SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
5REASONSTOSUPPORT
THECYBERSECURITYINFORMATIONSHARINGACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
1The Select Committee on Intelligence
passed CISA on March 17 by a strong
bipartisan vote of 14 to 1. Industry welcomes
the Obama administration’s support for two
House-passed bills, which are similar to CISA
and passed with strong bipartisan support
307–116 and 355–63.
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
BI-PARTISAN:
2CISA would create a voluntary program,
strengthening businesses’ protection and
resilience against cyberattacks.
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
VOLUNTARY
3Limited liability, disclosure, and antitrust
provisions would constructively influence
businesses’ decisions to share cyber
threat data and defensive measures more
quickly and frequently.
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
PROTECTIONS:
4CISA would complement the
administration’s cybersecurity executive
order and the new framework.
COMPLEMENTARY
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
5The bill includes appropriate safeguards for
privacy and civil liberties. The bill is designed
to enhance the situational awareness of
companies, thus increasing the security of data
maintained on company networks and systems.
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
PROTECTS
PERSONALINFO:
JOINTHECOALITION
#VOTECISA
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA

Contenu connexe

Tendances

HSB15 - 0xDUDE
HSB15 - 0xDUDEHSB15 - 0xDUDE
HSB15 - 0xDUDESplend
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017SurfWatch Labs
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingCigniti Technologies Ltd
 
QTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographicQTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographicMichelle Belnap
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Kevin Murphy
 
Fisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioFisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioCyberGroup
 
Is your cloud GDPR compliant?
Is your cloud GDPR compliant?Is your cloud GDPR compliant?
Is your cloud GDPR compliant?Jacklin Berry
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentationSreejith Nair
 
Cyber Theft Solutions
Cyber Theft SolutionsCyber Theft Solutions
Cyber Theft Solutionswbesse
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE - ATT&CKcon
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraKapil Mehrotra
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE - ATT&CKcon
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicRobert Stones
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"CloudCamp Chicago
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCapgemini
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Amazon Web Services
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdfSania Baker
 

Tendances (20)

HSB15 - 0xDUDE
HSB15 - 0xDUDEHSB15 - 0xDUDE
HSB15 - 0xDUDE
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
QTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographicQTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographic
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
 
Fisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioFisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.io
 
Is your cloud GDPR compliant?
Is your cloud GDPR compliant?Is your cloud GDPR compliant?
Is your cloud GDPR compliant?
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Cyber Theft Solutions
Cyber Theft SolutionsCyber Theft Solutions
Cyber Theft Solutions
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 

En vedette

STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015Priyanka Aash
 
The Blurring Line Between Digital Marketing and PR
The Blurring Line Between Digital Marketing and PRThe Blurring Line Between Digital Marketing and PR
The Blurring Line Between Digital Marketing and PRThe Hoffman Agency
 
Lessons in Persuasive Language from The Game of Thrones
Lessons in Persuasive Language from The Game of ThronesLessons in Persuasive Language from The Game of Thrones
Lessons in Persuasive Language from The Game of ThronesThe Hoffman Agency
 
Do You Struggle With Employee Recognition?
Do You Struggle With Employee Recognition?Do You Struggle With Employee Recognition?
Do You Struggle With Employee Recognition?Elodie A.
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)Board of Innovation
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsXPLAIN
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideCrispy Presentations
 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)Steven Hoober
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureReferralCandy
 
The History of SEO
The History of SEOThe History of SEO
The History of SEOHubSpot
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into MarketingEd Fry
 
The What If Technique presented by Motivate Design
The What If Technique presented by Motivate DesignThe What If Technique presented by Motivate Design
The What If Technique presented by Motivate DesignMotivate Design
 
10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next PresentationSOAP Presentations
 
Creative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage StartupsCreative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage StartupsTommaso Di Bartolo
 
What Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
What Would Steve Do? 10 Lessons from the World's Most Captivating PresentersWhat Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
What Would Steve Do? 10 Lessons from the World's Most Captivating PresentersHubSpot
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?InterQuest Group
 
Digital Strategy 101
Digital Strategy 101Digital Strategy 101
Digital Strategy 101Bud Caddell
 

En vedette (20)

STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
 
Brexit Webinar Series 5
Brexit Webinar Series 5 Brexit Webinar Series 5
Brexit Webinar Series 5
 
The Blurring Line Between Digital Marketing and PR
The Blurring Line Between Digital Marketing and PRThe Blurring Line Between Digital Marketing and PR
The Blurring Line Between Digital Marketing and PR
 
Lessons in Persuasive Language from The Game of Thrones
Lessons in Persuasive Language from The Game of ThronesLessons in Persuasive Language from The Game of Thrones
Lessons in Persuasive Language from The Game of Thrones
 
Do You Struggle With Employee Recognition?
Do You Struggle With Employee Recognition?Do You Struggle With Employee Recognition?
Do You Struggle With Employee Recognition?
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media Sins
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same Slide
 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From Failure
 
Design Your Career 2018
Design Your Career 2018Design Your Career 2018
Design Your Career 2018
 
The History of SEO
The History of SEOThe History of SEO
The History of SEO
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into Marketing
 
The What If Technique presented by Motivate Design
The What If Technique presented by Motivate DesignThe What If Technique presented by Motivate Design
The What If Technique presented by Motivate Design
 
Displaying Data
Displaying DataDisplaying Data
Displaying Data
 
10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation
 
Creative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage StartupsCreative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage Startups
 
What Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
What Would Steve Do? 10 Lessons from the World's Most Captivating PresentersWhat Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
What Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 
Digital Strategy 101
Digital Strategy 101Digital Strategy 101
Digital Strategy 101
 

Similaire à 5 Reasons to Support Cybersecurity Information Sharing Act (CISA)

Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Small Business Trends
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Cybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideCybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideBenjamin Tugendstein
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationNexon Asia Pacific
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptxDolchandra
 
Cybersecurity Forecast For 2023
Cybersecurity Forecast For 2023Cybersecurity Forecast For 2023
Cybersecurity Forecast For 2023ShivaKumar932052
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
ICBA & Banking Coalition Urge Vote on Cybersecurity Info-Sharing Bill
ICBA & Banking Coalition Urge Vote on Cybersecurity Info-Sharing BillICBA & Banking Coalition Urge Vote on Cybersecurity Info-Sharing Bill
ICBA & Banking Coalition Urge Vote on Cybersecurity Info-Sharing BillDon Baham
 
1212018 SafeAssign Originality Reporthttpswilmu.black.docx
1212018 SafeAssign Originality Reporthttpswilmu.black.docx1212018 SafeAssign Originality Reporthttpswilmu.black.docx
1212018 SafeAssign Originality Reporthttpswilmu.black.docxmoggdede
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conferenceJames Nesbitt
 
Cyber Security Whitepaper 2018 | vTech Solution
Cyber Security Whitepaper 2018 | vTech SolutionCyber Security Whitepaper 2018 | vTech Solution
Cyber Security Whitepaper 2018 | vTech SolutionSimrat Singh
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
HIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanHIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanDavid Sweigert
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 

Similaire à 5 Reasons to Support Cybersecurity Information Sharing Act (CISA) (20)

Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideCybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection Guide
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
 
Cybersecurity Forecast For 2023
Cybersecurity Forecast For 2023Cybersecurity Forecast For 2023
Cybersecurity Forecast For 2023
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
ICBA & Banking Coalition Urge Vote on Cybersecurity Info-Sharing Bill
ICBA & Banking Coalition Urge Vote on Cybersecurity Info-Sharing BillICBA & Banking Coalition Urge Vote on Cybersecurity Info-Sharing Bill
ICBA & Banking Coalition Urge Vote on Cybersecurity Info-Sharing Bill
 
1212018 SafeAssign Originality Reporthttpswilmu.black.docx
1212018 SafeAssign Originality Reporthttpswilmu.black.docx1212018 SafeAssign Originality Reporthttpswilmu.black.docx
1212018 SafeAssign Originality Reporthttpswilmu.black.docx
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
Cyber Security Whitepaper 2018 | vTech Solution
Cyber Security Whitepaper 2018 | vTech SolutionCyber Security Whitepaper 2018 | vTech Solution
Cyber Security Whitepaper 2018 | vTech Solution
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
HIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanHIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response Plan
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 

