-
ONE WAY TO GET CYBERCRIMINALS TO FUND LAW ENFORCEMENT
October 05, 2023
Introduction by Larry Clinton As we explained in previous blogs (LINK), cybercrime is at an all-time high – and there are no signs that it is slowing down. Economic losses from cybercrime are estimated to be as much as $2 trillion annually—and increasing to as much as $10.5 trillion by 2025 – 10 trillion is […]
-
VIRTUAL CYBER ACADEMY WOULD SOLVE WORKFORCE ISSUE AND HELP REDUCE THE DEFICIT
May 11, 2023
An analysis of the proposal to create a national, virtual, cybersecurity academy shows that creating the academy would not only solve the federal government’s cybersecurity workforce problem in less than 4 years but would create savings that allows the program to pay for itself – and even contribute to reducing the federal budget deficit. The […]
-
Joint Letter from ISA and AGB to House and Senate Appropriations Committee
April 09, 2023
Dear Congressional Members of the House and Senate Appropriations Committees: We are writing to urge the House and Senate Appropriations Committees in the fiscal year (FY) 2024 appropriations bill to include $200 million for the Department of Defense Cyber and Digital Service Academy (the Academy) that was authorized in the FY 2023 National Defense Authorization […]
-
INDEPENDENT REVIEW OF FIXING AMERICAN CYBERSECURITY
March 31, 2023
A Review of Fixing American Cybersecurity, Edited by Larry Clinton and Foreword by Kiersten Todt This entry was posted in Book ReviewCybersecurity on March 30, 2023 by Steven Bowcut In an era of growing cyber threats and increasing data breaches, the need for robust cybersecurity measures has never been greater. Against this backdrop, Larry Clinton’s new book, “Fixing American Cybersecurity: Creating […]
-
SEC NEEDS A CYBER MODEL THAT WORKS
March 30, 2023
Writing in the February edition of Foreign Affairs CISA Director Jen Easterly called for “a new model” for cybersecurity. A month later President Biden released a new national strategy for cybersecurity which he said would “realign incentives in favor of long-term investment. When releasing the new strategy acting WH Director for Cybersecurity Kemba Waldon said, […]
-
The SEC: The Elephant in the New National Cyber Strategy
March 27, 2023
The Biden Administration’s new National Cybersecurity Strategy is an important first step toward improving our nation’s cybersecurity. This strategy, unlike the numerous others that have been unveiled over the past 20 years, adopts ISA’s core argument that we cannot create a sustainably secure cyber system until we rebalance the incentives for cyber-attacks. ISA is not […]
-
FIRST DO NO HARM: THE MANTRA FOR NEW CYBER REGULATION
March 15, 2023
The traditional regulatory model – when applied to cybersecurity – is actually anti-security. For all the discussion around the Biden Administration’s new cyber strategy generating new regulations, this one simple fact remains. There is no evidence the cyber regs are working. The real question is not so much how much new regulations there ought to […]
-
Industry Leader: OMB Should Take Lead in Deconflicting Regs Under National Cyber Strategy
March 13, 2023
By Charlie Mitchell / March 13, 2023 Federal agencies should be required to clarify that proposed cybersecurity rules are not “duplicative or in conflict with existing regulations,” according to a key industry player on cyber, an idea embraced by former White House cyber coordinator Michael Daniel as a way to deliver on regulatory streamlining under President […]
-
WHY CYBER REGULATIONS IN NATIONAL STRATEGY MAY NOT WORK
March 06, 2023
The new National Cybersecurity Strategy released last week calls for intensified federal regulation on IT providers, while presumably shifting regulatory focus away from technology users (we will see what the regulatory agencies and the SEC has to say about that last part). The strategy asserts “regulation can level the playing field enabling healthy competition without […]
-
THREE QUICK STEPS TO IMPLEMENT THE NATIONAL CYBER STRATEGY (NOT WHAT YOU THINK)
March 03, 2023
There are probably various government agencies where regulators have already sharpened their virtual pencils preparing to write up some new regulations go along with the new National cybersecurity strategy released yesterday. Please put down your pens. That is not where implementation of the new strategy needs to begin. While much of the conversation about the […]
-
IS REGULATION THE ANSWER TO OUR CYBERSECURITY PROBLEM (PART I)
March 01, 2023
There is a is a common misconception that cybersecurity regulation has not been tried, and that, if only there was federal regulation of cyberspace, we would have a more secure environment. The facts don’t bear out this assertion. In our next two posts, we will first lay out the empirical evidence that cyber regulation does […]
-
IS THE CYBERSECURITY PROBLEM ONE ABOUT TECH OR ECONOMICS?
February 27, 2023
Spoiler alert: It’s both. However, virtually all of our efforts to address our cybersecurity problems have focused on the tech side and virtually none on the underlying economics of cybersecurity. This has led to an unbalanced and ineffective government response in “providing for the common defense” in the cyber infrastructure. In their classic work, The […]
-
US CYBERSECURITY – OLD PRACTICES, NEW VISIONS
February 24, 2023
US cybersecurity policies have been inadequate for decades and need to be updated to counter the heightened digital and physical risks the nation faces from our adversaries today. The US cybersecurity effort over the past thirty years largely comes down to a series of modest, disjointed, incremental tactics. On the other hand, one significant rival, […]
-
From Pulitzer Prize winning author Byron Acohido on Last Watchdog.
February 23, 2023
The review (pasted below) is also available at AUTHOR Q&A: China’s spy balloons reflect a cyber warfare strategy America must counter https://www.lastwatchdog.com/ By Byron V. Acohido The attack surface of company networks is as expansive and porous as ever. Related: Preparing for ‘quantum’ hacks That being so, a new book, Fixing American Cybersecurity, could be a long […]
-
THE (ONLY) PATH FOR THE US TO WIN THE DIGITAL WAR WITH CHINA
February 22, 2023
In a series of posts over the past couple weeks (LINKS), we have documented how China has been successfully carrying out a concerted and multi-faceted digital program designed to re-make the post-WWII world order and redirect it toward China. The Chinese campaign is well conceived, integrated, generously supported, and largely covert, which is consistent with […]
-
CAN THE US MATCH CHINA’S MILITARY-CIVIL FUSION MODEL? WILL IT?
February 20, 2023
In recent posts, we have described how over the last 30 years China has smartly leveraged the vulnerabilities of the digital age to steal Western technology and, in so doing, leap-frog generations of R&D to become a world economic power. Not satisfied with their renaissance as an economic power, China leveraged massive government financial support […]
-
Huawei is Just the Tip of the Spear in Digital Aggression
February 13, 2023
In our last post we documented how Huawei technology, thanks to massive cross-subsidization from the Chinese government, was succeeding in deploying its telecommunications network around the world. That is a story that is fairly well known in Washington policy circles. However, Huawei is by no means the only technology threat China poses though its comprehensive […]
-
HUAWEI MAKES OFFERS YOU CAN’T REFUSE ADVANCING CHINA’S GOALS
February 10, 2023
China’s Digital Silk Road Strategy integrates technology, economics, and politics with the long-term goal of altering the post-World War II US- European world order. An assessment of China’s three wars strategy by the U.S. Department of Defense found that the CCP’s goals were to reclaim global status over the United States by weakening our alliances […]
-
CISA SAYS WE NEED A NEW CYBERSECURITY MODEL; THEY GOT THAT RIGHT!
February 08, 2023
Last week, Foreign Affairs magazine published an article written by CISA Director Jen Easterly and Asst. Director Eric Goldstein entitled “Why Companies Must Build Security into Products.” The central thesis of their article is we need a “new model” for cyber security because what we have been doing isn’t working. This is precisely the messaging […]
-
CISA’s Todt, in foreword to new book, cites need for industry incentives and strengthened partnerships
January 31, 2023
By Charlie Mitchell / January 31, 2023 CISA chief of staff Kiersten Todt provides the foreword to a new book on cybersecurity strategy by Internet Security Alliance leader Larry Clinton, saying a focus on economic incentives for industry cyber improvements is an essential part of a “a strong, actionable approach to industry/government collaboration.” “We need bold action […]
-
THE INTERNET SECURITY ALLIANCE (ISA)
January 03, 2023
ISA’s Mission is to integrate advanced technology with economics and public policy to promote sustainably secure cyber system. The ISA board, consistits of cyber leaders (typically CISO) from virtually every critical industry sector. Over 20 years ISA has created a comprehensive theory and practice for cybersecurity covering both enterprise risk managment and government policy. ISA’s […]
-
As cyber attacks increase, here’s how CEOs can improve cyber resilience
November 17, 2022
Major Findings · The Cyber Risk Principles developed by the ISA, NACD and the World Economic Forum help drive cyber resilience across industries. · Simulation-aided research from MIT CAMS shows that commitment to and adoption of the Cyber Risk Principles significantly improves cyber resilience. · Results also show that, commitment to these cyber risk principles […]
-
ISA PROPOSAL FOR A VIRTUAL CYBERSECURITY NATIONAL SERVICE ACADEMY
July 18, 2022
PREMISE ONE: CYBERSECURITY IS A NATIONAL DEFENSE IMPERATIVE Just as World War II made it apparent that the skies were a unique domain of warfare resulting in the creation of the US Air Force Academy in the 1950s, so, too, have recent events made it clear beyond doubt that cyberspace is now a unique domain […]
-
THE CASE FOR A NATIONAL CYBERSECURITY ACADEMY, PART 2
May 31, 2022
EXECUTIVE SUMMARY In our last post we made the case for a national, virtual, cybersecurity academy. In this post we will discuss the key points of our proposal and in our next post we will discuss the advantages of our proposal which we suggest as the only practical way for the USA to quickly, comprehensively, sustainably, […]
-
THE CASE FOR A NATIONAL CYBERSECURITY ACADEMY, PART 1: A NATIONAL DEFENSE IMPERATIVE
We need to stop talking about the issue of cybersecurity workforce development. We need to properly frame the issue an imperative for national defense digital mobilization. Just as World War II made it apparent that the skies were a unique domain of warfare resulting in the creation of the US Air Force Academy in […]
-
IT IS TIME FOR A NATIONAL CYBER SERVICES ACADEMY
Our service academies – West Point, Annapolis the Airforce and Merchant Marine Academies are the ultimate public private partnership. Government offers private citizens high quality education at no cost, and in return the graduates are obliged to provide three years of service to the government, and many stay on well-past that obligation. The system has […]
-
GUEST BLOG: China’s Digital Strategy Threatens U.S. National Security & Diplomatic Partnerships
August 31, 2021
By Sarina Krantzler, ISA Research Associate This post is the first of two blogs concerning China’s Digital Strategy. “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If […]
-
ISA’s Clinton weighs in on need for cyber funding in legislation expanding broadband service
April 09, 2021
Internet Security Alliance president Larry Clinton is adding his voice to those calling for including a robust cybersecurity program in upcoming infrastructure legislation expected to address expanded broadband access as well as services in other critical industries. “President Biden’s massive infrastructure proposal — dubbed infrastructure for the digital age — includes a wide variety of […]
-
5,000 Practitioners Sign Up for ISA “Rethink Cyber” Campaign
Four months ago, the 22 sponsors of the Internet Security Alliance (ISA) launched an online campaign suggesting the need for the United States to rethink our approach to securing our cyber infrastructure. The theme seems to have growing resonance with both policymakers and the general cybersecurity community.
