Lege TREND. New way to bring broadband to rural areas

Where: New Hampshire The legislation: would authorize the multi-town district option that would work with private companies How did this idea start? SB 103 (2019 | NH) Is this the first state to take this approach? No, Vermont has a similar system that created the East Central Vermont Telecommunications District and it partnered with ValleyNet […]

Lege TREND. 1st came divestment. Next came Prohibiting Certain Countries from Storing Data

What countries could be barred legislatively as places US data can be stored? China What legislation: Missouri Senator Hawley’s National Security & Personal Data Protection Act of 2019 Engadget | Senate bill would block US companies from storing data in China

Lege TREND. How States are Legislating IoT (all those connected devices in the internet of things)

How many internet of things devices are predicted in the world by 2023? 43 billion What states are leading the path? California and Oregon What other states are considering it? Illinois, Kentucky, Massachusetts, Maryland, New York, Rhode Island, Vermont & Virginia What do state regulations look like? require manufacturers to incorporate mandatory minimum security features […]

Campaign TREND. Encrypted Communication Apps.

Who is helping facilitate encrypted campaign communications? The nonprofit group Defending Digital Campaigns What problem does the non-profit want to solve? That nation states wanting to compromise campaigns hold the power as campaigns are often on shoe string budgets What other data security elements are recommended for campaigns? email security cybersecurity training cyber protection for […]

Business TREND. One State law. Company Applies Standard Nationwide.

What company? Microsoft Which law? California’s Consumer Privacy Act What is Microsoft saying in support?  strong supporters of California’s new law support the expansion of privacy protections in the United States  privacy is a fundamental human right privacy laws should be further strengthened by placing more robust accountability requirements on companies Microsoft | Microsoft will […]

New Study.Procurement. More Requirements for Election Vendors.

WHO: Brennan Center for Justice WHAT: A Framework for Election Vendor Oversight WHY: 80% of voting systems controlled by 3 vendors little or no oversight of the security of these vendors RECOMMENDATIONS: New federal certification program to issue standards Enforce vendors’ compliance with the standards Institute mandatory compliance audits Utilize a Technical Guidelines Development Committee […]

NIH Wants Industry Feedback on Data Security + Health

Where do I see the proposal: Federal Register Request for Public Comments on a DRAFT NIH Policy for Data Management and Sharing and Supplemental DRAFT Guidance The goals: improve the current data management and sharing policy for NIH funded or conducted research (Bonjour, to all your medical research and pharmaceutical research clients) What best practices […]

New Kid on the Block. Corporate Partnership to Protect Infrastructure

WHO: The Chertoff Group + Dragos WHAT: A policy intelligence & communication shop + a industrial control system shop WHY: High Tech infrastructure is a data security target WHAT ARE INFRASTRUCTURE OPERATORS SAYING? Texas Central Rail: “As we usher in 21st century transportation solutions represented by high-speed rail, we believe that the safety of our […]

Data Breach at Health Agency. By the Numbers.

$1.6 million cost of federal fine to the state health agency 6,617 people had their personal health information accessible How did the data breach occur?   “an internal application was moved from a private, secure server to a public server, where a software flaw allowed the private information to be viewed without access credentials.” no risk […]

3 Reasons for Standard Cyberattack Reporting

Who is calling for standard reporting? Harvard Business Review Why? The nature of attacks are borderless, fast moving and difficult to predict or manage What reasons support standard cyberattack reporting? Information Sharing. The wheel isn’t being recreated. Attackers will repeat methods. Certain Data will inform planning and defenses. this includes: dates relevant to the incident […]