Anatomy of an "Aggressive" Cybersecurity Measure by the Razorbacks

Where: Arkansas

The legislation: Senate Bill 632 (2019 | AR)

What does SB632 do?

  • Creates the Cyber Initiative
  • Housed within the Economic Development Commission
  • mitigate the cyber-risks to Arkansas
  • increase education relative to threats and defense
  • provide the public and private sectors with threat assessments and other intelligence
  • foster growth and development around tech, IT and defense
  • create a “cyber alliance” made up of partnerships with a variety of insitutitions like…

Regulatory TREND. What do I need to know about Active Cyber Defense?

Active Cyber Defense uses private sector cyber bounty hunters and hackers  to protect critical infrastructure.

Who is behind this concept?

  • An Atlantic Council report,
  • by, Frank Kramer, Assistant Secretary for International Security Affairs for the Clinton administration
  • and by, Bob Butler, Deputy Assistant Secretary for Space and Cyber in the Obama administration

How would this private sector system work?  the private sector hackser would be deputized  “certified active defenders” to assist…

Regulatory TREND. Anatomy of the Cybersecurity Solarium Commission

The U.S. Cybersecurity Solarium Commission is taking inspiration from the 1950s era commission that studying nuclear strategy.

The 14 member Cybersecurity Solarium Commission will be comprised of:

  • 4 current lawmakers
  • director or deputy director of National Intelligence
  • drector or deputy director of Defense
  • director or deputy director of the FBI
  • director or deputy director of Homeland Security
  • academics
  • industry representatives

Strategies to develop:

Anatomy of a Data Security Bill in North Carolina

The legislation: HB 904 (2019 | NC)

How does it impact businesses: Creates a duty on businesses to maintain reasonable security procedures and practices

Notification time frame: 15 days

Free credit freezes, thaws and monitoring? yes, yes and yes

Consent: Requires consent to access a consumers credit report

NC Attorney General Talking Points on HB 904 

Business TREND. 3 Ways Tech Business Spin Data Privacy/Data Security

  • Facebook
    • The future is private
    • We will make your information private
  • Google
    • What you get in return is more valuale
    • We make it wasier for you to navigate the world, so its all ok
  • Microsoft
    • We can make your elections safer
    • “privacy is a human right”

What do they say to legislators? Trust US

What do they say to consumers? We won’t misues your data, AKA trust us

What are they saying to investors? There won’t be any regulations, trust us, returns will be great still

Fast Company…

Regulatory TREND. Anatomy of an Attorney General Investigation into a Healthcare Data Breach.

What type of healthcare data breach? electronic health information was exposed online 

How did it happen? a misconfigured web setting

What went wrong with notification that caught the Michigan Attorney General’s attention? Patients were receiving notifications addressed to other patients and contacted the Attorney General

Health IT Security | Michigan Attorney General Looking into Inmediata Breach, Mailing Error 

Business TREND. Nonprofit for Campaign CyberSecurity

Who: Defending Digital Campaigns, the nonprofit spinoff of a Harvard cybersecurity project

What: FEC is considering allow campigns to get free cybersecurity help

Why? Elizabeth Warren, Kamala Harris are disclosing funds spent on cybersecurity and the retention of cybersecurity experts

The catch: the nonprofit is founded by Hillary Clinton’s campaign manager

Slate | This Nonprofit Wants to Offer Political Campaigns Free Help With Cybersecurity

Lege TREND. Revisiting How one State Responded to Equifax Breach

State: Massachusetts

Legislation: H 4806 (2018 |MA)

What did Massachusetts enact?

  • consumer consent before any third party can obtain the consumer’s credit report
  • free credit freezes and thaws
  • entieis that have suffered a data breach have enhanced reporting requirements
  • free credit monitoring to affected consumers

Leominster Champion | Governor Signs Bill to Enhance Credit Data Security

 

Local TREND. Addressing Crypto Currency with Local Ordinances

Where: Missoula County, Montana

The County adopted rules for crypto miners that:

  • health & safety. County is “protecting the health, safety, morality and general welfare of the people in the district” by ensuring electricity for local residents
  • use limitation. crypto mining activities only in areas of light and heavy industry
  • waste limitations. provide evidence that all e-waste generated will be processed by a licensed waste management company

The Cryptoo Currency Post | Montana County…

Regulatory TREND.Biometric Security Oversight Commissions. Forward Thinking Procurement Opportunities.

Where: Australia

What group is recommending a Biometric Security Oversight Commission? The Parliamentary Joint Committee on Law Enforcement

In its report  the joint committee found that:

  • need to protect biometric data collected and shared among law enforcement agencies
  • increase IoT security awareness
  • review of biometric and persoinal information security legislation to keep it up to date,
  • consider hybrid storage facilities
  • consider advanced techniques like  artificial intelligence for…