Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) released its draft of a voluntary cybersecurity framework on Oct. 22 that will allow both private and public companies that work with critical infrastructure to better evaluate cyber risk, and prepare better defenses against ever-increasing online attacks.
NIST's “Preliminary Cybersecurity Framework,” to be finalized in February 2014 after a period for public comment, originated with an executive order from President Barack Obama, which identified cyber threats to critical infrastructure as “one of the most serious national security challenges” and directed NIST to produce the framework document. See, “Improving Critical Infrastructure Cybersecurity,” Executive Order 13636 (Feb. 12, 2013). The new framework sets out specific steps and best practices for organizations ' small and large, public and private ' to follow in order to better protect the country's critical infrastructure.
“At minimum, what it does is it enables organizations to appreciate the need for greater risk assessment and risk management as it relates to cyber,” Tom Kellerman, vice president of cybersecurity for security software company Trend Micro Inc., told Internet Law & Strategy's ALM affiliate CorpCounsel.com. See, “Sci-Fi Web Videos Warn of Cyber Threats of the Future.”'
The cyberthreat to critical infrastructure, Kellerman emphasized, is quite high. Street crime globally is down 10%, he said, but cybercrime has skyrocketed ' largely because criminals realize that the most valuable information and critical points of attack can be found in online networks. “Every major organized crime syndicate in the world has created divisions dedicated to hacking,” he said.
The government's document sets out a risk-based approach to fighting cybercrime, outlining five basic functions for security strategies: identify, protect, detect, respond and recover. The framework imposes no legally binding regulations, but instead aims to serve as a model that companies can tailor to their own, more specific cybersecurity needs and circumstances.
Phillip Smith, senior vice president of government solutions at Trustwave Holdings Inc., an information security company, told CorpCounsel.com that the framework presents good guidelines for companies, but he stressed that it is still up to leaders at individual companies to implement them if the U.S. wants to make sure its infrastructure is fully protected. “I'm not advocating that the government try and regulate what should be done for security, but anytime you have a voluntary standard ' how effective can it be?” Smith asked. See, “Using Managed Security Services to Battle Cyber Threats.”'
He added that cyber-risk management at companies is also a sector- and business-specific undertaking. The framework sets out standards and best practices at “a high level,” he said, and it remains up to companies and their cybersecurity teams to create their own risk profiles and determine what are the gravest threats they face. “It's a good start,” he noted, especially as the framework “keeps cybersecurity on the front burner.”
Michael Kaiser, executive director of the National Cybersecurity Alliance, agreed that companies will have to figure out how they can leverage the new framework standards: “I think a lot of work will be done in sectors and within organizations themselves as they go through and figure out: what do these things mean for us?” See, “Happy National Cyber Security Awareness Month!“'
Kaiser pointed to the document's potential to help public and private entities, as well as the companies and contractors they work with, take a long view on critical infrastructure security. “Hopefully it'll help us move away a bit from chasing the last threat and getting quagmired in this environment of constant threat and fear, to an approach where people can be more orderly and address the issue in a way that's adaptive to the company,” he explained.
Voluntary though it may be, the new framework, according to Kellerman, will raise the bar for in-house attorneys who want to show they are doing what they can to protect critical infrastructure from cyberthreats. He said that in the past, some in-house counsel have promulgated an “ideology of plausible deniability” when it comes to companies taking responsibility for cyber attacks ' but with new standards like the NIST framework, that era is fading away. He predicted that the minimum standards of care established by the government's plan could lead to an increase in liability, and in class actions against companies over their real or perceived cybersecurity shortcomings.
The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) released its draft of a voluntary cybersecurity framework on Oct. 22 that will allow both private and public companies that work with critical infrastructure to better evaluate cyber risk, and prepare better defenses against ever-increasing online attacks.
NIST's “Preliminary Cybersecurity Framework,” to be finalized in February 2014 after a period for public comment, originated with an executive order from President Barack Obama, which identified cyber threats to critical infrastructure as “one of the most serious national security challenges” and directed NIST to produce the framework document. See, “Improving Critical Infrastructure Cybersecurity,” Executive Order 13636 (Feb. 12, 2013). The new framework sets out specific steps and best practices for organizations ' small and large, public and private ' to follow in order to better protect the country's critical infrastructure.
“At minimum, what it does is it enables organizations to appreciate the need for greater risk assessment and risk management as it relates to cyber,” Tom Kellerman, vice president of cybersecurity for security software company Trend Micro Inc., told Internet Law & Strategy's ALM affiliate CorpCounsel.com. See, “Sci-Fi Web Videos Warn of Cyber Threats of the Future.”'
The cyberthreat to critical infrastructure, Kellerman emphasized, is quite high. Street crime globally is down 10%, he said, but cybercrime has skyrocketed ' largely because criminals realize that the most valuable information and critical points of attack can be found in online networks. “Every major organized crime syndicate in the world has created divisions dedicated to hacking,” he said.
The government's document sets out a risk-based approach to fighting cybercrime, outlining five basic functions for security strategies: identify, protect, detect, respond and recover. The framework imposes no legally binding regulations, but instead aims to serve as a model that companies can tailor to their own, more specific cybersecurity needs and circumstances.
Phillip Smith, senior vice president of government solutions at Trustwave Holdings Inc., an information security company, told CorpCounsel.com that the framework presents good guidelines for companies, but he stressed that it is still up to leaders at individual companies to implement them if the U.S. wants to make sure its infrastructure is fully protected. “I'm not advocating that the government try and regulate what should be done for security, but anytime you have a voluntary standard ' how effective can it be?” Smith asked. See, “Using Managed Security Services to Battle Cyber Threats.”'
He added that cyber-risk management at companies is also a sector- and business-specific undertaking. The framework sets out standards and best practices at “a high level,” he said, and it remains up to companies and their cybersecurity teams to create their own risk profiles and determine what are the gravest threats they face. “It's a good start,” he noted, especially as the framework “keeps cybersecurity on the front burner.”
Michael Kaiser, executive director of the National Cybersecurity Alliance, agreed that companies will have to figure out how they can leverage the new framework standards: “I think a lot of work will be done in sectors and within organizations themselves as they go through and figure out: what do these things mean for us?” See, “Happy National Cyber Security Awareness Month!“'
Kaiser pointed to the document's potential to help public and private entities, as well as the companies and contractors they work with, take a long view on critical infrastructure security. “Hopefully it'll help us move away a bit from chasing the last threat and getting quagmired in this environment of constant threat and fear, to an approach where people can be more orderly and address the issue in a way that's adaptive to the company,” he explained.
Voluntary though it may be, the new framework, according to Kellerman, will raise the bar for in-house attorneys who want to show they are doing what they can to protect critical infrastructure from cyberthreats. He said that in the past, some in-house counsel have promulgated an “ideology of plausible deniability” when it comes to companies taking responsibility for cyber attacks ' but with new standards like the NIST framework, that era is fading away. He predicted that the minimum standards of care established by the government's plan could lead to an increase in liability, and in class actions against companies over their real or perceived cybersecurity shortcomings.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
Businesses have long embraced the use of computer technology in the workplace as a means of improving efficiency and productivity of their operations. In recent years, businesses have incorporated artificial intelligence and other automated and algorithmic technologies into their computer systems. This article provides an overview of the federal regulatory guidance and the state and local rules in place so far and suggests ways in which employers may wish to address these developments with policies and practices to reduce legal risk.
This two-part article dives into the massive shifts AI is bringing to Google Search and SEO and why traditional searches are no longer part of the solution for marketers. It’s not theoretical, it’s happening, and firms that adapt will come out ahead.
For decades, the Children’s Online Privacy Protection Act has been the only law to expressly address privacy for minors’ information other than student data. In the absence of more robust federal requirements, states are stepping in to regulate not only the processing of all minors’ data, but also online platforms used by teens and children.
In an era where the workplace is constantly evolving, law firms face unique challenges and opportunities in facilities management, real estate, and design. Across the industry, firms are reevaluating their office spaces to adapt to hybrid work models, prioritize collaboration, and enhance employee experience. Trends such as flexible seating, technology-driven planning, and the creation of multifunctional spaces are shaping the future of law firm offices.
Protection against unauthorized model distillation is an emerging issue within the longstanding theme of safeguarding intellectual property. This article examines the legal protections available under the current legal framework and explore why patents may serve as a crucial safeguard against unauthorized distillation.