Access "Cybersecurity Act of 2009: Power grab, or necessary step?"
This article is part of the May 2009 issue of How automated compliance solutions can help you plan for your next audit
CRITICAL INFRASTRUCTURE SECURITY has been dinged from every direction lately: attacks on the power grid; plans for the Joint Strike fighter jet stolen; hospitals hit by Conficker; testimony before Congress on the shoddy state of affairs and the need for attention and oversight. Yet the one that has civil libertarians and folks on both sides of the aisle concerned the most is the Cybersecurity Act of 2009, a bill proposed by West Virginia Democrat Jay Rockefeller and Maine Republican Olympia Snowe. On its surface, the bill isn't a radical departure from what experts have been asking for all along. The senators want to establish a cybersecurity advisory panel that includes public and private industry representatives, create a national cybersecurity strategy, develop security standards for software used in federal systems, appropriate money for research and development and sponsor educational initiatives around cybersecurity. All well and good until you get to sections 14 and 18 of Senate Bill 773. Provisions in section 18 would give the president the authority... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Changing times for identity management
Identity management technology is adapting to meet enterprise needs. Learn what products can improve security and ease compliance.
-
Know when you need IDS, IPS or both
Cut through the hype and learn the differences and benefits of intrusion detection and prevention systems.
-
Changing times for identity management
-
-
Cybersecurity Act of 2009: Power grab, or necessary step?
The Cybersecurity Act of 2009, also known as S.773, would give the president unprecedented authority over federal and private networks. Experts debate whether it's a power grab, or a signal of the seriousness of threats to critical infrastructure.
-
Ease the compliance burden with automation
Manual compliance processes are error-prone and drain corporate IT resources. Automated tools make a difference if you apply them to a well-organized compliance program.
-
Cybersecurity Act of 2009: Power grab, or necessary step?
-
Columns
-
Service-focused security offers best value to organization
A service-oriented approach is the best way to demonstrate security's value and win support for security initiatives.
-
The Pipe Dream of No More Free Bugs
Security researchers have declared they want vendors to compensate them for their independent search for vulnerabilities.
-
Bruce Schneier and Marcus Ranum Face-Off: Should We Have an Expectation of Online Privacy?
by Marcus J. Ranum, Contributor
Security experts Bruce Schneier and Marcus Ranum debate whether users should have an expectation of online privacy.
-
Service-focused security offers best value to organization
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO