Cybersecurity legislation may go to Congress
One proposal would require public companies to report their cybersecurity efforts
IDG News Service - WASHINGTON -- As the U.S. Congress reconvenes this week after a monthlong break, legislation imposing cybersecurity requirements on private industry, including a proposal that would require public companies to report their cybersecurity efforts, may be on the way.
One proposal being considered would require businesses to fill out a cybersecurity checklist in their filings with the U.S. Securities and Exchange Commission. Rep. Adam Putnam (R-Fla.), chairman of the House Government Reform Committee's Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, will consider introducing such a bill late this year, according to Bob Dix, the subcommittee's staff director.
While antispam legislation will continue to be the major technology focus in Congress this fall, Putnam's subcommittee is looking at the "pluses and minuses" of a cybersecurity reporting requirement, similar to SEC accounting reporting requirements mandated in the Sarbanes-Oxley Act of 2002, Dix said.
Such a law would raise awareness of cybersecurity issues among top-level executives at companies while likely avoiding specific cybersecurity requirements that may not fit all businesses, said Daniel Burton, vice president of government affairs for Addison, Texas-based security vendor Entrust Inc.
"It does not mandate 'You must do x,' which we all realize is a false start," Burton said of an SEC cybersecurity reporting requirement. "Different companies have different security needs and different risks. So it's impossible to set up a mandate for everyone."
Stockholders and boards of directors could then judge for themselves whether a company is adequately dealing with cybersecurity, Burton said. "Everyone from the board level on down is really going to be focused on what [the cybersecurity reports] are saying," he added.
The bill Putnam is considering wouldn't require companies to lay out specifics about their cybersecurity efforts, Dix said. Instead, it could take the form of a checklist, asking such questions as, "Do you have an up-to-date IT assets list?"
If such a bill is introduced, the subcommittee would expect some opposition, Dix said. "My guess is there will be some who say anything that the government proposes is a great burden," he said.
But Congress may feel the need to act on cybersecurity legislation if more viruses or worms are unleashed on the Internet, said Robert Housman, a lawyer in the homeland security practice of the law firm Bracewell & Patterson LLP in Washington. In the past month, the Sobig and Blaster worms infected computers worldwide, causing millions of dollars in damage, and Congress may be compelled to take some action, Housman said.
"There are a number of things that are working together that are going to result in some form of legislation on cybersecurity," Housman said.
In addition to viruses and worms, the number of attacks on company networks continues to climb, Housman said.
"On top of all that, there is a perception, right or wrong, among a lot of the regulators and congressional members I've talked to that not enough is happening on the cyber front, that companies still remain vulnerable," Housman added. "Because of that, there is a growing impetus to legislate or regulate."
Legislation headed toward incentives or reporting requirements may be better received by industry than a list of must-do actions, Housman said. "If we have [another] cyber incident, who knows what will happen?" he said. "I have to think that sooner or later, someone is going to cause fairly significant dislocation/chaos. If that happens, all bets go off."
Housman expects some sort of cybersecurity legislation to receive serious attention in Congress this year. A reporting requirement, like the one Putnam's subcommittee is considering, would hold companies accountable with their cybersecurity efforts, he added. But such a requirement, if it also includes reporting of penetration attempts, could make investors and executives nervous, Housman said.
"If you run a major business ... you're getting attempts to break into your system on a fairly regular basis," Housman said. "When you start having to report those numbers, if that's one of the things [the legislation] does -- wow, that could make some of your shareholders a little queasy."
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Live Webcast How to serve up a Grand Slam with a scalable IT Infrastructure for cloud, big data and advanced analytics Register today to attend this webcast, and see examples of how The U.S. Tennis Association, Wimbledon and U.S. Golf Association are using the...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Live Webcast IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!