PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
May 2009

Cybersecurity Act of 2009: Power grab, or necessary step?

CRITICAL INFRASTRUCTURE SECURITY has been dinged from every direction lately: attacks on the power grid; plans for the Joint Strike fighter jet stolen; hospitals hit by Conficker; testimony before Congress on the shoddy state of affairs and the need for attention and oversight. Yet the one that has civil libertarians and folks on both sides of the aisle concerned the most is the Cybersecurity Act of 2009, a bill proposed by West Virginia Democrat Jay Rockefeller and Maine Republican Olympia Snowe. On its surface, the bill isn't a radical departure from what experts have been asking for all along. The senators want to establish a cybersecurity advisory panel that includes public and private industry representatives, create a national cybersecurity strategy, develop security standards for software used in federal systems, appropriate money for research and development and sponsor educational initiatives around cybersecurity. All well and good until you get to sections 14 and 18 of Senate Bill 773. Provisions in section 18 would ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Ease the compliance burden with automation

    Manual compliance processes are error-prone and drain corporate IT resources. Automated tools make a difference if you apply them to a well-organized compliance program.

Columns in this issue