Busted US cybersecurity act gets new legs

Powered by SC Magazine
 

Obama tries again.

The Obama administration hopes to issue a cyber security executive order similar to the Cybersecurity Act of 2012 which was killed by the US Senate.

Techdirt.com published what it described as a leaked draft of the White House's 19-page executive order, which outlines the security objectives proposed for critical infrastructure protection.

According to the draft, the order calls for a revised federal architecture to “enhance the protection and resilience of critical infrastructure,” as well as an “information exchange framework,” in hopes to enable collaboration between the private industry and the government.

In addition, the proposed order gives the U.S. Department of Homeland Security (DHS) oversight regarding the implementation of the recommended changes.

The executive order would be similar to the White-house backed Cybersecurity Act of 2012 that was struck down by Senate Republicans.

The largely Democrat-supported bill would have incentivised companies that operate critical infrastructure to meet a series of security best practices as part of a voluntary program.

Critics of the bill were primarily concerned with its shortcomings in addressing privacy issues, but the legislation was re-introduced to include privacy concessions and rid the enforcement oversight it originally gave to the DHS.

A letter released on Friday written by John Brennan, national security adviser to the president, written to Sen. Jay Rockefeller, chairman of the Senate Commerce Committee, confirms that the White House is working on the order.

“Following congressional inaction, the president is determined to use existing executive branch authorities to protect our nation against cyber threats,” Brennan wrote.

In a recent sponsored Washington Post editorial, Senators John McCain, Kay Bailey Hutchinson, and Saxby Chambliss blasted the idea of an executive order.

“Unilateral action in the form of government mandates on the private sector creates an adversarial relationship instead of a cooperative one,” the senators wrote.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Busted US cybersecurity act gets new legs
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 743

Vote