State Regulator Subpoenas Company After Data Breach. What your Clients Need to Know.

The State:  New York

The regulator:  New York’s Department of Financial Services

The Subpoena: Seeks more information about Equifax’s data breach, including:

  • details on when Equifax learned of the breach
  • details on what actions Equifax took after the breach was discovered

More regulatory enforcement in the works? Yes, New York also wants to impose the financial data security rules it finalized this year to apply to credit reporting agencies like Equifax.

What does this mean for other…

+1 State Bill. Equifax Reaction from Bluegrass Country. Procurement Opportunities + New Encryption Standards.

Kentucky Attorney General proposes revisions to the state’s data breach notification statute to require:

  • Kentuckians impacted by a data breach would gain access to a free credit freeze
  • Require access to 3 free credit reports each year from each of the major credit reporting agencies
  • Require 5 years of credit monitoring
  • Require all credit reports be encrypted

WCPO | Kentucky’s attorney general proposes new data breach protections after Equifax incident

6 Recommendations from Congress' Health Care Industry Cybersecurity Task Force. Writing Health Care Data Security Bills for you.

In the Cybersecurity Act of 2015,   Congress created the Health Care Industry Cybersecurity Task Force.

6 “critical” recommendations were offered:

  1. Define and streamline leadership, governance, and expectations for health care industry cybersecurity.

  2. Increase the security and resilience of medical devices and health IT.

  3. Develop the health care workforce capacity necessary to prioritize and ensure cybersecurity awareness and technical capabilities.

  4. Increase health care industry…

+1 Local Government Paying Ransom on Ransomware Hack.

The local government: Montgomery Co. Maryland

The hackers demanded: 9 bitcoins, valued at between $40,000 and $50,000

Other local governmetns have been able to retrieve data from back up and not pay the ransom, was that tried? Yes, but for reasons unrelated to the hack the backup was not a viable option

What was the value of the data to the county? $5 million

Montgomery Advertiser  | Montgomery County pays ransom, gets data back

Regulatory Trend. State Elections Security Team from the North. Go Bears.

Wisconsin’s election officials have created a state elections security team, and here’s what you need to know:

  • Inter-agency Communication.  It will work with federal, state and local elections officials
  • Cyber security Infrastructure. Builds on cyber-security steps already taken
  • Best Practices. Establishes best practices to address ever-changing threats
  • Statewide Policies?  The team will consider whether to mandate that local clerks meet minimum security requirements for hardware and…

Want to Make Your City or Your State an Economic Power House for Your Client's Cybersecurity Business? 4 Easy Steps/

  • Partner with the private sector and local nonprofits.
  • Be creative and develop a program that is customized to the particular area. 
  • Develop connections between military and government units that have use for the local talent and the companies that surround them.
  • Facilitate the local placement of national government cybersecurity capacities. 

Politico | How to erect an economic powerhouse using cybersecurity

Cybersecurity as an Engine for Growth Authors: Natasha CohenRachel HulveyJittip…

4 Requisites to Make Cyber Security = Economic Growth Engine. New Report Highlights San Antonio, TX.

A new report, Cybersecurity as an Engine for Growth, looked at Beersheba, Israel; Malvern, United Kingdom; and San Antonio, United States to find 3 ways cyber security can lead to economic growth:

  • Proximity to government cybersecurity functions ups the talent pool & opens up contracting opportunities.
  • Being able to attract or develop a workforce is critical.
  • Requires Research centers and incubators nearby.
  • Industry leadership help raise public awareness & bring crucial capital to the market

TREND. The Next Technology for Government & Local Government Data. All Data. All places. 3 Bits informed:intel

  • The new hot commodity in data security: blockchain
  • How does it work? Llike a spy network where no one entity or server has all the information.
  • How quickly can information and payments move? Instaneously with no holding fees.

How does the spy network analogy play out for data?

Say your a city controller making payments to a contractor. The payment can be processed instaneously without being hacked because the information is broken down into packets, encrypted and each packet is sent a…