Cybersecurity & Tech
California’s SB 823 (2018) requires:
4 States currently allow for free credit freezes and freeze lifts:
The states looking to add net nuetrality requirements: North Carolina, Illinois, California, New York, Massachusetts, Nebraska, Rhode Island and Washington
4 policy goals of net nuetrality:
Is there state authority to act? There is no statutory preemption & a 2016 case against the FCC stood for no FCC preemption
Bipartisan? Yes. Republicans argue for the need to level the playing field for small businesses
New York Times | States Push Back After Net Neutrality Repeal
The new federal legislation, The Data Breach Prevention and Compensation Act, would:
Gizmodo | New ‘Cybersecurity Office’ Would Oversee Companies Like Equifax and Dole Out Fines for Slipshod Security
The state Attorney General and a State Representative are promoting an forthcoming North Carolina bill, the Act to Strengthen Identity Theft Protections.
Here’s what the bill will do:
Alabama’s Governor successfully pushed for a cybersecurity & engineering magnet school.
The school’s official name: Alabama School of Cyber-Technology and Engineering
Number of students: 300
Grades in the School of Cuber Technology & Engineering: grades 7-12
AL.com | New cyber, engineering magnet school coming to Huntsville
The 4 Issues the group wants covered by federal data breach legislation:
The group supporting federal data security legislation:
ACT | The App Association
American Bankers Association
American Insurance Association
American Land Title Association
BSA | The Software Alliance
Consumer Bankers Association
Credit Union National Association CTIA
Electronic Transactions Association
Financial Services Roundtable
Independent Community Bankers of America
Independent Insurance Agents and Brokers of America
Internet Commerce Coalition
National Association of Federally-Insured Credit Unions
National Association of Mutual Insurance Companies
National Business Coalition on E-Commerce & Privacy
Property Casualty Insurers Association of America
Reinsurance Association of America
Retail Industry Leaders Association
TechNet
Twenty-First Century Privacy Coalition
USTelecom
South Carolina Attorney General clarifies- financial info yes, but not security information
South Carolina Attorney General says that the South Carolina election commission can withhold from disclosure cybersecurity information.
Can related information about election cybser security be released thbrough open records?
Yes, South Carolina election commission will release financial information about cybersecurity products & services purchased
Michigan considered a bill to protect election cybersecurity information
HB 4973 (2017) excepts from disclosure information that addresses:
AND CYBERSECURITY PLANS, ASSESSMENTS, OR VULNERABILITIES
State Scoop | South Carolina election commission permitted to withhold cybersecurity documents
Mississippi is considering statewide standards for data that will:
What prompted this legislative action by Mississippi?
Maryland HB 974 (2017)
Delaware HB 180 (2017)
Health IT Security | 2017 Updated State Data Breach Laws Account for Medical Information
A UK court found that an employer, that had taken appropriate measures to prevent a data breach, can be held vicariously liable for a data breach when an employee:
Bonjour U.S. State Legislators- daat security liability issues should be in your radar.
Lexology | Employer held vicariously liable for employee’s deliberate data breach
WM Morrison’s Supermarket PLC | England and Wales High Court (Queen’s Bench Division) Decisions
New York’s new rules on credit reporting agencies will do these 4 things:
The tagline from state leaders: consumers should not be penalized for having their data breached
Boston 25 News | Citing Equifax data breach, one state cracks down on credit-reporting agencies
What standards did Los Angeles use in crafting its Cyber Center? Federal Government and industry Standards
The key to the city Cyber Center? integrated strategic operations center
What does the integrated strategic operations center do?
How does this help unify cyber protections in Los Angeles? Prior to the cyber center the city’s IT office, the Water and Power Department, the Port of Los Angeles and Los Angeles International Airport did not communicate regularly on cybersecurity. Now each is on the same page.
Are other cities taking note? Yes, Chicago, Las Vegas and New York have visited to learn more
NEXTGOV | LA Cyber Center Hopes to be a Model for Cities Nationwide
The FCC overturns net neutrality rules and Attorneys General of New York and Washington announce their lawsuit raising these 3 concerns:
The Attorney General of Washington State notes that he is 5-0 in his lawsuits against the Trump administration.
The Hill | Washington AG to sue over net neutrality repeal
Health Data Management | HIT Think 6 data security trends to expect in the New Year
Progressive Market’s analysis lists 3 drivers for an increased demand in cyber insurace/data security insurance including:
Digital Journal | Cyber Insurance Industry Will Be the Next Big Thing in 2018
Refreshing our recollection:
OHIO is considering SB 220 that ties the NIST standards to liability limitation. Yes, tort reform meets data security.
Input on Draft Standards:
Feedback and comments should be directed to cyberframework@nist.gov(link sends e-mail) by January 19th, 2018.
3 Goals of the draft standards is to align the needs of :
Flexible Standards
The standards should eveolve as technology evolves
New buzz words are emerging in dagta security policy like: Cyber attack lifecycle
NIST | Cybersecurity Framework Draft Version 1.1
A new report by the Center for Connected Medicine found that data security leads th eminds of health care businesses:
Would health care providers pay cybercriminals?
Healthcare Dive | Cybersecurity tops list of IT investments for 2018
In a repsonse to cybersecurity challenges to rail, H.R. 4474 was filed that requires:
Missouri will be considering SB582 (2018) about student data breach notification.
SB582 requires notification of a student data breach to 3 parties:
U.S. Senator Bill Nelson’s S.2179 would trigger criminal charges if:
The criminal charge comes with up to 5 years in prison and/or a fine.
Who is making a request that medical device makers disclose component parts? House Committee on Energy and Commerce
On what agency are these policymakers making a request? Department of Health and Human Services
What is Department of Health and Human Services being asked to do?
Vermont Governor Phil Scott named these new members to his Cybersecurity Team:
4 Goals of the Cybersecurity Team:
WAMC | Vermont Governor Names New Members To Cybersecurity Team
The transportation system: Sacramento Regional Transit
The hack: destroyed internal systems data, but no data was stolen. It was a ransomware hack with a 1 bitcoin ransom
The recovered data: 80% via backup data
Impact on transportation systems: Train and bus service was not affected
Governing | Hackers Attack Transit System in California’s Capital
State with a new home health care worker registry: Massachusetts
Supporters say: Consumer protection
Opponents say: A worker database contradicts the state’s data security stance& jeopardizes worker safety
Mass Live | Gov. Charlie Baker signs law creating home care worker registry
The State joining the post-Equifax hack legislative trend: Rhode Island
The proponent: The Rhode Island Attorney General
The legislation would:
WPRI | RI Attorney General files legislation on security freezes following Equifax data breach
The Business: Cascade Investment, which is owned by Microsoft’s Bill Gates
The smart city: Belmont, a planned community in Arizona
The smart features:
CNN | Bill Gates invests $80 million to build Arizona smart city
State: Colorado
What is risk limiting audit for elections?
How do risk limiting audits combat election hacking?
What other states are adopting similar protocols? New Mexico & Rhode Island
Was legislation involved? Yes
Governing | Colorado implements Risk-Limiting Audit process to verify election results
Health Data breach suit, CareFirst, is heading to the US Supreme Court, and setting up the standards for what injuries are necessary for a data security claim.
The Appellate Court found that “that CareFirst failed to properly secure their data and thereby subjected them to a substantial risk of identity theft…we have little difficulty concluding that their injury in fact is fairly traceable to CareFirst,”
Code words for legislative drafters: fairly traceable
Health IT Security | CareFirst Data Breach Case Moves to US Supreme Court
Previously on informed:intel we read about Maryland’s updated data security bill from 2017, but let’s shift our focus to the inclusion of HIPPA requirements.
Maryland’s state data breach law will include this personal information colelcted by HIPAA covered entities:
The HIPAA info will also triggers= the data security breach notification standard of “as soon as is reasonably practicable” or not later than 45 days.
Maryland HB 974 | Maryland Personal Information Protection Act – Revisions
Health IT Security | HIPAA Info Included in Updated MD Data Breach Notification Law
Governing | Fearing Hackers, States Start Buying Cyber-Insurance + Insurance Journal
Ohio’s SB 220 sets up a benefit for businesses to comply: safe harbor from suit.
What’s required for a business to get the safe harbor? The business must adopt “a written cybersecurity program that contains administrative, technical, and physical safeguards for the protection of personal information that complies with the NIST cybersecurity framework “
The Toledo Blade | Lawmakers offer legal carrot to defeat data breaches
Cities in Wyoming are purchasing cyber insurance to protect themselves from hackers.
Some say that the Legislature should act to protect cities from hackers.
Proposed legislation includes:
Cody Enterprise | EDiTORIAL: Cyber insurance good idea for city
The Iowa Attorney General is reviewing the state’s cyber security protocols to do 3 things:
Mcirosoft is hosting legislators from across the country to address cyber security legislative solutions.
The pension that was hacked: IPERS, Iowa Public Employees’ Retirement System
Hackers used this information:
Government Technology | How Cyber-Thieves Stole From Iowa Pension Accounts
WHO: ECRI Institute annual health technology hazards list
WHAT: #1 concern is data security. #2 concern is endoscope reprocessing failures #3 Alert fatigue
WHY: A May WannaCry cyberattack on UK hospitals shut down all medical equipment except emergency services.
Health Care IT | ECRI: Cybersecurity tops 2018 health technology hazards
State : Michigan
When did Michigan create its Cyber Security Volunteer Corps? 2013 under the Michigan Department of Technology, Management, and Budget
What did the 2017 amendment do? Michigan’s HB 4508 codifies the Corps and permits volunteers to bring cyber-defense services to nonprofit organizations, private businesses, educational groups, and other non-governmental associations.
What is required of volunteers? Volunteers must undergo criminal background and FBI checks
Is there charitable immunity for the corps? Yes
Stateline | Pew Charitable Trusts | Michigan Governor Signs Volunteer Cyber Corps Bill
The U.S. Treasury Department’s October 276.2017 report entitled, A Financial System
That Creates Economic Opportunities Asset Management and Insurance, goes all in for uniform state legislation for data security model legislation for insurers.
What is the model legislation? The NAIC Data Security Model Law
What’s the 10,000 foot view of the Model law?
Florida looks to be THE state for cybersecurity. Here’s what it is doing to get there:
Government Technology | Florida Sets Sights on Becoming Cybersecurity Front-Runner
Michigan Legislature is moving HB 4973 to prevent cybersecurity efforts from being dusclosued under public information act.
Support in the Michigan House: 101 to 5
The key bill text that exempts cybersecurity info from public information: prevents disclosure of information concerning the “confidentiality, integrity or availability of information systems.”
Potential policy benefit: the information protection could enecourage businesses to engagte in more information sharing on cyber security
Congress’ Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act will:
U.S. H.R. 3101 | Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act
The Hill | House passes bill to boost cybersecurity at US ports
The Democratic National Committee is claling on state party offices to srengthen cyber security.
Buzz Feed | DNC Warns State Parties On Cybersecurity: Be Better
Connecticut is creating the Connecticut Cyber Task Force.
The Connecticut Cyber Task Force will consist of:
2 Priorities of the tax force:
Business and Commerce Committee Study access issues regarding digital assets of decedents. Study social media privacy laws and whether job applicants and students’ privacy is jeopardized under current law.
A bipartisan bill in Congress seeks to require social media companies to disclose the same campaign related information that is required of radio and tv.
Which social media companies would be affected? websites, apps, search engines, social media and ad networks with over 50 million unique visitors
What would be trigger amount for dislcosures? if a person or entity spends at least $500 on political ads a year
What disclosures would be required?
S 1989 (2017) by Kolbuchar, McCain and Warner
The Hill | Bill to halt election meddling on social media introduced
House Committee on Appropriations
#5 Trends in data security & cost savings Monitor the ongoing implementation of Article IX, Sec. 9.13 of the General Appropriations Act and determine if state agencies are realizing cost savings and/or security enhancements in state operations related to cybersecurity, information technology, and cloud computing. Study trends in cloud computing and IT delivery services, and identify whether additional cost efficiencies, economies of scale, or IT modernization could be achieved.
House Committee on Business & Industry
#3 Data gathering by employers & businesses. Review the increased use of third party data gathering, particularly individual background information and history, by Texas employers and businesses. Examine the standards for accessing, providing, and updating accurate background information used for employment purposes.
#4 Data breaches & securing sensitive data. Study the impact of data breaches or theft on Texas consumers and businesses. In particular, study the consequences of recent data breaches and subsequent mitigation efforts. Review the existing standards of risk as well as the current best practices in securing sensitive and personal information held or used by private industries. Determine if existing rules and regulations offer adequate consumer protection while allowing continued economic success for businesses in the state.
House Committee on Elections
#1 Harvey & Election Security. Study the potential impact of disaster events on election administration and security. Specifically, examine any effects or vulnerabilities identified during Hurricane Harvey and the subsequent recovery period.
#2 Election Security. Study the efficiency and security of the state’s existing election protocols and systems, including but not limited to registration and early voting procedures, ballot styles, and the rules regarding time and location of polls. Identify available processes and options which could lead to increased voter participation and election integrity.
House Committee on Government Transparency & Operation
#1 Harvey & Data. Public/Private Partnership. Examine the role of technology in disaster preparedness and the response to Hurricane Harvey and future natural disasters. Review and make recommendations to drive innovation and efficiency and evaluate whether there are any regulatory impediments to collaboration between the public and private sectors.
#2 Statewide Technology Centers. Evaluate whether qualifying state agencies are appropriately utilizing available state disaster recovery services, including the statewide technology centers. Consider the costs and benefits of allowing other states to participate in Texas’ statewide technology centers under Subchapter L, Chapter 2054, Texas Government Code for disaster recovery purposes.
#5 Interagency data sharing. Study how state agencies can share knowledge and practices, reduce duplicative data gathering, and conduct business in a more efficient manner through interagency data sharing. Review best practices to provide the public with more transparency and access to government information.
House Committee on Investments & Financial Services
#2 Security Breaches. Study the impact and risks that a large-scale security breach of a credit bureau has on Texans. Identify opportunities to protect Texas consumers and to mitigate the impact of such a breach.
#4 Fin tech. Study policy challenges in the area of financial technology. Evaluate the concept of a “sandbox” as a regulatory approach for enabling innovation and the feasibility of implementing such in Texas. If appropriate, make recommendations for possible legislative action to foster innovation in the finance industry.
House Committee on Transportation
#6 Smart Roads. Intelligent Transportation Systems. Study emerging issues in transportation related to technology and evaluate the state’s preparedness for addressing challenges and opportunities posed by technological advances. Review the implementation of state and federal programs and legislation related to intelligent transportation systems, autonomous vehicles, unmanned aircraft systems (i.e. drones), and other technological changes.
Senate Select Committee on Election Security
In light of recent election irregularities in Texas, review voting security protocols as well as the responsibilities and duties of members of the Electoral
College. Specifically, examine the use of electronic voting machines and paper ballots, voting fraud and disenfranchisement occurring inside nursing homes and assisted living facilities, outside interference and manipulation of elections, and the voting requirements of presidential electors. Make recommendations to safeguard the integrity of elections, ensure the confidentiality and security of voting records, and ensure the will of the people is reflected through their ballot and carried out through their presidential electors.
85th Texas Legislature Interim Charges | Texas House | Texas Senate
Federal:
States:
Congressman Tom Graves H.R. 4036:
Tom Graves | Rep. Tom Graves Formally Introduces Active Cyber Defense Bill
There are also new federal guidelines for election machines.
New York Times | Wary of Hackers, States Move to Upgrade Voting Systems
The State: Kentucky
The proposed legislation would require companies responsible for a data breach to provide impacted Kentuckians:
How was the bill proposal announced? The State Attorney General Andy Beshear and the bill’s author, State Senator McGarvey, at AARP Kentucky’s Louisville headquarters
California regulations on ride share require annual data reports. The data required to be sent to the state includes:
What data do the cities want?
The data’s big bad issue: Privacy concerns about rider personal information
The Recorder | Uber and Lyft Resist Regulators’ Appeal for Data Sharing
October is National Cyber Security Awareness Month. Here’s exampkes of what governments and businesses have done to engage:
We Live Security | Five cool things happening for National Cyber Security Awareness Month
Thus far in 2017, the number of education data breaches:
Campus Technology | Education Data Breaches Double in First Half of 2017
Resiliance is the name of the game. R Street is calling for “resiliance” and not “remediation” in legislative solutions to data breaches.
If bills shouldn’t require that consumers receive free credit report monitoring and cyber security standards and breach notification requirements for entities that maintain consumer data, what should bills do?
R Street | Remediation won’t cut it – we need cyber resilience
Recode | Equifax rival TransUnion has hired cybersecurity lobbyists in Washington, D.C.
The Hill | Reddit hires first lobbyists
Texas State Representatives Minajarez, Pickett, Dale, Oliverson & Goldman requested the following interim charge:
The Minajarez, Pickett, Dale, Oliverson & Goldman letter to Speaker Straus dated 10.2.2017
During the Congressional hearings on the Equifax breach, Republicans bandied about the idea of requiring credit reporting businesses, that have exposed consumer information, to pay affected consumers “a couple thousand bucks each [consumer]”
The rational: An incentive to keep business data security up to snuff
The Republican: Congressman Joe Barton (R-TX), a founder of the bipartisan Congressional Privacy Caucus
The Hill | GOP rep pitches fines for hacked credit-monitoring firms
Data Security makes Governing’s Top 5 Government Trends to Watch.
Why is data security such a big deal?
A House Companion to the Senate’s, Securing Energy Infrastructure Act of 2017 by Senator Angus King (I-ME) and Senator James E. Risch (R-ID), has been filed by Congressman C.A. Dutch Ruppersberger (MD-02) and Congressman John R. Carter (TX-31). The legislation will:
According to the association representing tech giants, cryber crime will have a $6 trillion impact on the U.S.
Politico | Morning Cyber Security | Cybercrime will cost up to $6 trillion by 2021
The State: New York
The regulator: New York’s Department of Financial Services
The Subpoena: Seeks more information about Equifax’s data breach, including:
More regulatory enforcement in the works? Yes, New York also wants to impose the financial data security rules it finalized this year to apply to credit reporting agencies like Equifax.
What does this mean for other states? Colorado followed in New York’s footsteps to become the 2nd state to impose specific data security requirement son the financial industry. Look for a specific application to credit reporting agencies forthwith
Reuters | New York regulator subpoenas Equifax over massive data breach: Report
New York Law Journal | NY Issues Subpoena to Equifax Over Breach, Vullo Confirms
Kentucky Attorney General proposes revisions to the state’s data breach notification statute to require:
WCPO | Kentucky’s attorney general proposes new data breach protections after Equifax incident
New York General Assembly measure A08679 would allow New Yorkers to check their credit reports as often as they wanted for free.
Federal law requires an annuak free credit report check be available.
New York State Assembly measure SO 6886 would require a breached entity to provide 5 years of free credit freezes.
In the Cybersecurity Act of 2015, Congress created the Health Care Industry Cybersecurity Task Force.
6 “critical” recommendations were offered:
Define and streamline leadership, governance, and expectations for health care industry cybersecurity.
Increase the security and resilience of medical devices and health IT.
Develop the health care workforce capacity necessary to prioritize and ensure cybersecurity awareness and technical capabilities.
Increase health care industry readiness through improved cybersecurity awareness and education.
Identify mechanisms to protect research and development efforts and intellectual property from attacks or exposure.
Improve information sharing of industry threats, weaknesses, and mitigations.
The local government: Montgomery Co. Maryland
The hackers demanded: 9 bitcoins, valued at between $40,000 and $50,000
Other local governmetns have been able to retrieve data from back up and not pay the ransom, was that tried? Yes, but for reasons unrelated to the hack the backup was not a viable option
What was the value of the data to the county? $5 million
Montgomery Advertiser | Montgomery County pays ransom, gets data back
Wisconsin’s election officials have created a state elections security team, and here’s what you need to know:
Wisconsin Law Journal | State creating elections security team, plan
Politico | How to erect an economic powerhouse using cybersecurity
Cybersecurity as an Engine for Growth Authors: Natasha Cohen, Rachel Hulvey, Jittip Mongkolnchaiarunya, Anne Novak, Robert Morgus and Adam Segal
A new report, Cybersecurity as an Engine for Growth, looked at Beersheba, Israel; Malvern, United Kingdom; and San Antonio, United States to find 3 ways cyber security can lead to economic growth:
Politico Morning Cyber Security | How to erect an economic powerhouse using cybersecurity
How does the spy network analogy play out for data?
Say your a city controller making payments to a contractor. The payment can be processed instaneously without being hacked because the information is broken down into packets, encrypted and each packet is sent a different path & then reassembled so that the city knows the funds have been withdrawn and the contract recipient has funds deposited.
New York State Assembly is pursuing SB06880 to require a consumer to be notified of a breach within 15 days of discovering the breach.New York SB 06880 (2017)
Supporting changes to New York’s Data Security and Notification Act, the state Attorney General states:
New York Daily News |Op-Ed by New York A.G. Eric Schneiderman | Raising our guard vs. mega-breaches
Long Island Business News | AG calls for tighter regs after Equifax breach
Convenience and Fuel retailers and a coalition of that includes the American Hotel & Lodging Association, International Franchise Association, National Association of Realtors, National Association of Truck Stop Operators, National Council of Chain Restaurants, National Grocers Association, National Retail Federation, Society of Independent Gasoline Marketers of America, and the U.S. Travel Association support 4 principles of data security legislation:
Illinois is proposing to eliminate fees that credit-reporting companies are allowed to charge for imposing or lifting a credit security freeze.
2 Attorneys General (MA and NY) are suing, or my soon sue, Equifax for violating state consumer laws.
This sparked legislation to require credit reporting agencies to have the same scrutiny as banks, hospitals and others that handle confidential consumer data.
WGBH | Mass. AG Maura Healey Will Sue Equifax Over Data Breach
Nebraska State Sen. Adam Morfeld is proposing a bill to require a credit reporting agency that has a breach to offer lifetime credit monitoring for free.
Morfeld’s reasoning? Equifax response to its hack was not enough
Virginia de-certified touch screen voting machines that do not leave a paper trail after voting machines were hacked within seconds at a tech conference earlier this year.
A vote by the State Election Department triggered the removal of the voting machines.
Tech Crunch | Virginia just decertified its most hackable voting machines
What is a data trespass law? While it sounds like data security, these laws create a crime against physically entering land to acquire data like pollution or animal cruetly.
Are data trespass laws constititional? Maybe not. A Federal Appeals court has found a Wyoming law likely violates the 1st Amendment.
Who is for these laws? Land owners, members of the Farm Bureau
Who is against these laws? People for the Ethical Treatment of Animals, Center for Food Safety, National Press Photographers Association
Casper Star Tribune | Denver court rules against Wyoming data trespass law
Recent cyber security philanthropic gifts:
Inside Philanthropy | Are Gifts for Cybersecurity the Next Gold Rush for Campus Fundraisers?
Hurricane Harvey exposed the need for energy security legislation by:
Oracle repoprtedly broke with other tech companies, to openly back a federal human trafficking bill.
The legislation:Stop Enabling Sex Traffickers Act, sponsored by Senator Richard Blumenthal (D-CT) and Senator Robert Portman (R-OH)
What this bill would do: Amend protections for social networking sites & online platforms such as Google and Facebook from being held legally liable for content shared by those on the site.
What do tech opponents say? These amendments will create endless lawsuits and stifle digital innovation.
Tech Crunch | Oracle breaks with tech industry in backing human trafficking bill
A review of grid security by Symatec reveals that since 2015 hackers have been trying to gain access to the energy sector. Here’s what you need to know:
The Hill | Sophisticated hacking campaign has targeted energy sector since 2015
National Association of Insurance Commissioner’s approved Insurance Data Security Model Law to improve cyber risk management in the U.S. insurance market.
What does the model law do?
8 States have a plan to replace their voting machines: MN, MI, NV, NM, CO, AR, MD, RI
Politico | Cash-strapped states brace for Russian hacking fight
Governing | State Election Officials Need Money to Boost Cybersecurity, But Where Will They Get It?
Experts say self driving cars are better protected from hackers; making human driven cars more likely to face a hacker.
Why are non-selfing driving cars easier to hack? Because the cars send signals via sensors to themselves about distances and the like over low-level system that hackers have been penetrating for years.
The fusion of these sensors in self-driving cars creates a ecueity protection as each sensor doesn’t trust the others data and the system as a hwole can override a command.
Guardian News | Assume self-driving cars are a hacker’s dream? Think again
Hurricane Harvey marks the 1st wide scale commerical use of drones after a disaster.
In addition to news crews utilizing drone footage, drones have been deployed by :
465,000 pacemakers are under voluntary recall for security issues that could allow a cybersecurity breach that would allow a 3rd party to :
No known cybersecurity issues with the pacemakers are known.
Regulatory Affairs Professionals Society | Abbott Recalls 465,000 Pacemakers for Cybersecurity Patch
In 2013 North Carolina created the 1st Innovation Center (iCenter) in the U.S.
Since 2013, the iCenter has become focused on changing the culture of state government by:
What does this mean? State innovation centers are a way to introduce new technology to all levels of government within a state.
Data Centers are chosing to set up shop in Iowa. Corn fields and data servers go together like Bluebell Ice cream and Texas.
The latest data center by Apple Inc. includes an economic incentive package that includes:
What does the Hawkeye State have to offer?
AP | Apple gets $208 million in tax breaks to build Iowa data center
Nevada is streamlining its state email servers, for all its state employees, to a single provider contract.
Government Technology | Nevada CIO: State’s Major IT Initiatives Are Moving Forward
Cinncinati is using predictive modeling to determine which properties might fall into disrepair to thwart blight before it occurs.
The Business: Integrated Roadways
What are integrated roadways? Roads with sensors, phone, and internet connectivity, telecommunications, fiber-optic cable, and high-speed Internet, as well as other hardware, inside road surfaces.
Would these integrated roads collect data for the benefit of the city? Yes.
What type of dats would roadways collect? data on vehicle counts, speeds, and weights to give cities access to information
Virginia has a new state level program to train veterans to fill cybersecurity jobs.
Virginia’s vetrans training program :VetSuccess Immersion Academies via SANS CyberTalent Solutions
The veterans can take up to 3 courses and receive certification when they qualify.
The State: Virginia
The goal of the public-private partnership: “optimizing opportunities for innovative collaboration and investment in Virginia’s transportation system”
The data shared with the private sector: 22 different data sets, with initial data sets including traffic volumes, speed limits, travel advisories, lane closures, crashes, truck restrictions, traffic sensors, incidents, sign messages and locations, paving schedules, short- and long-term weather events, the Six-Year Improvement Plan, major road construction and Signal Phase and Timing data.
Equipment World | Virginia DOT launches SmarterRoads data portal for transportation app development
Gartner Inc. estimates that cybersecurity spending will increase in 2017:
Spending will be focused on:
By 2020, bundled cybersecurity contracts will account for 40% of all managed security service contracts and will include:
Maryland is offering its Medicaid patients a Telehealth App with these policy goals:
State Government Tech | Maryland Offers Medicaid Users Free Telemedicine App
These 30 Governors, Republican and Democrat, signed onto ther National Governor’s Association Confront the Cyber Threat Initiative: AL, AK, AZ, AR, CA, CO, CT, DE, Guam, HI, ID, IN, IA, KY, LA, MA, MD,MI, MN, MO, MT, NV, NH, NJ, NC, ND, OK, OR, PA, Puerto Rico, RI, UT, VT, Virgin Islands, WA, WV, WI, WY.
The Compact calls for 3 major strides:
The Federal Trade Commission settled a data privacy investigation by Uber agreeing to 20 years of privacy audits.
The FTC says the company “failed consumers”
CNBC | Uber agrees to 20 years of privacy audits after FTC says it ‘failed consumers’
First comes banning investments in the country du jour, now comes stopping outsourcing funds or policy initiatives related to cybersecurity to Russia.
Amendments bandied about D.C. by Senators Durbin, Warren and Whitehouse prohibit the use of federal funds to establish or support a “joint cybersecurity initiative” with Russia.
This trend is heading toward statehouses near you.
Politico | Morning Cybersecurity | Amendments to the policy roadmap
Thank you for subscribing to our newsletter.
Great things are just around the corner!