Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cyber Tactics ColumnCybersecurity News

What Has Been Accomplished on Cyber Legislation?

In response to the growing cyber threat, Congress has been busy drafting legislation.

By Steven Chabinsky
October 1, 2013

In response to the growing cyber threat, Congress has been busy drafting legislation.  Last year alone our representatives introduced more than 40 bills and resolutions with provisions relating to cyber security. In both the House and the Senate, and across party lines, members and their staff are educated, engaged, concerned and active. Change is in the air. Unfortunately, that is as far as it has gotten. Despite the growing threat, it has been over a decade since Congress sent a major cyber bill to the President. What follows are the most significant areas under consideration. 

 

FISMA Reform

In 2002, Congress placed federal executive agencies under the requirements of the Federal Information Security Management Act. Under FISMA’s compliance-based standards, federal agencies spend $15 billion annually on IT security. Yet, according to the Government Accountability Office, most federal agencies remain unable to track their cyber security goals and objectives. In response, the House recently passed the Federal Information Security Amendments Act of 2013 and sent it along to the Senate. Among other things, the bill would require federal agencies to conduct vulnerability assessments and penetration tests; and to use automated, continuous monitoring when possible to “detect, report, respond to, contain and mitigate incidents.” Although these added requirements would cost agencies a total of $150 million a year, no new funds are authorized.

 

Critical Infrastructure Protection

There is a longstanding debate about whether critical infrastructure security should be voluntary or mandatory. Earlier this year, President Obama issued an Executive Order directing the National Institute of Standards and Technology to develop a framework for these companies to voluntarily adopt. Step one is to gain adoption through government incentives. Should that approach fail, the Order gives the nod to regulatory agencies to consider appropriate mandates. The Senate’s recently introduced Cybersecurity Act of 2013, if passed into law, would codify only the voluntary aspects of that approach. This marks a significant departure from last year’s proposed Cybersecurity Act, which focused on developing mandatory risk-based cyber security performance requirements.

 

Information Sharing

The most extensive information sharing bill is CISPA, the Cyber Intelligence Sharing & Protection Act. This bi-partisan bill passed House vote in 2012 and 2013, but the Senate has refused to take it up, stating that it lacks sufficient privacy protections. Although the latest bill includes 11 substantive amendments aimed at allaying these concerns, it continues to lack support from the Senate, the White House and the civil liberties and privacy community. As it currently stands, the bill seeks to encourage greater information sharing from the private sector to the government, with appropriate limits on the receipt, retention, use and disclosure of cyber threat information associated with specific persons. The bill would provide criminal and civil immunity for certain private sector security efforts, and also would promote better sharing by the U.S. intelligence community.

 

Data Breach Notification

It has been 10 years since the State of California passed the country’s first data breach notification law. Since that time, nearly every state has followed, leading to a patchwork of varying obligations for notifying individuals and the government about the actual and potential loss of personally identifiable information.  Congress has focused on this problem in the past, seeking to create a single data breach notification statute to serve as the harmonized law of the land. However, disagreements have flared not only over the issue of States’ rights, but also as to which State law serves as the best model.

 

Private Sector Countermeasures

The private sector has the resources, capabilities, reach and speed to engage more directly in support of the government’s traditional roles to detect, attribute and respond to cyber threat actors. Clear legal authorities, however, remain lacking. Last year, the Senate’s Cybersecurity Act introduced a provision that would allow a private sector entity to operate, or approve the operation of, “countermeasures” in which the good guys modify, redirect or block information. A number of groups thought the bill was too vague as to what actual countermeasures would be allowed or prohibited, and for now the dialogue continues.

 

Research and Development

This year, the House also passed the Cybersecurity Enhancement Act, which would require additional research into access control management, systems assurance, industrial control systems security, and supply chain management.  Meanwhile, the Senate’s Cybersecurity Act of 2013 would require a federal R&D plan that, among other things, seeks to establish new Internet protocols that stress security and include the ability to determine the origin of messages transmitted over the Internet.  The Senate bill also would seek new ways to guarantee individual privacy; verify third-party software and hardware; address insider threats; and better secure cloud computing storage and wireless transmissions.

 

Moving Ahead

Additional areas of legislative focus include government procurement, workforce development, promoting international norms and fostering public/private collaboration. Still, in terms of a first priority, perhaps what we really need is for NIST to issue Best Practices for Congress and the President to Pass a Cyber Law. Just a closing thought.  

 

About the Columnist: 

 Steven Chabinsky is General Counsel and Chief Risk Officer for cybersecurity technology innovator CrowdStrike, which provides incident response services, cyber intelligence feeds, and a next generation intrusion detection, attribution, and prevention platform. He previously served as Deputy Assistant Director of the FBI’s Cyber Division. 

KEYWORDS: cyber security cyber security legislation International cyber security security compliance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chabinsky 2016 200px

Steven Chabinsky is global chair of the Data, Privacy, and Cyber Security practice at White & Case LLP, an international law firm. He previously served as a member of the President’s Commission on Enhancing National Cybersecurity, the General Counsel and Chief Risk Officer of CrowdStrike, and Deputy Assistant Director of the FBI Cyber Division. He can be reached at chabinsky@whitecase.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Cyber Insurance: What Are You Missing?

    Cyber Insurance: What Are You Missing?

    See More
  • What Does the Future of Cyber Crime Hold for You?

    See More
  • Been Hacked? Let That Be a Lesson to You

    Been Hacked? Let That Be a Lesson to You

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing