Regulatory TREND. What do I need to know about Active Cyber Defense?

Active Cyber Defense uses private sector cyber bounty hunters and hackers  to protect critical infrastructure.

Who is behind this concept?

  • An Atlantic Council report,
  • by, Frank Kramer, Assistant Secretary for International Security Affairs for the Clinton administration
  • and by, Bob Butler, Deputy Assistant Secretary for Space and Cyber in the Obama administration

How would this private sector system work?  the private sector hackser would be deputized  “certified active defenders” to assist…

5 Points. Apple Desired Information Privacy Law.

 

  • tech companies should de-identify customer data or not collect customer data
  • comprehensive federal law is necessary
    • why? tech companies that collect a lot of data are basically spies
  • people should have a right in their data, and a right to have that data minimized
  • consumers must be told what data is being collected & why
  • the data belongs to the users and users (consumers) should always have access to it

The gold standard law: GDPR in the EU

Ars Technica | Tim Cook Calls for Strong US…

4 Impacts of the April Data Breach of US Pipelines.

Date of cyber attack: April 2, 2018

What part of a pipeline system was attcked? an Electronic Data Interchange for the pipeline system

What impact did the hack have on the piepline?

  • The interchange was handled by a 3rd party
  • allegations that the system was shutdown, with no known impact on the natural gas flow
  • later in the evening, it was  safe to transfer files through the EDI platform
  • no data or operations were affected by the attack

CISO Magazine | Energy Transfer Partners reports…