-
Lawmakers moving on cyber incident-reporting bills; industry hopes to nudge discussion away from regulatory mandates
March 23, 2021
Members of Congress are moving toward a legislative push for mandatory cyber-incident reporting by critical infrastructure operators, while industry groups are beginning to shape their arguments against establishing such a regulatory requirement in response to the SolarWinds and Microsoft Exchange hacks. A source close to the House Homeland Security Committee told Inside Cybersecurity: “We’re in the […]
-
Internet Security Alliance, partners release consensus principles for boardroom cyber risk management
A trio of groups including the Internet Security Alliance has released a report offering “a cohesive, global, cross-border approach to cyber-risk governance” for corporate boards, with six principles that pull together consensus views developed by security and industry leaders in recent years. “Principles for Board Governance of Cyber Risk” was released today by ISA, the […]
-
Federal officials stress unprecedented levels of coordination as lawmakers continue probe of SolarWinds
March 18, 2021
Senators on the Homeland Security Committee took their turn probing the federal response to the SolarWinds hack at a hearing that featured CISA, OMB and FBI officials citing extensive interagency cooperation, while lawmakers pressed on the need for more high-level direction and for upgrading the government’s overall approach to cyber defense. “After the SolarWinds hack […]
-
Internet Security Alliance: CMMC fails to account for the economics of small-business cybersecurity
February 16, 2021
The Pentagon’s Cybersecurity Maturity Model Certification program will fall short in securing the Defense Industrial Base because it fails to address underlying economic realities that limit how much small and mid-sized businesses can invest in cyber, according to the industry-based Internet Security Alliance. “However, it is sadly predictable that the CMMC, however much an improvement, […]
-
As holiday shopping season kicks in, cybersecurity group spotlights policy needs for securing retail sector
Cyber vulnerabilities in the retail sector, always a hot topic during the holidays, require an examination of underlying economics and incentives that could drive improvements in retailers’ cybersecurity, according to an Internet Security Alliance assessment that tracks with the group’s prescription for shoring up cyber across critical infrastructure. “The retail sector is one of the […]
-
ISA’s Clinton cites need to go beyond NDAA in SolarWinds response; congressional researchers see ‘no easy fix’
Larry Clinton of the Internet Security Alliance says the massive SolarWinds hack highlights the need for a rethinking of cybersecurity policy that goes well beyond Cyberspace Solarium Commission recommendations folded into the national defense bill, while the Congressional Research Service has issued a paper saying “existing programs” were unlikely to have foiled the sophisticated infiltration […]
-
ISA’s Clinton presses case against ‘traditional regulatory models’ for securing cyberspace
Industries covered by extensive cybersecurity requirements are not achieving better security results than less-regulated sectors, underscoring the need for rethinking the way policymakers approach securing critical infrastructure, according to Internet Security Alliance president and CEO Larry Clinton. The question of increased cyber regulation is likely to come into focus as the Biden administration appoints new […]
-
U.S. officials characterize SolarWinds hack as ‘intelligence gathering’ operation, ‘likely Russian in origin
The U.S. homeland security and intelligence community in a statement today said the massive SolarWinds hack of federal and private-sector networks appears to be part of an intelligence gathering operation by a Russian “advanced persistent threat actor.” The U.S. government’s Cyber Unified Coordination Group, known as the UCG, “believes that, of the approximately 18,000 affected […]
-
Cyber agency demonstrates value to stakeholders amid SolarWinds, but insiders say the secret sauce must be preserved
The Cybersecurity and Infrastructure Agency has leaned into its role as industry’s risk advisor and partner in response to the SolarWinds hack, and industry sources say they are anxious to see this collaborative model preserved and extended under a Biden administration that might be inclined to more regulatory approaches to cybersecurity. Megan Brown, a partner […]
-
ISA’s Clinton presses case against ‘traditional regulatory models’ for securing cyberspace
Industries covered by extensive cybersecurity requirements are not achieving better security results than less-regulated sectors, underscoring the need for rethinking the way policymakers approach securing critical infrastructure, according to Internet Security Alliance president and CEO Larry Clinton. The question of increased cyber regulation is likely to come into focus as the Biden administration appoints new […]
-
CISA’s Kolasky unveils ‘Systemic Cyber Risk Reduction Venture’ for critical infrastructure
CISA’s National Risk Management Center is launching a multifaceted “risk reduction venture” to help organize efforts around analyzing, measuring and providing tools to address cybersecurity risks faced by critical infrastructure. “Using enterprise risk management best practices will be a focus for CISA in 2021, and today the National Risk Management Center (NRMC) is launching a […]
-
Government’s own cyber shortcomings undermine calls for regulatory approach, says ISA’s Clinton
The federal government lacks the expertise to mandate effective cybersecurity requirements for industry, according to Internet Security Alliance leader Larry Clinton, who says failures to secure the government’s own systems reveal the need for a major readjustment in thinking about cyber policy. “[W]e can add government to the list of sectors that are highly regulated […]
-
Internet Security Alliance’s Clinton makes case for providing cybersecurity funding in COVID relief package
Internet Security Alliance president Larry Clinton hopes to ensure cybersecurity funding is included in the COVID-19 relief measure about to begin moving in Congress, saying economic recovery from the pandemic is impossible “unless the core systems of the economy — which in the 21st century are cyber — also recover.” “Just as to recover physically […]
-
Tech leads broad industry coalition urging inclusion of IT upgrade funds in COVID relief package
Major trade groups representing the technology and other sectors are urging lawmakers to preserve $9 billion in proposed funding for IT modernization in the COVID-19 package now beginning to work its way through Congress. “We write in support of President Biden’s call for robust funding to modernize and secure federal information technology (IT) and networks […]
-
ISA’s Clinton: ‘Huge mistake’ to expand use of ‘backward-looking,’ ineffective cyber reg model
Cyber regulation has generally created a “backward-looking” compliance approach to cybersecurity that is antithetical to actually improving security, according to the Internet Security Alliance’s Larry Clinton, who says effective risk-management alternatives are available. “To begin with, traditional compliance is essentially a backward-looking pass-fail issue,” Clinton wrote in a Thursday blog post. “Cybersecurity, on the other hand, […]
-
Defining success and mapping the road ahead for public-private partnership and critical infrastructure cybersecurity
February 04, 2021
Sean Atkins is a PhD candidate in security studies and international relations. His research focuses on national defense in cyberspace and cyber statecraft. He is also an active-duty US Air Force officer whose service ranges from national cyber policy development to multiple counterinsurgency operations deployments. FALL 20/WINTER 21 : précis Student Feature : Sean Atkins The recent […]
-
Government’s own cyber shortcomings undermine calls for regulatory approach, says ISA’s Clinton
January 26, 2021
The federal government lacks the expertise to mandate effective cybersecurity requirements for industry, according to Internet Security Alliance leader Larry Clinton, who says failures to secure the government’s own systems reveal the need for a major readjustment in thinking about cyber policy. “[W]e can add government to the list of sectors that are highly regulated […]
-
What is the World Economic Forum doing on cybersecurity – 6 principles to unite business in the fight against cybercrime
• The COVID-19 pandemic has opened more opportunities for cyberattacks. • Not enough board members understand the threat to their business. • The World Economic Forum, PwC, NACD and ISA are partnering to define key principles of good cybersecurity governance . In 2020, malevolent actors took advantage of the pandemic. The rush to digital-first arrangements […]
-
Lawmakers plan probes into SolarWinds, underscore Solarium benefits; security pros cite need for fundamental shifts
January 04, 2021
House and Senate cybersecurity leaders already are planning to examine the cause and effects of the SolarWinds hack, and touting new cyber tools supplied by the fiscal 2021 National Defense Authorization Act, while some cybersecurity professionals caution that these are preliminary steps on a long road toward effective risk management. New Senate Homeland Security Chairman […]
-
Industry cyber leader urges Biden: ‘Show us the money’ on commitment to cybersecurity
December 30, 2020
President-elect Biden should demonstrate his commitment to improving cybersecurity in the aftermath of SolarWinds by moving to close a “cyber investment gap” in which both U.S. industry and foreign adversaries are vastly outspending the United States government in key areas, according to Larry Clinton, head of the Internet Security Alliance. “With due respect, we might […]
-
Internet Security Alliance launches ‘national dialogue’ on a critical new phase in cyber efforts
November 20, 2020
The Internet Security Alliance wants to spark a dialogue in the cybersecurity community “around the idea that we need to re-examine the problem and do a lot more” to meet challenges in cyberspace that are gradually eroding the United States’ position as the world’s foremost economic, technological and military power. “We need to engage the […]
-
Internet Security Alliance launches ‘national dialogue’ on a critical new phase in cyber efforts
November 10, 2020
The Internet Security Alliance wants to spark a dialogue in the cybersecurity community “around the idea that we need to re-examine the problem and do a lot more” to meet challenges in cyberspace that are gradually eroding the United States’ position as the world’s foremost economic, technological and military power. “We need to engage the […]
| Internet Security Alliance launches ‘national dialogue’ on a critical new phase in cyber efforts
-
Cybersecurity and a potential Biden White House: Past tech priorities resurrected
October 21, 2020
Even among those who have worked with him, Joe Biden is not known as a tech policy wonk. So, it’s not surprising that today, during a pandemic, cybersecurity doesn’t come near to the top of the list of topics Biden’s campaign is prioritizing for the sake of the election. Russia’s election meddling may get a […]
-
Thinking Fast and Smart About Digital Transformation and Cybersecurity (by Larry Clinton)
September 30, 2020
American business was largely unprepared to fend off cyber criminals before the virus hit; we are now immeasurably worse off. Metaphorically, we have gone from leaving the door ajar to cyber criminals before the pandemic to throwing the door wide open and laying out a welcome mat. One study found 91 percent of enterprises reported […]
-
The Word of the Day isn’t Virus, its Agility
July 06, 2020
In 1929 the vibrant US economy went through the greatest shock it had ever received when the stock market crashed. A frightened and bewildered Congress, flaying for answers, summoned the economic chieftains of the day to testify as to if they had manipulated the crisis. The venerable JP Morgan was called to task before the […]
-
Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level
June 11, 2020
Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level
-
ISA’s Larry Clinton criticizes Pentagon proposal for ‘intrusive’ access to contractor networks
May 27, 2020
You know what’s worse than trying to share cybersecurity information? Writing about it. Everyone has read over and over again about how important information sharing is for cybersecurity. The idea is certainly not new. It’s definitely not cool. It’s also hard. No one has completely nailed it even after talking about it for decades. Why […]
| ISA’s Larry Clinton criticizes Pentagon proposal for ‘intrusive’ access to contractor networks
-
ISA’s Larry Clinton: Current crisis offers chance to examine, address systemic risks to cybersecurity
April 28, 2020
The COVID-19 crisis reveals the inadequacy of the prevailing “operational” approach to cybersecurity and provides an opportunity for government and businesses alike to take cost-effective steps toward a cyber strategy rooted in risk management, says Larry Clinton, president of the Internet Security Alliance. That should include developing systems to track and prosecute cyber crime, establishing […]
-
Key industry group urges federal officials to quickly share risk-management best practices with businesses
April 27, 2020
The massive shift to work-at-home amid the COVID-19 crisis is leading to insecure work-arounds that emphasize functionality over security, while managers in many businesses lack training suitable to the current risk environment, according to the Internet Security Alliance in comments filed with the Department of Homeland Security. “Due to the near-immediate switch to unplanned online […]
-
Pentagon and FCC, at different points on cyber regulation, underscore hybrid nature of U.S. government approach
April 23, 2020
The Defense Department is leading efforts to set mandatory cybersecurity baselines for industry, while the Federal Communications Commission has been on a deregulatory path, but both are playing influential roles in shaping the U.S. government’s relationship with the private sector and overall approach to cybersecurity that have been on display in recent days. In one […]
-
Top Ten Reasons Why Cybersecurity Is Like Coronavirus
March 16, 2020
By Larry Clinton I’m not saying cybersecurity and the coronavirus are exactly the same. The defining characteristic of the cyber threat is that we have conscious and deliberate actor’s carefully crafting attacks. The coronavirus has no conscience, no plan. At the same time, notwithstanding differences, these domains are both attacks on our cultures, and when […]
-
These Are The Big Takeaways From This Year’s RSA Conference 2020
March 05, 2020
Henry Ford once said, “Coming together is a beginning, staying together is progress and working together is success.” While each one of us is different—visionary or pragmatist, builder or fixer, disruptor or peacemaker, mentor or non-conformist, comic relief or observer—bringing all our individual traits together results in a stronger, more diverse whole. This was the […]
| These Are The Big Takeaways From This Year’s RSA Conference 2020
-
Internet Security Alliance updates ‘handbook’ for corporate boards on managing cyber risks
February 27, 2020
The Internet Security Alliance has updated its “handbook” for corporate boards on managing cyber risks to reflect current threats and the latest “best practices.” “The effects of cyberattacks are expanding well beyond information loss or business disruption. They can have a severe impact on an organization’s reputation and brand through loss of consumer confidence,” said […]
| Internet Security Alliance updates 'handbook' for corporate boards on managing cyber risks
-
February 26, 2020
In an era when data breaches can lead to corporate losses and ruin brand reputations, cybersecurity is no longer just an IT issue, it’s a board-level issue The question of what corporate boards should be doing and how governments can help them was the topic of a session at the RSA Conference in San Francisco, […]
| #RSAC: How Corporate Boards Should Look at Cybersecurity Risk
-
CISA leaders, policy vets set for cyber conference with regs, deterrence and more on agenda
February 24, 2020
The annual RSA security conference launches today in San Francisco under the shadow of a global health crisis, but with a roster chock-full of key cybersecurity players and high-profile panels addressing emerging cyber rules on 5G, supply-chain, privacy and more, and front-burner issues such as deterrence, investment and litigation. The theme of this year’s RSA […]
| CISA leaders, policy vets set for cyber conference with regs, deterrence and more on agenda
-
Cyber security to attract more venture capital investment, say analysts
February 06, 2020
The cyber-security market will continue to attract venture capital even in uncertain economic times as the industry is largely “immune to downturn” and offers good returns on investment, say investors and industry experts. “VCs invest where they believe they could generate a return. The larger the return, the more likely they will be to invest […]
| Cyber security to attract more venture capital investment, say analysts
-
Cyware Labs awarded as ‘Excellent Threat Intelligence Solutions’ at National Cyber Security Summit
November 26, 2019
Bengaluru: Cyware Labs, a leading product-based cybersecurity company has recently been awarded as ‘Excellent Threat Intelligence Solutions’ at the recently held National Cyber Security Summit & Awards 2019 by Communication, Multimedia And Infrastructure (CMAI) Association of India. The awards were held to recognize organizations with the greatest achievements and contributions in the field of cybersecurity in […]
-
ISA Announces Second Asian Handbook for Boards and Cyber
November 22, 2019
FOR IMMEDIATE RELEASE Contact: Larry Clinton President and CEO, Internet Security Alliance (202) 236-0001 lclinton@isalliance.org Delhi, India – In back-to-back presentations to the Indian National Cybersecurity Summit and the international Conference on Cyberlaw, Cybercrime and Cybersecurity today, Internet Security Alliance (ISA) President Larry Clinton announced the launch of a collaboration between several Indian-based trade groups and […]
-
Agency gets praise for risk management; efforts advance along broad front
November 19, 2019
The Cybersecurity and Infrastructure Security Agency’s “risk management” philosophy needs faster and deeper uptake throughout government, a key industry leader says, while developments over the past week underscored the breadth of CISA activities across issues and industries. And the House today is expected to approve a continuing resolution funding the Department of Homeland Security and […]
| Inside Cybersecurity: Agency gets praise for risk management; efforts advance along broad front
-
ISA’s Clinton: Government shift to risk management is positive, but must accelerate
November 15, 2019
The federal government is gradually shifting to a “risk management” approach to cyber — epitomized by the creation of CISA and its National Risk Management Center last year — but that effort lags behind the private-sector’s embrace of “sophisticated” tools and must accelerate rapidly, says Larry Clinton, head of the industry-based Internet Security Alliance. “We […]
-
ISA’s Clinton calls for procurement-based incentives, critiques Pentagon certification plans
November 11, 2019
A key private-sector leader is criticizing an initiative aimed at securing the Defense Industrial Base as “over-regulation” while advocating incentives, over liability, for filling gaps between private and public assessments of cybersecurity risks. “The regulation is actually not improving our security, in fact it is anti-security because it is driving away some of our better […]
-
Internet Security Alliance developing cyber handbook for European corporate boards
May 29, 2019
The Internet Security Alliance has announced plans to develop a “handbook” on managing cybersecurity risks for European corporate boards of directors, building on similar efforts across the Atlantic. “This week the board of directors of the European Confederation of Directors Associations (ecoDa) agreed to work with the Internet Security Alliance (ISA) on a European adaptation […]
| Internet Security Alliance developing cyber handbook for European corporate boards
-
Internet Security Alliance calls on White House to ‘harmonize’ cyber regulations
May 17, 2019
The industry-based Internet Security Alliance is pressing the White House to issue a presidential order to streamline regulatory requirements for cybersecurity, hoping to build on recent Trump administration initiatives. “The White House has been increasing its focus on cybersecurity including by issuing the recent executive order on America’s cybersecurity workforce, which recognized that the nation […]
| Internet Security Alliance calls on White House to 'harmonize' cyber regulations
-
New cyber security event in Germany discusses pros and cons of emerging technology
September 21, 2018
A new cyber security event is bringing companies such as Microsoft, Siemens and Kaspersky Lab together to discuss the opportunities and drawbacks of new technologies. Command Control kicked off in Munich, Germany, on the 20th of September, with discussions on cyber security as a social phenomenon, and understanding and managing human risk. Messe Munich CEO […]
| New cyber security event in Germany discusses pros and cons of emerging technology
-
One year later: Two security industry specialists offer views on the cyber world post-Equifax
September 05, 2018
Two leading cybersecurity professionals — one whose firm offers cyber products, the other a high-profile industry advocate for cyber strategies grounded in economics — cited extensive security developments in the private sector in the year since the Equifax hack, amid slow, often imperceptible responses from federal policymakers. The Equifax hack, affecting 150 million Americans, was […]
-
Internet Security Alliance renews call for ‘incentives’ following Def Con meeting
August 15, 2018
Department of Homeland Security official at Def Con last week highlighted the increasing interconnectedness of critical industries and the challenge for government in protecting private enterprises from foreign cyber attacks — issues being cited by the Internet Security Alliance in renewing its longstanding call for “incentivizing” cybersecurity investments. “Digitization has changed everything. It literally is […]
-
U.S. Chamber of Commerce, industry groups urge Senate passage of DHS cyber agency bill
July 27, 2018
A coalition of almost two dozen industry groups led by the U.S. Chamber of Commerce is urging the Senate to pass a bill renaming and reorganizing the Department of Homeland Security’s cyber-focused National Protection and Programs Directorate, which has been stalled in the Senate for months. In a letter to Majority Leader Mitch McConnell (R-KY) […]
| U.S. Chamber of Commerce, industry groups urge Senate passage of DHS cyber agency bill
-
Industry leaders say ‘serious’ policy talks led way to DHS cyber summit
July 19, 2018
Department of Homeland Security officials have engaged in extensive policy discussions with the private sector leading up to the July 31 cybersecurity summit in New York City, according to industry leaders, who expect the event to underscore DHS’ commitment to cyber risk-management and collaboration. Internet Security Alliance president Larry Clinton characterized the recent engagement as […]
-
DHS announces cyber summit as platform for advancing risk-management initiatives
July 18, 2018
The Department of Homeland Security today formally announced its July 31 cybersecurity summit in New York City, calling it “a launching point for a number of DHS initiatives to advance cybersecurity and critical infrastructure risk management.” “The Department of Homeland Security will host a National Cybersecurity Summit on July 31, 2018 at the Alexander Hamilton […]
-
Cyber summit could be a much-needed win for Nielsen
June 26, 2018
The Department of Homeland Security’s planned July 31 cybersecurity summit in New York City offers a chance for the agency to underscore its central role on cyber policy. It could also give Secretary Kirstjen Nielsen a badly needed win in her strongest policy area, amid intense criticism of her role in controversial immigration efforts. Nielsen […]
-
Questions linger as DHS eyes strategic boost from ‘cyber summit’
June 18, 2018
The Department of Homeland Security’s planned July 31 cybersecurity summit in New York City offers a chance for DHS to underscore both its central role on federal cyber policy and its bonds with the private sector, but private-sector sources are pressing for more details — quickly — as the event rapidly approaches. Coming just over […]
-
Internet Security Alliance & Wharton School Join Executive Education Program on Cybersecurity
June 05, 2018
FOR IMMEDIATE RELEASE Larry Clinton President and CEO, Internet Security Alliance (202) 236-0001 lclinton@isalliance.org (WASHINGTON, D.C.) – The Internet Security Alliance (ISA) has organized, and this month will teach, a cybersecurity course at the University of Pennsylvania as part of the ABA Stonier Graduate School of Banking and Wharton School’s Executive Education Program. The […]
-
2018-01-18 Conference Board.v2" target="_blank">
January 18, 2018 Cybersecurity Summit – Conference Board (New York City)
January 23, 2018
2018-01-18 Conference Board.v2" target="_blank"> | January 18, 2018 Cybersecurity Summit - Conference Board (New York City)
-
View from the C-Suite
July 06, 2017
ONE RUNS MARATHONS. Another writes young adult sci-fi. Still another embraces efforts to end homelessness, and a fourth splices in college teaching while managing an eight-country digital asset portfolio. All arrived at the C-suite by divergent paths. Yet in frank conversations about the future of the job and trends for the information security field, some […]
-
Eye on Atlanta: Larry Clinton, President, Internet Security Alliance: A Roadmap for Improving Cyber Preparedness
July 05, 2017
As company leaders have become better educated about the evolving nature of cyber threats, preparedness for addressing cyber risks has continued to improve. According to PwC’s The Global State of Information Security Survey 2017, 50% of organizations now share with and receive more actionable information from industry peers. Meanwhile, as corporate boards have become more […]
-
C-Suite: Cybersecurity is #1 Issue, ISA Report
June 05, 2017
SC Media Reports: It’s been a topic of discussion for some time: Cyber threats are serious risks to enterprises and it is the responsibility of the boards to provide oversight. The problem, according to a new blog post written by Stacey Barrack, senior director of the Internet Security Alliance (ISA), is that most of the team […]
-
Brainstorming on Information Security Best Practices Highlights the 2017 Chicago CISO Executive Leadership Summit
Chief Information Security Officers (CISOs) recognize that collaboration is key to cyber security resilience. Sharing best practices in intimate, executive roundtable working groups among peers on topics ranging from must have questions and strategies for the board of directors to securing connected devices and the Internet of Things (IoT) will be featured at the 2017 […]
-
Internet Security Alliance: NIST framework metrics should focus on threats
June 01, 2017
The National Institute of Standards and Technology should focus on developing an “analytical tool” enabling entities to assess cyber threats on a monetized basis, according to the president of the Internet Security Alliance, as NIST continues probing the use of NIST cybersecurity framework metrics. “The next step in the evolution of the NIST CSF shouldn’t […]
-
How the Trump Budget Would Fund Cybersecurity
May 24, 2017
The Donald Trump administration, in its proposed fiscal year 2018 budget, outlines steps it contends would strengthen the U.S. federal government’s information systems, even as it would cut some cybersecurity spending at specific agencies. At the heart of the budget for the fiscal year that begins Oct. 1 is a proposal to spend $1.5 billion […]
-
Modernizing Government Technology Act Passes House
May 18, 2017
The House of Representatives has passed the Modernizing Government Technology Act, which supporters contend should help improve the security of the federal government’s information networks. The legislation passed May 17 on a voice vote and now goes to the Senate, where its prospects are uncertain. Should the bill become law, major agencies would create IT […]
-
Eye on Chicago: Going on the Offensive to Win the Cyber War
May 15, 2017
HMG Strategy Reports: Taking a defensive approach to cybersecurity isn’t working for keeping the bad guys out. The volume and level of sophistication with cyber attacks has continued to rise dramatically. In 2016, one-third of all businesses globally were breached, according to PwC. And while millions of attacks are being launched on a daily basis, […]
-
Assessing the Latest Draft Cybersecurity Executive Order
May 06, 2017
The latest draft version of the Trump administration’s cybersecurity executive order is similar to the previous version and lays out a plan to secure U.S. federal government and critical infrastructure IT that could have come out of the Barack Obama White House, including modernizing federal IT. “That fact that they are focusing on IT modernization […]
-
NIST work on framework update quietly proceeds amid hubbub over Trump cyber agenda
May 01, 2017
The National Institute of Standards and Technology is diligently reviewing the nearly 130 comments from industry and other groups on a draft update to the framework of cybersecurity standards, as it prepares an analysis of that input in advance of a highly anticipated public meeting this month. That meeting will likely set the course and […]
-
Industry raises concerns with NIST approach to supply-chain risks in cyber framework update
April 26, 2017
Industry groups across sectors are raising concerns with various aspects of the National Institute of Standards and Technology’s approach to managing supply-chain risks in a proposed update to the voluntary framework of cybersecurity standards. Specifically, groups say the NIST plan fails to take into account the interconnectedness of vendor services and downplays the potential effect […]
-
Congress returns, but the real cybersecurity action is taking place off the Hill
April 24, 2017
Lawmakers return to Capitol Hill this week with a few cybersecurity items on the agenda for the upcoming legislative work period, while the most significant efforts in the coming months may be taking place at the White House and at the National Institute of Standards and Technology’s campus in suburban Maryland. “On the congressional front, […]
-
Business lobby pushes back on NIST Framework measurement plans
April 13, 2017
Business lobbying groups are pushing back on plans by federal scientists to add third-party measurement of cybersecurity to a voluntary framework designed to help private companies improve its defenses against hackers, cybercriminals and online spies. A draft proposed revision of the National Institute of Standards and Technology’s Cybersecurity Framework, to be known as version 1.1, […]
-
Internet Security Alliance: Framework metrics would help businesses prioritize efforts
April 12, 2017
The Internet Security Alliance is calling for metrics that allow businesses to prioritize their cybersecurity efforts based on the National Institute of Standards and Technology cybersecurity framework, while stressing the need for NIST and other agencies to continue promoting the voluntary, public-private partnership approach to cybersecurity. The comments come in response to a request for […]
-
Metrics abound, but who should be required to measure cyber effectiveness remains a key question
March 13, 2017
The government has suggested many ways to use metrics to measure the effectiveness of cybersecurity investments, but who should be using these measurement tools – and whether doing so should be required – remains open questions that will affect the scope and movement of these plans. Industry remains somewhat divided on the role of metrics, […]
-
Latest Executive Order Draft Promotes Risk-Based Approach
March 08, 2017
The latest version of the draft of a cybersecurity executive order from the Donald Trump White House would direct the federal government to take a risk-based approach to IT security and hold cabinet secretaries and agency heads responsible for the security of their organizations’ IT assets. The draft executive order also would require federal agencies […]
-
House bill requiring cyber audits by NIST could overhaul agency’s role
March 02, 2017
Having the National Institute of Standards and Technology audit other federal agencies’ cybersecurity practices is not a matter of NIST “stepping up” its game, as House Science Chairman Lamar Smith (R-TX) said this week – rather it would be a matter of dramatically redefining NIST’s role and relationship with other federal entities. The Science panel’s […]
-
Bill Seeks Metrics for NIST Cybersecurity Framework
February 28, 2017
Legislation calling on the National Institute of Standards and Technology to develop outcome metrics to demonstrate the effectiveness of the NIST Cybersecurity Framework is scheduled to be considered – and likely amended – at a markup session of the House Science, Space and Technology Committee on March 1. The measure, known as the NIST Cybersecurity […]
-
Cyber Risk Management Guidance for Corporate Directors
February 24, 2017
Cyber risk management is an increasingly important challenge for organizations of all kinds and sizes. Corporate directors have a legal responsibility to ensure that their corporations have appropriate cyber risk management policies and practices and are prepared to respond effectively to cyber incidents. Corporate directors can obtain helpful guidance from regulators, industry associations and other […]
-
Five Principles for Stronger Board Oversight of Cybersecurity
February 17, 2017
One of the most important jobs of the board is to challenge management and test their assumptions about strategy, the competitive environment, and associated risks and opportunities. Many directors would say that they are most passionate about this part of their role, and in today’s business environment it has never been more critical. Cybersecurity is […]
-
IT Security Employment Soars to Record High
January 18, 2017
The number of people employed in the United States as information security analysts reached a record high in 2016, according to uncirculated employment data provided by the U.S. Labor Department’s Bureau of Labor Statistics. Based on the same household survey used to determine the monthly unemployment rate, BLS reports that 89,000 individuals last year were […]
-
Updated cyber ‘handbook’ for business leaders examines changing legal, threat landscape
January 13, 2017
The updated “Cyber-Risk Oversight” handbook for corporate directors released Thursday examines new legal and regulatory requirements and challenges faced by business, as well as the evolving and growing threat of cyber attacks. “The legal and regulatory landscape with respect to cybersecurity, including required disclosures, privacy and data protection, information-sharing, infrastructure protection, and more, is complex […]
-
Boards of directors, managers at center of cybersecurity handbook for industry
January 12, 2017
The server room might be an obvious choice for a starting point when it comes to protecting your company’s cyber networks, but the National Association of Corporate Directors says the best place to begin is in the board room. The newest edition of the NACD’s Cyber-Risk Oversight handbook, released Jan. 12, advises private sector managers […]
-
Why risk management is critical in cybersecurity
If you’re a federal cyber official, the advice in a newly revised handbook on corporate cybersecurity might sound familiar. The new National Association of Corporate Directors’ cybersecurity handbook says cybersecurity is a risk management issue, not an IT matter. The language echoes what top federal agency IT managers and cybersecurity officials have been saying about […]
-
Former DHS head urges Trump to see economic dangers from cyberattacks
January 10, 2017
Last week’s U.S. intelligence report tracing Russia’s cyber-meddling with the 2016 presidential election is a timely reminder of the cybersecurity risks that the government and private companies face, said Tom Ridge, the nation’s first secretary of Homeland Security. “President-elect Trump is entering into a world fraught with hazards as never before,” Ridge said in a […]