Plus de U.S. Chamber of Commerce

The threat to small business retirement savings
The threat to small business retirement savingsThe threat to small business retirement savings
The threat to small business retirement savingsU.S. Chamber of Commerce
 
Key vote alert! - Trade Promotion Authority
Key vote alert! - Trade Promotion AuthorityKey vote alert! - Trade Promotion Authority
Key vote alert! - Trade Promotion AuthorityU.S. Chamber of Commerce
 
What Can You Do to Prevent Childhood Obesity?
What Can You Do to Prevent Childhood Obesity?What Can You Do to Prevent Childhood Obesity?
What Can You Do to Prevent Childhood Obesity?U.S. Chamber of Commerce
 
East Meets West: Massachusetts vs Washington
East Meets West: Massachusetts vs WashingtonEast Meets West: Massachusetts vs Washington
East Meets West: Massachusetts vs WashingtonU.S. Chamber of Commerce
 

Plus de U.S. Chamber of Commerce (20)

Brexit Webinar Series 4
Brexit Webinar Series 4Brexit Webinar Series 4
Brexit Webinar Series 4
 
Brexit Webinar Series 3
Brexit Webinar Series 3Brexit Webinar Series 3
Brexit Webinar Series 3
 
Brexit Webinar Series 2
Brexit Webinar Series 2Brexit Webinar Series 2
Brexit Webinar Series 2
 
Brexit Webinar Series 1
Brexit Webinar Series 1Brexit Webinar Series 1
Brexit Webinar Series 1
 
Tell Congress: Ditch WOTUS
Tell Congress: Ditch WOTUSTell Congress: Ditch WOTUS
Tell Congress: Ditch WOTUS
 
ASEAN Business Outlook Survey 2016
ASEAN Business Outlook Survey 2016ASEAN Business Outlook Survey 2016
ASEAN Business Outlook Survey 2016
 
Elementary and Secondary Education Act
Elementary and Secondary Education ActElementary and Secondary Education Act
Elementary and Secondary Education Act
 
The threat to small business retirement savings
The threat to small business retirement savingsThe threat to small business retirement savings
The threat to small business retirement savings
 
Let's Rebuild America
Let's Rebuild AmericaLet's Rebuild America
Let's Rebuild America
 
Key vote alert! - Trade Promotion Authority
Key vote alert! - Trade Promotion AuthorityKey vote alert! - Trade Promotion Authority
Key vote alert! - Trade Promotion Authority
 
What Can You Do to Prevent Childhood Obesity?
What Can You Do to Prevent Childhood Obesity?What Can You Do to Prevent Childhood Obesity?
What Can You Do to Prevent Childhood Obesity?
 
Innovation that Matters
Innovation that MattersInnovation that Matters
Innovation that Matters
 
Where's the accountability?
Where's the accountability?Where's the accountability?
Where's the accountability?
 
Youth Employment
Youth EmploymentYouth Employment
Youth Employment
 
A Brief History of Keystone XL
A Brief History of Keystone XLA Brief History of Keystone XL
A Brief History of Keystone XL
 
Behind the Red Tape
Behind the Red TapeBehind the Red Tape
Behind the Red Tape
 
5 Steps to Get Our Rules Right
5 Steps to Get Our Rules Right5 Steps to Get Our Rules Right
5 Steps to Get Our Rules Right
 
East Meets West: Massachusetts vs Washington
East Meets West: Massachusetts vs WashingtonEast Meets West: Massachusetts vs Washington
East Meets West: Massachusetts vs Washington
 
America's Offshore Resources
America's Offshore ResourcesAmerica's Offshore Resources
America's Offshore Resources
 
America's New Energy Abundance
America's New Energy AbundanceAmerica's New Energy Abundance
America's New Energy Abundance
 

Dernier

If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfKatrina Sriranpong
 
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdfCristal Montañéz
 
PPT Item # 7 - Demolition & Replacement Structure Processes
PPT Item # 7 - Demolition & Replacement Structure ProcessesPPT Item # 7 - Demolition & Replacement Structure Processes
PPT Item # 7 - Demolition & Replacement Structure Processesahcitycouncil
 
23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programme23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programmeChristina Parmionova
 
ISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, IndiaISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, IndiaTrinity Care Foundation
 
2024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 242024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 24JSchaus & Associates
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Christina Parmionova
 
