recommended reading

Commerce aide: Cybersecurity bill moving

Legislation to help the government and private sector better prepare for and respond to high-tech attacks against communications infrastructure has a shot at Senate passage this year despite the crowded calendar and potential turf wars, a top Senate aide said today.

"Between health care, climate change and a number of huge issues of the day, it can't be lost that this is a critically important issue," said Senate Commerce Committee General Counsel Bruce Andrews at a briefing sponsored by Hewlett-Packard. "We've got to focus and do it."

Senate Commerce Chairman John (Jay) Rockefeller and Sen. Olympia Snowe, R-Maine, introduced a broad cybersecurity bill in April, but it underwent major changes during the August recess and is being fine-tuned.

Andrews said Senate Homeland Security and Governmental Affairs Committee leaders have been crafting proposals as Rockefeller and Snowe have focused on the healthcare debate. The issue requires "real cooperation" among committees, he said.

An August e-mail from Andrews to outside groups said the Commerce Committee was aiming for a hearing and a markup in September or October. Some industry players were told last month that the panel hoped to circulate a fresh draft and vote on the bill before the end of October. But Andrews said today he did not want to set arbitrary deadlines, adding that Rockefeller had instructed him to "move it when we get it right."

Homeland Security and Governmental Affairs ranking member Susan Collins will soon unveil a measure that would give the Homeland Security Department, rather than a White House czar, primary authority to protect federal civilian and private computer networks. Homeland Security and Governmental Affairs Chairman Joseph Lieberman plans to outline his bill at a Chamber of Commerce speech Oct. 30, but he and Collins will likely work out a compromise.

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.