-
SC Magazine – Editor’s Choice Award for Outstanding Leadership in Cyber Security
October 19, 2016
ISA RECEIVES NATIONAL AWARD FOR CYBER SECURITY LEADERSHIP – SC Magazine – Editor’s Choice Award for Outstanding Leadership in Cyber Security” as RSA Conference
-
Farms Big and Small Prime Targets for Cyber Attacks
April 18, 2016
Public News Service Reports: Officials from the FBI and the Justice Department held a roundtable recently at Iowa State University, emphasizing the seriousness of cyber attacks for a surprising target – the agriculture industry. It’s a subject familiar to Larry Clinton, president of Internet Security Alliance, an information security think tank. He says many of […]
-
Trump Leading The Democratic Candidate
March 02, 2016
PRESS RELEASE March 1, 2016 – Washington, DC TRUMP THE LEADING dEMOCRATIC CANDIDATE That’s democratic with a small d. The most under-reported story of Super Tuesday is certainly not that Donald Trump has seized hold of the GOP nominating process or the Party’s internal revolt — that story has been beaten to death. It is […]
-
Leading Figures in Cybersecurity and Privacy Advocate for an End to the War Between Privacy and Security
February 22, 2016
PR Newswire Reports: The ‘Digital Equilibrium Project’ works to bring differing views together in pursuit of a digital constitution to support a safer world for individuals, organizations and nations. Cybersecurity, government and privacy experts are banding together as part of The ‘Digital Equilibrium Project’ to foster a new, productive dialogue on balancing security and privacy […]
-
Obama Creating Federal Ciso Post
February 09, 2016
Bank Info Security Reports: President Obama is creating the position of federal chief information security officer as part of a multifaceted initiative aimed at strengthening the nation’s IT security. Related steps include the formation of a public-private Commission on Enhancing National Cybersecurity, as well as a proposal to boost government cybersecurity spending next fiscal year […]
-
Cybersecurity underfunded, industry tells congress
January 12, 2016
GCN Reports: Agency IT managers who believe they do not have the resources to adequately fight cybersecurity threats got some backing from industry experts who voiced the same concerns to Congress. At a Jan. 8 hearing held by two subcommittees of the House Science, Space and Technology Committee, Larry Clinton, president and CEO of the […]
-
Schooling Uncle Sam
January 08, 2016
Politico Reports: Here’s the cybersecurity three-step the federal government should be doing: Spend more on cyber, implement tougher cybersecurity policies and demand that senior officials pay more attention to the issue. Those are the first three of 10 recommendations Larry Clinton, president of the Internet Security Alliance, an industry group, plans to share with two […]
-
America is loosing the ‘Cyber Arms Race’
The Daily Caller Reports: The federal government is falling behind in a “cyber arms race,” putting millions of taxpayers’ personal information at risk, digital security experts told a joint hearing of two congressional subcommittees Friday. Hackers ranging from hacktivists to state-sponsored attackers will continue threatening the federal government’s digital networks to steal personal information and state […]
-
Congress Set to Enact Cyberthreat Information-Sharing Law
December 17, 2015
GovInfoSecurity Reports: After years of failing to enact cyberthreat information-sharing legislation, Congress is poised to vote on a measure this week that would incentivize businesses to voluntarily share threat data with the federal government and with one another. The legislation, added to a 2,009-page omnibus $1.1 trillion spending bill, also would establish a process for […]
-
Internet Security Alliance president outlines cyber partnership best practices
December 10, 2015
Inside Cybersecurity Reports: A new study by Internet Security Alliance president Larry Clinton outlines 10 best practices for government-industry partnerships on cybersecurity, ISA announced Wednesday. The new study highlights work from a research program led by Clinton and the Department of Homeland Security and lays out best practices endorsed by the Partnership for Critical Infrastructure […]
-
Industry wary of power grab by feds on cybersecurity
December 07, 2015
Washington Examiner Reports: The National Institute of Standards and Technology is launching a new initiative designed to energize industry-led efforts on cybersecurity amid concerns that federal and state regulators are increasingly eager to put their stamp on the issue. NIST, the highly esteemed agency headquartered in Gaithersburg, Md., is releasing a “request for information” about […]
-
Prospect of regulation hovers over cyber policy landscape
SC Magazine Reports: As 2015 nears an end, the industry-led, standards-driven strategy on cybersecurity remains a potent policy force, while signs – and fears – of a more prescriptive regulatory approach pop up across the cyber landscape. The National Institute of Standards and Technology is pursuing ways of keeping the voluntary approach vibrant and viable, […]
-
NIST process could help address cyber reg concerns in finance sector
December 03, 2015
Inside Cybersecurity Reports: Financial sector representatives are looking to an upcoming “request for information” on the federal framework of cybersecurity standards as a way to revitalize the voluntary, industry-led approach to cyber – and to head off conflicting regulatory moves. The National Institute of Standards and Technology is expected in the coming days to release […]
-
ISA’s Clinton: Failure to implement executive order spurs regulatory push
December 02, 2015
Inside Cybersecurity Reports: Incomplete efforts to implement President Obama’s “visionary” 2013 executive order on cybersecurity have created a policy vacuum that some federal and state officials are moving to fill with regulations, according to Internet Security Alliance president Larry Clinton. Representatives from 27 industry groups attended a meeting on Monday with officials from the National […]
-
Cyber security bill passes Senate muster
November 18, 2015
BusinessInsurance.com Reports: Passage of long-awaited cyber security legislation will be a limited but still-useful tool that encourages businesses and the government to share data by providing liability protection. However, experts are divided on the legislation’s ultimate effect on rates for cyber insurance. In a 74-21 vote in late October, the U.S. Senate approved The Cybersecurity […]
-
DHS insurance report could inform development of cyber info-sharing standards
October 08, 2015
Inside Cybersecurity Reports: A federal report that proposes hacked companies share specific kinds of cyber incident data in a private-sector repository to help expand the nascent insurance market is drawing early praise from industry stakeholders tracking the development of cybersecurity information-sharing standards. The assessment – produced by a Department of Homeland Security advisory panel and […]
-
Appetites for more: Government actions
October 01, 2015
SC Magazine Reports: Appetites for more: Government actions (10.1.2015) Cybersecurity is a technical challenge. But it also usually has a legal and regulatory aspect as well. Obviously, there is the legal framework under which organizations operate and under which cybercrimes are defined and, sometimes, prosecuted. Then, of course there are the complex interactions between government […]
-
Appliance takeover?: Internet of Things
em>SC Magazine Reports: Had the recently departed filmmaker Wes Craven lived just a few years longer, the Internet of Things (IoT) might have provided him with the perfect fodder for one of his horror classics. After all, it has all the the potential to be the stuff that nightmares – or an episode of Phineas […]
-
DHS selection for info-share standards role praised, questioned
September 04, 2015
Inside Cybersecurity Reports: The Department of Homeland Security is earning praise for its decision to select a university as the standards-setting body for new cyber information-sharing entities, as some stakeholders say the function can best be delivered in a research and academic setting. But other stakeholders from industry groups and the info-sharing community said they […]
-
DHS nears pivotal decision on standards body for new info-sharing entities
August 10, 2015
Inside Cybersecurity Reports: President Obama’s push to broaden the sharing of cyber threat data both within the private sector and between government and industry by urging companies and industries to establish new cybersecurity information-sharing hubs will soon reach a pivotal decision point when the Department of Homeland Security awards a key federal grant….SOURCE
-
DHS Workshop Marks Key Phase of Obama’s Cyber Information Sharing Push
July 27, 2015
Inside Cybersecurity Reports: The Department of Homeland Security will convene a workshop in Silicon Valley this week to make headway on implementing President Obama’s executive order on improving the exchange of cyber threat data between government and industry, an effort that faces significant obstacles but has captured the interest of key private-sector stakeholders. The July […]
-
ISA’s Clinton on List Of 100 Most Influential In Corporate Governance
July 21, 2015
Dark Reading Reports: The Internet Security Alliance (ISA) is proud to announce that it’s President and CEO, Larry Clinton, has been named to the “Corporate 100” which identifies the nation’s 100 most influential people in the field of corporate governance. Joining Clinton on the list are a wide range of luminaries including the 5 current […]
-
Evolving Threat Landscape Demands Executives Understand Cyber Risk
July 03, 2015
Today.US Reports: In the wake of a number of recent high-profile, damaging cyberattacks—including the recent breach of the Office of Personnel Management, which compromised the sensitive information of millions of federal employees—executives and board members are gradually becoming aware of today’s cyber threats and the potentially devastating impact these can have on their organizations. However, […]
-
Concerns over cyber security reach corporate boardrooms of Michigan manufacturers
June 21, 2015
MiBiz Reports: Manufacturing executives in West Michigan and nationwide worry that their computer networks could fall victim to security breaches similar to those that have plagued the retail sector in recent months. As industry extends its global reach and has come to rely more on digital data, cyber criminals have likewise become more innovative, adopting […]
-
ISA Featured on PBS, FOX Business, NYT, WSJ, CBS, CNN International, MSNBC, C-SPAN, CNBC & Other Media Outlets
June 12, 2014
As the issue of cyber security grows increasingly more salient, ISA has been featured in a number of high-profile print and television appearances over the past several years. Topics of discussion have ranged from hot-button issues of the day to long-standing policy implications. Some of these media appearances include USA Today, the PBS News […]
-
Bill Would Have Businesses Foot Cost of Cyberwar
May 08, 2012
By Tom Gjelten (National Public Radio (NPR) – Morning Edition) Business executives and national security leaders are of one mind over the need to improve the security of the computers that control the U.S. power grid, the financial system, water treatment facilities and other elements of critical U.S. infrastructure. But they divide over the question of […]
-
Mitigating PHI Danger In The Cloud
May 02, 2012
By Rick Kam For all of its benefits, cloud computing poses very real dangers to covered entities responsible for safeguarding protected health information (PHI). The cloud model, which the IT industry has been embracing for its up-front cost savings and efficiencies for years now, is more recently being recognized by the healthcare realm for its potential […]
-
Cybersecurity Bill Passes, Obama Threatens Veto
April 27, 2012
The Cyber Intelligence Sharing and Protection Act, which has been revised several times over the past week, allows the government and private companies to share information with one another with the aim of warding off cyber threats.
-
Cybersecurity Bill Passes, Obama Threatens Veto
By David Goldman (CNN) NEW YORK (CNNMoney) — The House of Representatives, as expected, approved a controversial cybersecurity bill late Thursday, staring down a veto threat. But the fight to protect the United States from a cataclysmic cyber attack is far from over. The Cyber Intelligence Sharing and Protection Act, which has been revised several times over the past week, […]
-
Group Calls For Public-Private Alliance To Protect Cyberspace
April 17, 2012
By Andrew Feinberg (The Hill) As Congress turns its focus to cybersecurity matters, 26 major business and trade associations are seeking to remind lawmakers that cyberspace is “a bulwark of the global economy.” The group sent a letter Tuesday to House Speaker John Boehner (R-Ohio) and Minority Leader Nancy Pelosi (D-Calif.) urging action to protect “the […]
-
Militarisation of cyberspace: how the global power struggle moved online
April 16, 2012
Rise of cyber-attacks on critical infrastructure on both sides of Atlantic calls for creation of cyberweapons and new rules for use
-
MILITARISATION OF CYBERSPACE: How The Global Power Struggle Moved Online
Rise of cyber-attacks on critical infrastructure on both sides of Atlantic calls for creation of cyberweapons and new rules for use By Nick Hopkins (The Guardian) Jonathan Millican is a first-year university student from Harrogate in North Yorkshire. He says he doesn’t think of himself as a “stereotypical geek”, but having been crowned champion in […]
-
Data Breaches Of Small Business, Including Doctor Offices, On The Rise
April 05, 2012
A report says cyber criminals are seeking what they consider easy targets. By Pamela Lewis Dolan Small organizations, including physician practices, represented the largest number of data breaches in 2011, according to Verizon’s annual Data Breach Investigations Report. The report examined 855 breaches across the globe that accounted for 174 million compromised records in 2011. […]
-
Debriefing The PHI Report: Determining The True Cost Of A Data Breach
March 23, 2012
DEBRIEFING THE PHI REPORT: DETERMINING THE TRUE COST OF A DATA BREACH By Jenny Laurello This week I had the chance to listen to a webinar highlighting the recently released report on The Financial Impact of Breached Protected Health Information. Released on March 5, the “PHI Report” has already been downloaded by more than 1,700 users, with its goal being […]
-
March 21 Free Webinar to Highlight Finding From The Financial Impact of Breached Protected Health Information
March 21, 2012
NEW YORK, — On Wednesday, March 21, 2012, at 2:00 p.m. ET, the American National Standards Institute (ANSI), The Santa Fe Group/Shared Assessments Program Healthcare Working Group, and the Internet Security Alliance (ISA) will host a free webinar to help health care organizations assess security risks and help them build a business case to better […]
-
Cybersecurity Bill Faces Uncertain Future In Fight Over Regulation
March 19, 2012
By Gerry Smith (Huffington Post) WASHINGTON — It is a scenario that many officials in Washington say keeps them awake at night: a cyberattack against critical infrastructure. Many lawmakers believe the nation’s vital computer networks are vulnerable to such an event, which they say could lead to the collapse of the banking system, sustained blackouts or […]
-
Bluecross Blueshied of Tennessee Fined $1.5 Million
By Integracon The Department of Health and Human Services is fining BlueCross BlueShield of Tennessee $1.5 million for the 2009 loss of 57 hard drives that contained unencrypted protected health information (PHI). In addition to the fine, the agency must submit to a 450-day corrective action plan.[1] In 2009, 57 hard drives were stolen from […]
-
New Report Highlights The Costs of Document Security Breaches for Healthcare Providers
The American National Standards Institute has released a report emphasizing the business incentives for healthcare providers to improve their IT security, and the potential costs of failures to increase security protocols. The report notes that the healthcare industry’s move toward fully adopting electronic health records increases the opportunities for protected health information (PHI) to be […]
-
Healthcare Security Pros Need To Speak The Language Of Finance
Experts say PHI protectors can’t pay for data protection because they don’t know how to make the business case for it. As the number of healthcare data breaches continues to snowball, executives put in charge of safeguarding protected health information (PHI) can’t keep up with the risks inherent with increased deployment of electronic health records […]
-
ANSI Releases Business Case For Safeguarding PHI Data
March 16, 2012
The American National Standards Institute (ANSI) has released a report on protected health information (PHI) security, namely, The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security, which offers a novel means of evaluating PHI at risk. The report would enable healthcare providers to conceive a business case for the investment […]
-
Nobody Cares About HIPAA
March 15, 2012
Compliance in many organizations is seen as only a costly inconvenience By Glenn S. Phillips Sometimes clarity comes out of the blue, including clarity about compliance issues. Recently I was meeting with friend and business associate Ben Drake. His company works with networking and data protection technology for a number of businesses. I mentioned how some organizations […]
-
FREE WEBINAR: How To Calculate The Cost Of A Data Breach And What To Do About It
March 14, 2012
Clearwater Compliance, a prominent HIPAA-HITECH compliance consultancy and software provider, announced today another upcoming free webinar entitled “How to Calculate the Cost of a Data Breach and What to Do About It.” Based on the new report recently published by ANSI and co-sponsored by Clearwater entitled “The Financial Impact of Breached Protected Health Information: A […]
-
5 Things CIOs Need To Know About Funding The Protections Of PHI
By Michelle McNickle With groups recently banding together to demand a tightening of security for protected health information, looking at the financial side of a breach has been put front and center. But according to Rick Kam, president and cofounder of ID Experts, there’s an aspect of protecting PHI that’s “not getting picked up,” and is […]
-
Data Theft Costs Tennesse Blue Cross Big Bucks
Blue Cross Blue Shield of Tennessee agrees to pay $1.5 million to settle case involving theft of 57 unencrypted hard drives that contained protected health information. By Nicole Lewis Blue Cross Blue Shield of Tennessee (BCBST) will have to fork over $1.5 million to the U.S. Department of Health and Human Services (HHS) to settle potential […]
-
How To Calculate The Cost Of A Hospital Data Breach
March 13, 2012
By Ron Shinkman Although hospital operators know that a data breach can lead to significant consequences–lawsuits, loss of business and reputation–a new report by the American National Standards Institute (ANSI) can help them place a specific price tag on such mishaps. The report released last week includes a section on what it refers to as “PHIve”–a five-step process […]
-
5 Best Practices for HIPAA Security
March 12, 2012
By Michelle McNickle The risk of protected health information being breached has grown dramatically within the past few years, and to combat the threat, the HIPAA Security Rule was created to provide organizations with administrative, physical, and technical guidelines to safeguard their electronic PHI. “The guidelines underscore a higher goal of the HIPAA Security Rule: helping […]
-
The Benefits And Limitations of Cyberinsurance
March 09, 2012
By Risk Management Magazine The Information Age. The Digital Age. The Computer Age. Whichever name you use, we’re in an era where many companies’ most valuable asset is information, from consumer buying habits to patient diagnoses to scientific data. At the same time, this asset also comes with a burden: companies are responsible for safeguarding the […]
-
OCR “Chomping On The Bit” To Audit Business Associates For HIPAA Hi-Tech Compliance
By Jack Anderson CEO Compliance Helper Here is a quote from Rebecca Herold, CIPP, CISSP, CISM, FLMI, in the February 2010 edition of Compliance Today: “CEs are now accountable for more active validation of BA security and privacy program compliance, beyond just having a BA contract in place. It is more important than ever for […]
-
Data Breaches Put Patients At Risk For Identity Theft
DATA BREACHES PUT PATIENTS AT RISK FOR IDENTITY THEFT By: Robin Erb DETROIT – Walk into a doctor’s office and chances are that some of your most private information — from your Social Security number to the details of your last cervical exam and your family’s cancer history — is stored electronically. Your doctor might […]
-
New ANSI Report Calls For Enhanced Security To Safeguard Protected Health Information
Report is a call to action for healthcare to invest more to protect patient information To view the original article please click here. By Don Bailey Washington, DC, March 5, 2012: With the release today of The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security, health care organizations now have […]
-
OR: Portland Psychiatrist Alerting Patients Personal Information Stolen
By Dissent Nick Budnick reports: A Northwest Portland psychiatrist is putting out public notice that personal information of 480 current and former patients on a laptop was stolen from his office. A burglar broke into Dr. David Turner’s office last October, stealing the laptop and other items. Turner is now seeking current and former patients to […]
-
New Report Calls For Enhanced Security To Safeguard Protected Health Insurance
By Steve Campbell With the release of the recent The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security, health care organizations now have a new method to evaluate the “at risk” value of protected health information (PHI) that will enable them to make a business case for appropriate investments to better […]
-
Report Offers PHI Security Guidance, Metrics for Breach Cost Analysis
March 08, 2012
To view the original article please click here. By Brian Eastwood Since 2009, the number of Americans affected by data breaches caused by lax protection of health information (PHI) security stands at more than 19 million — roughly the population of the state of Florida.
-
Financial Impact Of Breached Protected Health Information Report Helps IT Pros Make The Business Case For Patient Data Protection
By Ericka Chickowski As the number of healthcare data breaches continues to snowball, executives put in charge of safeguarding protected health information (PHI) can’t keep up with the risks inherent with increased deployment of electronic health records (EHRs) without enough financial backing to get the job done. And the only way that these PHI protectors can […]
-
PHI Project Release Report About Health Care Data Security
PHI PROJECT RELEASE REPORT ABOUT HEALTH CARE DATA SECURITY On Monday, the PHI Project released a report about the state of data security within health care organizations titled, “The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security.” Key findings: Weak Data Security: health care organizations are entrusted with safeguarding patient privacy, […]
-
Security Experts At A Loss For Words
March 07, 2012
By Abraham To view the original article please click here. No it is not your imagination. Security breaches are on the rise, particularly in healthcare. This is due to the fact that modern techniques are making more healthcare records available in electronic format. While this does wonders for efficiency and potential more accurate diagnosis and faster treatment […]
-
ANSI Publishes Report On Security Breaches
By AuntMinnie.com Staff Writers The Identity Theft Prevention and Identity Management Standards Panel of the American National Standards Institute (ANSI) has published a 67-page report about the need for healthcare organizations to protect patient information from data breaches. The “Financial Impact of Breached Health Information” discusses the financial, legal, operational, clinical, and other repercussions of […]
-
Healthcare Security Pros Need To Speak The Language of Finance
Experts say PHI protectors can’t pay for data protection because they don’t know how to make the business case for it By Ericka Chickowski, Contributing Writer, Dark Reading As the number of healthcare data breaches continues to snowball, executives put in charge of safeguarding protected health information (PHI) can’t keep up with the risks inherent […]
-
Rallying Support For Security Investments
New Method for Quantifying Breach Costs, Justifying Spending By Howard Anderson Because winning the support of CEOs for any new project requires demonstrating a return on investment, information security professionals need to more precisely quantify the potential payoff of their suggested spending on technologies and training, according to a new report. Security specialists need help “putting […]
-
Healthcare Industry CIOs, CSOs Must Improve Security
March 06, 2012
By Thor Olavsrud Given that stolen medical records can bring $50 apiece on the underground market, the frequency and magnitude of data breaches involving electronic health records is increasing. In an effort to help CIOs and CSOs build a better business case for enhancing security, a group of standards and security organizations have issued a new […]
-
ANSI: Know The Impact Of A Breach Before It Occurs
To view the original article please click here. As adoption rates rise, health IT makes protected health information (PHI) available to more organizations and entities, increasing the likelihood of data being improperly disclosed, lost or stolen. Despite the risks and costs of a potential data breach, many healthcare executives aren’t doing enough to support their organizations’ […]
-
REPORT: Securing Protect Health Information ‘Not Always A Top Priority’
By Renee Boucher Ferguson A comprehensive new report released this week, outlines the fragile state of patient information security, offering up a five-step methodology to help healthcare CIOs and CEOs determine the right level of investment in technology, processes and policy to better protect patient information. In the report, three organizations–the American National Standards Institute (ANSI), The Santa […]
-
New Report Calls For Enhanced Security To Safeguard Protected Health Information
5-Step Method Provides Health Care Organizations with Tool to Estimate the Overall Potential Costs of a Data Breach To view the original article please click here. ANSI, The Santa Fe Group/Shared Assessments Program Healthcare Working Group,and the Internet Security Alliance to Host Congressional Briefing Today; White House Cybersecurity Coordinator Howard Schmidt to Speak at Press Conference […]
-
Tightened Cyber Security Required For Digital Healthcare Adoption
By Kris The U.S. government is encouraging healthcare organisations to utilise electronic healthcare records. However this will mean much more is required to be spent on Cyber Security. As “no organisation can afford to ignore the potential consequences of a data breach,” according to the American National Standards Institute. To view the original article please click here. […]
-
Healthcare Industry CIOs, CSOs Must Improve Security
By Thor Olavsrud Given that stolen medical records can bring $50 apiece on the underground market, the frequency and magnitude of data breaches involving electronic health records is increasing. In an effort to help CIOs and CSOs build a better business case for enhancing security, a group of standards and security organizations have issued a new […]
-
VERIZON: Outside Threats Dominate Data Breaches
By: Simply Security Outside attacks were most responsible for data breaches in 2011. To view the original article please click here. Verizon Business recently released some of the results of its 2012 Data Breach Investigations Report, which took into account around 90 of the 855 global breaches the company tracked last year. Among the most glaring results […]
-
Quantifying The Financial Risk Of Privacy Breach
March 05, 2012
How much should a company handling Protected Health Information (PHI)[1]spend to protect itself from a data breach? Businesses typically use quantitative methods such as Net Present Value, Internal Rate of Return and Payback Period to make investment decisions. But investments to prevent breaches of PHI have until now relied on compliance arguments and subjective judgments. […]
-
Standards Body Releases E-Health Hack Calculator
By Aliya Sternstein Faced with the reality that health care data breach legislation is unlikely to emerge, the American National Standards Institute on Monday set forth a financial reason for providers to protect their patients’ online privacy. To view the original article please click here. The cost of patient data losses during the past year ranged between […]
-
Study Blames Digital Health Data Breaches on Lack of Funding, Support
By Chris Strohm WASHINGTON — Insufficient funding and lack of executive support are mainly responsible for security breaches involving patients’ electronic health records, a study found. Executives at health-care companies and providers must improve cost assessments to include payments from class-action lawsuits, said the report released Monday by the nonprofit American National Standards Institute. Its members […]
-
5 Steps To Estimate Potential Costs Of A Data Breach
By Kathleen Roney The American National Standards Institute, The Santa Fe Group/Shared Assessments Program Healthcare Working Group and the Internet Security Alliance have announced a collaborative report which provides information for healthcare organizations to better understand and limit data breach risks and liabilities. To view the original article please click here. According to the report, healthcare organizations […]
-
Report Urges Health Care To Assess Financial Impact Of Data Breaches
By Brian T. Horowitz As the Obama administration provides incentives for meaningful use of electronic health records (EHRs), efforts by the health care industry to secure patient data, or protected health information (PHI), have lagged behind, according to a new report by the PHI Project, an initiative of 100 health care leaders, including providers and insurance companies, as well […]
-
New Alliance Makes Case For Tighter Reins On Health Info
Bernie Monegain, Editor To view the original article please click here. WASHINGTON – Several healthcare groups have joined together to demand a tightening of security for protected health information. And they’re making a financial case for it. With the release of “The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security,” healthcare organizations […]
-
Health Organization Lagging In Ensuring Data Privacy, Security
To view the original article please click here. Many health care organizations lack sufficient resources to adopt strong privacy and security protections for patient data, according to a report by a coalition of health care and data security groups, Modern Healthcare reports (Conn, Modern Healthcare, 3/5).About the ReportThe coalition includes the: American National Standards Institute; Internet Security Alliance; and Santa Fe […]
-
Formula Helps Health-Care Industry Estimate Cost Of A Data Breach
Puget Sound Business Journal by Emily Parkhurst , Staff Writer In an effort to encourage executives of health care companies to take the threat of cybersecurity breaches seriously, President Barack Obama’s Cybersecurity Coordinator Howard Schmidt on Monday announced a way for companies to evaluate the financial risk of data breach. “When it comes to cybersecurity, we […]
-
Protect Health Data, Report Urges
By John Pulley March 5, 2012 The time and money spent protecting personal health information from data breaches are well worth the investment, contends a new industry security report. The 67-page report, “The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security,” includes a five-step method that health care organizations can use […]
-
A New Report Examines The Financial Impact of Breaches Of Protected Health Information
AND WAYS TO DEVELOP A BUSINESS CASE FOR ENHANCE PROTECTION OF THE INFORMATION. The free report is a collaborative effort of the American National Standards Institute, consultancy The Santa Fe Group, and the Internet Security Alliance, with input from more than 100 members of 70 organizations. The report offers up “PHIve,” a five-step method to […]
-
5 Steps To Assess Health Data Breach Risks
New report delves into the threats healthcare providers face for potential patient data breaches, and provides steps and tools to help assess those risks. By Marianne Kolbasuk McGee March 05, 2012 04:23 PM A new report outlines the financial costs of breaches of protected health data–and offers a five-step method for healthcare providers of any size […]
-
PHI PROJECT: Don’t Ignore Breach Consequences
March 05, 2012 | Bernie Monegain, Contributing Editor Several healthcare groups have joined together to demand a tightening of security for protected health information. And they’re making a financial case for it. With the release of “The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security,” healthcare organizations now have a new […]
-
7 Keys To Understanding The Financial Impact Of Breached PHI
March 05, 2012 | Michelle McNickle, New Media Producer To view the original article please click here. The recently released report, “The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security,” highlights the need for organizations to adopt a new method to evaluate the value of PHI, said the leaders of […]
-
