Interconnectivity And Information Sharing: Cause As Well As Cure for Cyber Attacks?

King & Spalding
Contact

The modern day interconnected business creates a number of opportunities, but also brings with it massive issues relating to breach of privacy and data security in the form of cyber attacks, which cost companies and taxpayers billions of dollars each year. Over the years, Congress has passed a number of cyber security regulations that are industry specific (e.g. the Gramm-Leach-Bliley Act, the Health Insurance Portability and Accountability Act, and the Fair Credit Reporting Act); however it has not been able to curb the ever increasing number of cyber attacks on businesses in the US. There is an ongoing debate about whether interconnectivity and information sharing which stimulates cyber attacks, can also be used as a prevention tool — almost like a vaccine.

The National Institute of Standards and Technology (“NIST”) has recently come out with its draft guidelines on Cyber Threat Information Sharing and has recommended various steps that organizations and businesses can take to avert cyber attacks by adopting defensive cyber-operations and incident response activities and introducing effective information sharing practices. NIST has invited public comments in response to its draft guidelines, which are due by November 28, 2014.

Some of these recommended tools include:

  1. Inventory listing of the cyber security information currently used and the information the organization is capable of producing.
  2. Formal exchange of threat intelligence, tools and techniques with partners.
  3. Open standard data formats and transport protocols.
  4. Augmentation of local data collection, analysis and management functions using information from external sources.
  5. Adaptive cybersecurity that addresses the full cyber attack life cycle.
  6. Continuous and ongoing information sharing in the community.
  7. Ongoing awareness of information security, vulnerabilities and threats regarding sensitive information.
  8. Clear roles and responsibilities within the organization regarding the cyber security plan.

A complete copy of the draft guidelines is available here.

Reporter, Samira Hariramasamy, Silicon Valley, +1 650 422 6817, shariramasamy@kslaw.com.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© King & Spalding | Attorney Advertising

Written by:

King & Spalding
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

King & Spalding on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide