Executive order may revive critical infrastructure bill

Powered by SC Magazine
 

Obama may use an executive order to push its downed information security bill.

The White House is considering reviving a downed information security bill for critical infrastructure through an executive order, according to a report.

President Obama may issue an executive order that could require critical infrastructure operators to meet certain standards around network protection, as specified by the federal agencies that regulate these industries, according to a Saturday report in The Hill.

The bill was blocked by Senate republicans last week.

White House press secretary Jay Charney told the newspaper that the Obama administration "is determined to do absolutely everything we can to better protect our nation against today's cyber threats and we will do that."

The White House released sweeping security proposals in 2011.

One piece of the failed bill, known as the Cybersecurity Act of 2012, that may not be able to make it into an executive order involves making information sharing easier among the private sector and government, according to the report.

On Thursday, the proposal failed to secure the necessary votes needed to bring it to a full Senate vote.

The largely Democrat-supported measure would have incentivized those companies that operate critical infrastructure to meet a series of security best practices, as part of a voluntary program.

The bill was re-introduced last month to include privacy concessions and rid the enforcement oversight it originally gave to the US Department of Homeland Security.

The bill was opposed by leading business trade groups, many Senate Republicans and some Democrats, who sought further privacy protections.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Executive order may revive critical infrastructure bill
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1019

Vote