Cybergovernance Journal Update – 5/20/2016

by | May 20, 2016

From a mixed Obama legacy on cybersecurity to institutional standards implementation to declaring cyber warfare, the US government is struggling to deal with cyber risk.

SEC Says Cybersecurity Biggest Risk to Financial System

Reuters, May 18
Mary Jo White, the chair of the U.S. Securities and Exchange Commission (SEC), issued the strongest warning to date of the threat posed by hackers. Cyber security is the biggest risk facing the financial system, she said on Tuesday, in one of the frankest assessments yet of the threat to Wall Street from digital attacks.

Read Article

Which Approach to Cyber Risk Oversight is Best – Google, or 23andMe?

Cybergovernance Journal, May 16
Determining the “health” of your cybersecurity strategy is challenging. Knowing when you’ve spent enough on preventive measures seems difficult to gauge. Knowing whether you’re focusing on the right areas is often unfathomable…

Read Article

Defining a Cyber Act of War

Wall St. Journal, May 8
Current U.S. policies permit the Defense Department to respond to a cyberattack against military forces and infrastructure. But the U.S. doesn’t have a clear policy governing its response to a similar attack against critical civilian infrastructure…

Read Article

NIST is Pushing Holistic Cybersecurity Process for IoT

fedscoop, May 6
NIST Fellow Ron Ross reveals details of the draft update on what the agency calls “cyber-physical systems” that was two years in the making…

Read Article

Cybersecurity Buck Should Stop With the Board

SC Magazine, May 13
The research presents the opinions of 500 office workers and 250 IT decision-makers, many of whom feel that cybersecurity should be more of a concern to a company’s executive members and board…

Read Article

A Mixed Legacy on Cyber for Obama

FCW, May 18
Steven Chabinsky, a former cyber official at the FBI under Obama, said that, despite the virtues of the NIST framework, “we still have been left with a legacy of no metrics” for businesses large and small to measure their effectiveness in cybersecurity…”

Read Article

Subscribe
Be notified of new Journal entries in your email box or Follow us on Twitter.

Loading