Threats to our nation's cybersecurity are real and growing. Just like individuals, private companies and the marketplace are vulnerable to cybercrime. Tougher laws, smarter regulations, and improved information sharing will help protect U.S. national security and economic interests, but there is no single, simple solution that can make the problem go away. These threats are real, and in many respects, they represent the new front line in protecting America.
Legislating cybersecurity policies is not an easy task. A fine line runs between beneficial public/private information sharing and causing irreparable harm to vital U.S. commercial interests. The CEO members of the Business Roundtable, leaders of companies that are often the targets of cybercrime, believe that the Cyber Intelligence Sharing and Protection Act, known as CISPA, creates a framework for sharing of cybersecurity information between the government and the private sector in a manner that is effective but not overly intrusive.
For example, the legislation authorizes the Director of National Intelligence to implement collaborative, real-time information sharing capabilities between the public and private sectors. The Business Roundtable believes this approach could lead to the integration of the full resources of the U.S. government, including defense, intelligence, homeland security, diplomatic, economic, and trade assets. At the same time, the legislation provides essential protections from disclosure of sensitive corporate information.
The solutions embodied in CISPA also address many of the information-sharing challenges that the Business Roundtable has identified in its recent policy paper, "Mission Critical: A Public-Private Strategy for Effective Cybersecurity." The paper presents a strategy to protect U.S. economic and national security from growing global cybersecurity threats through modern, flexible and collaborative approaches to protecting America's strategic information assets.
By avoiding a top-down, bureaucratic, check-the-box approach to cybersecurity that cannot respond effectively to either the rapidly evolving threat environment or the reality of privately owned and operated information assets, CISPA represents the best, most flexible, and effective approach to developing a more robust and responsive cybersecurity infrastructure.
The Business Roundtable, an association of chief executive officers of leading U.S. companies with over
- Taking a Break from Emails Decreases Stress
- New Facebook Effort Targets Educating School Counselors
- Verizon's High-Speed Internet Collusion
- RapidShare: Megaupload File-Sharing Pirates Are Unwelcome
- Twitter Cuts Two Ways
- China's Cyber 'Predators' Must Be Stopped
- CISPA Lacks Protections for Individual Rights
- CISPA Not the Right Way to Achieve Cybersecurity
- CISPA Effectively Addresses Threat of Cybercrime
- Dawn of the Phablet
- Price-Fixing Suit Could be a Spot on Apple
- Avoiding Fragmented Infrastructure in the Data Center
- Internet Service Providers Close to Implementing System to Punish Piracy
- Inside the Silicon Valley Gender Gap
- Why the FCC Fined Google Just 68 Seconds in Profits
- Is There an Internet Off Switch?
- Power of the iMob
- Widespread Android Virus Could Hide in Popular App Updates
- Under the Hood: A Look Inside the Ultrabook
- That's Entertainment: 3D Leaps From Theater to Home
- Are You a Tech Geek?
- Is Your Office Preparing For an iPad Insurgency?
- How to Find Happiness on Social Networks
- The Pirate Bay to Fly 'Server Drones' to Avoid Law Enforcement
- DevOps: Indispensable Approach or Costly Distraction?
- New Programming Languages to Watch
- How to Conquer Tech Buyer's Remorse
- Trade in Your Old Gadgets for Cash or Credit
- Why the New iPad Features Don't Really Matter
- Chinese Computer Games
- Why Do We Need Intelligent Desktop Virtualization?
- Lawsuit Says Facebook Tracks Users After Logging Out
- Facebook and Twitter Cause Insider Trading Headaches for the SEC
- Avoid Social Media MBAs, Some Students Say
- 5 iPhone Apps I Cannot Live Without
- The New Mobile Landscape
- Is Free Public Wi-Fi Safe?
- Keep Your Data Safe When Telecommuting
- Security Issues for Multicore Processors
- How to Reduce Smartphone Security Risks
- Are You Too Snarky Online?
- Who's Gawking at Your Photos?
- Is Social Media a Waste of Time?
- 5 New Ways to Feed Your Online Addiction
- Investors Increasingly Tap Social Media for Stock Tips
- McAfee's Edward Metcalf Shares Hybrid Rootkit-thwarting Strategy
- A Game Plan for Protecting Stored Data
- Think Big When It Comes to Data Breaches
- Information Security MBA's Teach Business Side of Cybersecurity
- Apple Predicts 'Death of the Big Backpack' with New iPad Textbooks
- FBI Wants to Monitor Social Media for 'Emerging Threats'
- Youth on the Web: Reason? Who Needs a Reason
- Google Unveils 'Find My Face' Recognition Tool
- Why Investors Should Keep Their Eyes on the Cloud
- 10 Ways to Stay Safe While Shopping Online
- Take Advantage of Free Shipping Deals This Holiday Season
- Online Shopping Deals Hurt State Budgets
- Tips for Shopping With Your Smartphone
- Seven Rules of Successful Bloggers
- Twitter Redesigns Site, Aims for Simplicity
- 3 Ways to Use Foursquare to Connect With Your College
- United States Reacts to Indian Government's Efforts to Censure Online Content
- Will Apple Be the Same Without Steve Jobs?
- Steve Jobs: 6 Secrets of Success
- Open Clouds
- The Cloud: A Security Solution for Small Business
- 4 Twitter Tips for Business Success
- Twitter: How to Tweet to Get Results
- 3 Sneaky New Online Scams to Avoid
(c) 2012 U.S. News & World Report