenses Deployed by Management, Including The Timeliness of Remediation and the Resiliency of the […]

ISA Agriculture Sector Recommendations and the Presidential Commission on Enhancing National Cybersecurity

ISA Agriculture Sector Recommendations Source: Chapter 11 of The Cybersecurity Social Contract: Implementing a Market-Based Model for Cybersecurity Presidential Commission on Enhancing National Cybersecurity Increase Awareness “Neither branch of government gives food and agriculture cybersecurity the attention it demands. We’re certainly not calling for Congress or the executive branch to enact new regulations. But executive […]

ISA and Recommendations from the Presidential Commission for Enhancing National Cybersecurity

ISA Policy Positions Source: “A Twelve-Step Program for Implementing the Cybersecurity Social Contract” and “Ten Cybersecurity Items for the President’s First One Hundred Days” (Chapter 2 and Appendix A, respectively, of The Cybersecurity Social Contract: Implementing a Market-Based Model for Cybersecurity. Recommendations from the Presidential Commission for Enhancing National Cybersecurity Step One: We Need to […]