Digital Health Data At Risk From Manager Support, Study Finds
March 04, 2012
By Chris Strohm – Mar 5, 2012 12:01 AM ET Insufficient funding and lack of executive support are mainly responsible for security breaches involving patients’ electronic health records, a study found. To view the original article please click here. Executives at health-care companies and providers must improve cost assessments to include payments from class-action lawsuits, said the […]
-
ANSI To Release Health Info Security Report
February 29, 2012
A March 5 news conference to unveil it will include Howard A. Schmidt, the White House cybersecurity coordinator, and Joe Bhatia, president and CEO of the American National Standards Institute. To view the original article please click here. Feb 29, 2012 Following the release of the new White House “Consumer Privacy Bill of Rights,” described as […]
-
Tax Breaks Considered To Improve Cybersecurity on Vital Networks
February 14, 2012
By Chris Strohm (Bloomberg) To view the original article please click here. Feb. 8 (Bloomberg) — Tax breaks and liability protection may spur banking, energy and telecommunication companies to improve cybersecurity on their computer networks, the chairman of a House technology panel said. Representative Greg Walden, an Oregon Republican, said today he will consider taking up […]
-
ANALYSIS: Government Must ‘Modernize’ Cyber Defense
February 10, 2012
By Jack Moore (Federal News Radio) Even as the House and Senate debate various proposals for cybersecurity legislation, the cyber environment is rapidly changing, one expert says. To view the original article please click here. Larry Clinton, the president of the Internet Security Alliance, testified before the House Energy and Commerce subcommittee Wednesday on the evolving cyber threat and […]
-
Feds Should Provide Industry With Cybersecurity Data And Incentives, Experts Testify
February 09, 2012
(Info Security) The US communications industry needs better information sharing, tax breaks, and liability protection from the federal government to improve cybersecurity, experts told a House panel on Wednesday. Entrust president and CEO Bill Conner highlighted the importance of public-private partnerships to share intelligence and inform the public. “The federal government needs to work more closely with […]
-
Experts Disagree On Focus Of Cybersecurity Legislation
By Molly Bernhart Walker (FierceIT) Cybersecurity legislation is needed, agreed the panelists speaking Feb. 8 before the House Energy and Commerce subcommittee on communications and technology–but what that legislation should look like was a far more divisive issue. While the telecommunications industry is doing a good job of securing its infrastructure, other sectors need regulations […]
-
Security Experts Ask House For Light Regulatory Touch
Technology industry representatives — looking to prevent an additional set of compliance requirements — urge House subcommittee to avoid new cybersecurity regulations to shore up the nation’s digital defenses. By Kenneth Corbin (CIO) WASHINGTON — Cybersecurity experts on Wednesday warned members of a House subcommittee against racing to legislation that would establish an overly burdensome […]
-
Cyber Regulation Lost In A Time Machine
Jettisoning Old Ideas about Securing Vital IT Networks By Eric Chabrow (Gov Info Security) The concept of time supported contrary views on the need for more stringent government regulations to protect the nation’s critical information infrastructure. For Larry Clinton, chief executive of the industry lobbying group Internet Security Alliance, regulation is so last century and other factors […]
-
Entrust President and CEO Outlines Cybersecurity Dangers
February 08, 2012
CONNER SPEAKS DURING CONGRESSIONAL SUBCOMMITTEE HEARING Entrust executive provides insight into cybersecurity attacks targeting vulnerable small businesses, enterprises via the Internet DALLAS, Feb. 8, 2012 /PRNewswire/ — Entrust Inc. President and CEO Bill Conner was invited as an expert speaker to the U.S. Subcommittee on Communications and Technology’s cybersecurity hearing in Washington D.C. Wednesday. The invitation to participate in the hearing, […]
-
THE CIRCUIT: Amazon and Viacom Strike A Deal
CYBERSECURITY HEARING, SPRINT EARNINGS By Hayley Tsukayama (The Washington Post) Amazon and Viacom: Amazon and Viacom announced Wednesday that they had entered into a rights agreement that will bring content from MTC, Nickolodeon, Comedy Central, TV Land and VH1 into Amazon’s streaming video catalog. The deal, announced Wednesday by Amazon, will add about 2,000 titles to […]
-
House Subcom Serious About Cybersecurity
Experts Say Threat is Growing, as Roles of MSOs,Other ISPs in Battling Attacks By Mike Reynolds (Multichannel) The concerns of House Democrats and Republicans about cybersecurity was made clear in a Hill hearing Wednesday unusually free of the partisan divides that often surface in hearings in the House Communications Subcommittee. During the hearing on “Cybersecurity: […]
-
Legal, Policy Frameworks Can Hamper Cybersecurity
By William Jackson (GCN) Tools are available to counter many of the threats to today’s digital infrastructure, but a legal and policy framework created for an analog world often hampers their implementation, a panel of industry representatives told a House panel. There was some disagreement among the panelists testifying Feb. 8 before subcommittee of the […]
-
Cybersecurity Experts: Major Telecom Providers Are Secure
By Gautham Nagesh (The Hill) The major telecom providers have done a good job securing their networks and don’t require further regulation by the government, experts testified Wednesday. James Lewis, the director of the Center for Strategic and International Studies, said telecom companies have addressed cybersecurity on a level that other sectors have not. “The […]
-
OVERNIGHT TECH: Telecom Subpanel Tackles Cybersecurity
February 07, 2012
By Brendan Sasso and Gautham Nagesh THE LEDE: The House Energy and Commerce telecom subpanel will hold a hearing Wednesday morning on the cybersecurity threat to the nation’s communications networks. The House has recently begun to move on cybersecurity legislation that would enhance information sharing between the government and private sector about cybersecurity threats and […]
-
SAAS, APTS And Asymmetric Risk The Spotlight As Security Threats
February 03, 2012
By Bernard Golden (CIO-IN) I had the opportunity to speak at a new security conference last week, Security Threats 2012. I presented on the topic of balancing business benefits with risks in the cloud (more on that later), but the event touched on a wide range of pertinent IT topics, provoking stimulating discussions of some […]
-
Senate Cyber Legislation Facing Industry Resistance Over Cost
January 31, 2012
By Eric Engleman and Chris Strohm Jan. 31 (Bloomberg) — A Senate measure aimed at compelling operators of vital U.S. utility and other networks to strengthen cybersecurity drew resistance from some business groups concerned that the bill would raise companies’ costs. Responses to draft versions of the legislation have included “hard pushback” from trade groups […]
-
Security Software Program Essentials
December 11, 2011
COMPUTER INTERNET SECURITY SOFTWARE PROGRAM By Ona (Apollomozi) Using your laptop and a reliable Internet connection could be the best combination for an ideal enterprise opportunity. You don’t want increase too much capital for your enterprise venture. With just a reliable Internet connection and laptop system (which, due to vast availability and utilization, change into […]
-
Internet Security Alliance Gathers At NAM
December 07, 2011
By Matthew Lavoie (Shopfloor) Chairman of the House Intelligence Committee Mike Rogers (R-MI) stopped by the NAM headquarters today address the board of the Internet Security Alliance. He shared the details of H.R. 3523, the Cyber Intelligence Sharing and Protection Act of 2011 a bill he sponsored with Ranking Member Dutch Ruppersberger (D-MD) that was […]
-
Internet Security Alliance Endorses Cyber Security Legislation
November 18, 2011
By Anthony Freed (InfoSec Island) To view the original article please click here. Internet Security Alliance President Larry Clinton praised the new direction on cyber security legislation that was signaled in a pair of new letters from Senator Majority Leader Harry Reid (D-NV) and 4 key Senate Republican leaders. “I note with great enthusiasm Majority Leader […]
-
RSA: Internet Security Alliance President Larry Clinton
July 02, 2011
By Anthony Freed (InfoSec Island) Larry Clinton is President and CEO of the Internet Security Alliance (ISA). Infosec Island provides ISA members with additional news and information links via their daily email updates. ISA is a multi-sector industry group created by the former Chairman of the U.S. House Committee on Intelligence and Carnegie Mellon University. […]
-
Trade, Civil Liberties Groups Urge Cybersecurity Incentives
March 09, 2011
Grant Gross (IDG News ), PC World, 03/09/2011 To view the original article please click here. The U.S. government should look to incentives as a way to encourage businesses to adopt better cybersecurity practices, instead of creating mandates, recommends a new paper from four trade groups and a civil liberties group. ConcernAlthough some cybersecurity experts have […]
-
Industry Groups Push For Security Incentives, Not Laws
Angela Moscaritolo, DC Magazine, 03/09/2011 Instead of imposing additional security regulations, the U.S. government must work with the private sector to develop incentives that motivate companies to voluntarily adopt security best practices, a coalition of industry associations and civil liberties groups recommended in a white paper released Tuesday. The paper, crafted by members of the […]
-
ADVANCED PERSISTENT THREAT: Industrial Strength Hacking
February 08, 2011
Expert Voices Thought Leader: Sounil Yu By Sounil Yu (Booz Allen Hamilton) Why did you choose Booz Allen? Actually, Booz Allen chose me via the employee referral program. But I knew Booz Allen was a prestigious firm, so I was pleased to have been chosen. My old company was an accounting organization that offered consulting, […]
-
ARTICLE 12/9/10
December 09, 2010
To view the original article please click here. PRO-WIKILEAKS CYBERATTACKS SHOW GROWING THREAT By Oren Dorell and Jack Gillum (USA TODAY) A cyberattack by supporters of WikiLeaks against the MasterCard and Visa websites foreshadows a new generation of increasingly dangerous assaults on the Internet, security experts say. “This will serve to inspire other bad guys,” said Rob Rachwald of […]
-
Education’s Critical Role In Cybersecurity
September 01, 2009
By Larry Clinton (Educause) Larry Clinton is President/CEO of the Internet Security Alliance. He is a member of the “Experts Panel” created by the General Accountability Office (GAO) at the request of the House Committee on Homeland Security to assess cybersecurity and make recommendations to the Obama Administration. Comments on this article can be posted […]
-
Cybersecurity: Network Threats and Policy Challenges
May 01, 2009
-
SECURING CYBERSPACE: What Exactly Should We Be Doing?
May 01, 2006
By Larry Clinton (Cutter IT) To view the article please click here.
-
SECURING CYBERSPACE: Is It Time To Rethink Our Strategy?
January 01, 2006
By Larry Clinton (Cutter IT) To view the article please click here.