Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cyber Tactics ColumnCybersecurity News

What Has Been Accomplished on Cyber Legislation?

In response to the growing cyber threat, Congress has been busy drafting legislation.

By Steven Chabinsky
October 1, 2013

In response to the growing cyber threat, Congress has been busy drafting legislation.  Last year alone our representatives introduced more than 40 bills and resolutions with provisions relating to cyber security. In both the House and the Senate, and across party lines, members and their staff are educated, engaged, concerned and active. Change is in the air. Unfortunately, that is as far as it has gotten. Despite the growing threat, it has been over a decade since Congress sent a major cyber bill to the President. What follows are the most significant areas under consideration. 

 

FISMA Reform

In 2002, Congress placed federal executive agencies under the requirements of the Federal Information Security Management Act. Under FISMA’s compliance-based standards, federal agencies spend $15 billion annually on IT security. Yet, according to the Government Accountability Office, most federal agencies remain unable to track their cyber security goals and objectives. In response, the House recently passed the Federal Information Security Amendments Act of 2013 and sent it along to the Senate. Among other things, the bill would require federal agencies to conduct vulnerability assessments and penetration tests; and to use automated, continuous monitoring when possible to “detect, report, respond to, contain and mitigate incidents.” Although these added requirements would cost agencies a total of $150 million a year, no new funds are authorized.

 

Critical Infrastructure Protection

There is a longstanding debate about whether critical infrastructure security should be voluntary or mandatory. Earlier this year, President Obama issued an Executive Order directing the National Institute of Standards and Technology to develop a framework for these companies to voluntarily adopt. Step one is to gain adoption through government incentives. Should that approach fail, the Order gives the nod to regulatory agencies to consider appropriate mandates. The Senate’s recently introduced Cybersecurity Act of 2013, if passed into law, would codify only the voluntary aspects of that approach. This marks a significant departure from last year’s proposed Cybersecurity Act, which focused on developing mandatory risk-based cyber security performance requirements.

 

Information Sharing

The most extensive information sharing bill is CISPA, the Cyber Intelligence Sharing & Protection Act. This bi-partisan bill passed House vote in 2012 and 2013, but the Senate has refused to take it up, stating that it lacks sufficient privacy protections. Although the latest bill includes 11 substantive amendments aimed at allaying these concerns, it continues to lack support from the Senate, the White House and the civil liberties and privacy community. As it currently stands, the bill seeks to encourage greater information sharing from the private sector to the government, with appropriate limits on the receipt, retention, use and disclosure of cyber threat information associated with specific persons. The bill would provide criminal and civil immunity for certain private sector security efforts, and also would promote better sharing by the U.S. intelligence community.

 

Data Breach Notification

It has been 10 years since the State of California passed the country’s first data breach notification law. Since that time, nearly every state has followed, leading to a patchwork of varying obligations for notifying individuals and the government about the actual and potential loss of personally identifiable information.  Congress has focused on this problem in the past, seeking to create a single data breach notification statute to serve as the harmonized law of the land. However, disagreements have flared not only over the issue of States’ rights, but also as to which State law serves as the best model.

 

Private Sector Countermeasures

The private sector has the resources, capabilities, reach and speed to engage more directly in support of the government’s traditional roles to detect, attribute and respond to cyber threat actors. Clear legal authorities, however, remain lacking. Last year, the Senate’s Cybersecurity Act introduced a provision that would allow a private sector entity to operate, or approve the operation of, “countermeasures” in which the good guys modify, redirect or block information. A number of groups thought the bill was too vague as to what actual countermeasures would be allowed or prohibited, and for now the dialogue continues.

 

Research and Development

This year, the House also passed the Cybersecurity Enhancement Act, which would require additional research into access control management, systems assurance, industrial control systems security, and supply chain management.  Meanwhile, the Senate’s Cybersecurity Act of 2013 would require a federal R&D plan that, among other things, seeks to establish new Internet protocols that stress security and include the ability to determine the origin of messages transmitted over the Internet.  The Senate bill also would seek new ways to guarantee individual privacy; verify third-party software and hardware; address insider threats; and better secure cloud computing storage and wireless transmissions.

 

Moving Ahead

Additional areas of legislative focus include government procurement, workforce development, promoting international norms and fostering public/private collaboration. Still, in terms of a first priority, perhaps what we really need is for NIST to issue Best Practices for Congress and the President to Pass a Cyber Law. Just a closing thought.  

 

About the Columnist: 

 Steven Chabinsky is General Counsel and Chief Risk Officer for cybersecurity technology innovator CrowdStrike, which provides incident response services, cyber intelligence feeds, and a next generation intrusion detection, attribution, and prevention platform. He previously served as Deputy Assistant Director of the FBI’s Cyber Division. 

KEYWORDS: cyber security cyber security legislation International cyber security security compliance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chabinsky 2016 200px

Steven Chabinsky is global chair of the Data, Privacy, and Cyber Security practice at White & Case LLP, an international law firm. He previously served as a member of the President’s Commission on Enhancing National Cybersecurity, the General Counsel and Chief Risk Officer of CrowdStrike, and Deputy Assistant Director of the FBI Cyber Division. He can be reached at chabinsky@whitecase.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber Insurance: What Are You Missing?

    Cyber Insurance: What Are You Missing?

    See More
  • What Does the Future of Cyber Crime Hold for You?

    See More
  • Been Hacked? Let That Be a Lesson to You

    Been Hacked? Let That Be a Lesson to You

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing