Anatomy of a Cyber Security Caucus

The Congressional CyberSecurity Caucus:

Co-Chairs:   Michael McCaul & Jim Langevin

Members: 

Aguilar, Pete, California, 31st
Allen, Rick A., Georgia, 12th
Barton, Joe, Texas, 6th
Bishop, Mike, Michigan, 8th
Blum, Rod, Iowa, 1st
Brooks, Mo, Alabama, 5th
Bustos, Cheri, Illinois, 17th
Capuano, Michael, Massachusetts, 7th
Carbajal, Salud, California, 20th
Cárdenas, Tony, California, 29th
Castro, Joaquin, Texas, 20th
Chabot, Steve, Ohio, 1st
Cicilline, David, Rhode Island, 1st 
Clarke, Yvette D., New York,…

Campaign TREND. Not Spending Funds on Cyber Security. 3 Key Points.

  • 6 candidates for U.S. House &  Senate spent more than $1,000 on cybersecurity
  • why? campaigning takes too much time to address cybersecurity issues ro raise funds for cyber security technology protections
  • what do recent hacks look like?
    • Senator McCaskill says her campaign was hacked
    • Hacking in 2 California House races are being investigated by the FBI
    • Silverlining: 2 major parties spend heavily on cyber security protections

Government Technology | Despite Mounting Threats,…

50% of Voting Machines Hackable. New Report. What you need to know:

A Def Con report to Congress on Thursday will say:

  • 50% of voting machines are hackable
  • The defect is traceable back to a 2007 report by the OH Secretary of State
  • The hacking can occur remotely or when the hacker has physical contact with the machine

WallStreet Journal | Voting Machine Used in Half of U.S. Is Vulnerable to Attack, Report Finds

 

Lege TREND. Centralize State Cybersecurity Decisions.

State: Pennsylvania

The legislation: HB32 (PA | 2018)

How is the centralization of data security decisions structured?

  • create a Cybersecurity Innovation and Excellence Commission
  • The Commission will be comprised of:
    • lawmakers
    • government officials such as:
      • Department of Community and Economic Development
      • Department of Labor and Industry
      •  Pennsylvania Emergency Management Agency
    • outside experts 
  • The goal is to stay ahead of cybersecurity developments by:
    • coordinate…

NY Attorney General Report on Crypto Currency Regulation. 3 Recommendations.

  • Caution: Conflicts of Interest.  Virtual asset trading platforms often engage in several lines of business that would be restricted or carefully monitored in a traditional trading environment.
  • Account for Abusive Trading Behavior
  • Consumer Protetctions needed

 

NY Attorney General | Virtual Markets Integrity Investigation 

Lege TREND. State laws. Data Protection for Internet of Things.

California’s internet of things law, SB 327 (2018 | CA), is:

  • first in the nation to address cyber security for internet of things
  • internet of things- connected thermostats, coffee makers etc… that have been used to take down major websites
  • it sets the floor for data security standards for connected devices

Concerns:

  • Whether placing standards on ingternet of things harms innovation

Washington Post | The Cybersecurity 202: California’s Internet of Things cybersecurity bill could lay…

Campaign Trend. Devices and Campaigns. What's preferred?

Campaign entity: The DNC

The data device policy:  Eliminate Android, espcially ZTE devices. Retain iphones.

Is there a campaign officer for security? Yes, chief information security officer, the former chief information security officer at Yahoo

Forbes | Democrat Cyber Defenders Are Purging Androids In Favor Of iPhones

Lege TREND. Data Breach Notification. State Preemption. 3 Reasons states oppose.

HR 6743 (2018) will preempt state data breach rules.

Opposition includes:

  • States with stronger data reech laws
  • States with stronger protection of insurance consumers
  • Hampers state ability to investigate and mitigate damages in the state

Lake County News | Jones urges House to oppose bill that undermines California security data protections

New Study. Center for Election Innovation & Research. 5 Take Aways.

Survey of states about voter registration database security reveals:

  • STATES ARE IMPROVING AND IMPLEMENTING BEST PRACTICES
  • multi factor identification for access is crucial
  • system iuntegrity is crucial- staff and security
  • consistent auditing of security systems
  • train employees about phishing

CENTER FOR ELECTION INNOVATION AND RESEARCH