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.Cristal Montañéz
 
Item # 4&5 - 415 & 423 Evans Ave. Replat
Item # 4&5 - 415 & 423 Evans Ave. ReplatItem # 4&5 - 415 & 423 Evans Ave. Replat
Item # 4&5 - 415 & 423 Evans Ave. Replatahcitycouncil
 
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...Christina Parmionova
 
Canadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfCanadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfAndrew Griffith
 
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...Energy for One World
 
UN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportUN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportEnergy for One World
 
Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...
Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...
Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...Amil baba
 
Build Tomorrow’s India Today By Making Charity For Poor Students
Build Tomorrow’s India Today By Making Charity For Poor StudentsBuild Tomorrow’s India Today By Making Charity For Poor Students
Build Tomorrow’s India Today By Making Charity For Poor StudentsSERUDS INDIA
 
PPT Item # 6 - TBG Partners Landscape Architectural Design Services.pdf
PPT Item # 6 - TBG Partners Landscape Architectural Design Services.pdfPPT Item # 6 - TBG Partners Landscape Architectural Design Services.pdf
PPT Item # 6 - TBG Partners Landscape Architectural Design Services.pdfahcitycouncil
 
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.Christina Parmionova
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxjennysansano2
 
2024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 232024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 23JSchaus & Associates
 

Dernier (20)

If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
 
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf
1- Phase 8 Hope For Venezuelan Refugees Soup Program-Periods 4-6.pdf
 
PPT Item # 7 - Demolition & Replacement Structure Processes
PPT Item # 7 - Demolition & Replacement Structure ProcessesPPT Item # 7 - Demolition & Replacement Structure Processes
PPT Item # 7 - Demolition & Replacement Structure Processes
 
23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programme23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programme
 
ISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, IndiaISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, India
 
2024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 242024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 24
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.
 
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.
Phase 8 Hope For Venezuelan Refugees Soup Meal Program-Periods 4-6.
 
Item # 4&5 - 415 & 423 Evans Ave. Replat
Item # 4&5 - 415 & 423 Evans Ave. ReplatItem # 4&5 - 415 & 423 Evans Ave. Replat
Item # 4&5 - 415 & 423 Evans Ave. Replat
 
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...
 
Canadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfCanadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdf
 
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
 
UN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportUN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 Report
 
Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...
Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...
Uk-NO1 Black magic Specialist Expert in Uk Usa Uae London Canada England Amer...
 
Build Tomorrow’s India Today By Making Charity For Poor Students
Build Tomorrow’s India Today By Making Charity For Poor StudentsBuild Tomorrow’s India Today By Making Charity For Poor Students
Build Tomorrow’s India Today By Making Charity For Poor Students
 
PPT Item # 6 - TBG Partners Landscape Architectural Design Services.pdf
PPT Item # 6 - TBG Partners Landscape Architectural Design Services.pdfPPT Item # 6 - TBG Partners Landscape Architectural Design Services.pdf
PPT Item # 6 - TBG Partners Landscape Architectural Design Services.pdf
 
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
 
Housing For All - Fair Housing Choice Report
Housing For All - Fair Housing Choice ReportHousing For All - Fair Housing Choice Report
Housing For All - Fair Housing Choice Report
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptx
 
2024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 232024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 23
 

5 Reasons to Support Cybersecurity Information Sharing Act (CISA)

  • 2. 1The Select Committee on Intelligence passed CISA on March 17 by a strong bipartisan vote of 14 to 1. Industry welcomes the Obama administration’s support for two House-passed bills, which are similar to CISA and passed with strong bipartisan support 307–116 and 355–63. WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA BI-PARTISAN:
  • 3. 2CISA would create a voluntary program, strengthening businesses’ protection and resilience against cyberattacks. WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA VOLUNTARY
  • 4. 3Limited liability, disclosure, and antitrust provisions would constructively influence businesses’ decisions to share cyber threat data and defensive measures more quickly and frequently. WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA PROTECTIONS:
  • 5. 4CISA would complement the administration’s cybersecurity executive order and the new framework. COMPLEMENTARY WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 6. 5The bill includes appropriate safeguards for privacy and civil liberties. The bill is designed to enhance the situational awareness of companies, thus increasing the security of data maintained on company networks and systems. WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA PROTECTS PERSONALINFO: