Blog Posts Tagged with "Internet Security Alliance"
June 06, 2012 Added by:Marjorie Morgan
"Most cyber breaches are not conducted by hackers from the outside but poorly trained or rogue insiders. The primary vulnerability in the cyber system is the people. Unless we find a way to spur the market to create a cyber secure workforce we risk unilaterally disarming both our economy and our national defense"...
May 08, 2012 Added by:Headlines
"The legally mandated role of the government is to provide for the common defense, and they're willing to spend pretty much whatever it takes... If you're in a private organization, your legally mandated responsibility is to maximize shareholder value. You can't spend just anything..."
March 22, 2012 Added by:Headlines
“It is critical that we strengthen our cybersecurity posture, and we urge Congress to recognize the need for new tools to more effectively prevent and respond to potential cyber attacks on the homeland..."
March 20, 2012 Added by:Marjorie Morgan
Webinar participants will hear from industry experts who will highlight strategies for health care organizations and findings from the recently released report, The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security...
March 07, 2012 Added by:Marjorie Morgan
The ISA and ANSI released a new report titled The Financial Impact of Breached Protected Health Information which explores the reputational, financial, legal, operational, and clinical repercussions of a protected health information breach on an organization...
March 02, 2012 Added by:Marjorie Morgan
Schmidt is slated to announce the third publication in the Internet Security Alliance's financial cyber risk management series, "The Financial Impact of Breached Protected Health Information: A Business Case for enhanced PHI Security"...
January 25, 2012 Added by:Marjorie Morgan
“Cyber attacks are becoming more serious and more sophisticated. Not only is our nation’s critical infrastructure, but virtually every private or government enterprise which relies on modern information technology is now being subjected to these increasingly advanced attacks..."
October 12, 2011 Added by:Marjorie Morgan
Everyone can track security legislation in Congress through the “Cybersecurity Legislation Tracker”. This is a valuable resource that provides notice and summaries of significant cybersecurity developments on Capitol Hill, including hearings, proposed bills, and task force activities...
October 07, 2011 Added by:Headlines
"The system they have recommended provides a pathway for a sustainable system to of cyber security that will result in securing our nations critical infrastructure while stimulating the IT engine that has provided most of the good news our economy has experienced over the last 20 years..."
September 14, 2011 Added by:Headlines
The devil is in the details with these laws. But there are a number of questions here... These companies are already victims in these attacks, so why are we penalizing them after a breach? I think that's because it's easier to issue fines than it is to track down the criminals and go after them..."
August 17, 2011 Added by:Headlines
"This is a punitive model where we're trying to blame the victims of the attack. I don't think that the administration's proposal really does anything that I can see to enhance cybersecurity," said Larry Clinton, President of the Internet Security Alliance...
August 15, 2011 Added by:Headlines
Clinton’s election to the ITSCC is critical at this point in time, as some of the legislative efforts underway may serve to fundamentally alter the public-private partnership envisioned in the National Infrastructure Protection Plan and the Obama Administration’s Cyberspace Policy Review...
July 27, 2011 Added by:Marjorie Morgan
An effort is underway to compel thousands of companies to provide proprietary data under the Defense Production Act (DPA) or face fines and criminal prosecution. While use of the DPA has ample precedent, this seems to go well beyond its intended purposes...
July 20, 2011 Added by:Marjorie Morgan
Speaker of the House Boehner has appointed a task force comprised of Members from the major Committees of the House to develop a framework for cyber security legislation. The ISA was the very first organization that was asked to testify before the Task Force...
June 28, 2011 Added by:Headlines
"Virtually everybody gets breached. If you're going to have these advanced persistent threat guys come after you, they're going to get into your system. If you're going to make that the line, and then you're subject to these name-and-shame penalties, I think that would be a mistake..."
June 23, 2011 Added by:Headlines
ISA has articulated its pro-market approach to cyber security through the two editions of its “Cyber Security Social Contract.” When the Obama Administration released its own policy paper for cyber security, the Cyberspace Policy Review, the first document it quoted was the ISA Social Contract...
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015