Cybersecurity & Tech
The State: New York
The regulator: New York’s Department of Financial Services
The Subpoena: Seeks more information about Equifax’s data breach, including:
More regulatory enforcement in the works? Yes, New York also wants to impose the financial data security rules it finalized this year to apply to credit reporting agencies like Equifax.
What does this mean for other states? Colorado followed in New York’s footsteps to become the 2nd state to impose specific data security requirement son the financial industry. Look for a specific application to credit reporting agencies forthwith
Reuters | New York regulator subpoenas Equifax over massive data breach: Report
New York Law Journal | NY Issues Subpoena to Equifax Over Breach, Vullo Confirms
Kentucky Attorney General proposes revisions to the state’s data breach notification statute to require:
WCPO | Kentucky’s attorney general proposes new data breach protections after Equifax incident
New York General Assembly measure A08679 would allow New Yorkers to check their credit reports as often as they wanted for free.
Federal law requires an annuak free credit report check be available.
New York State Assembly measure SO 6886 would require a breached entity to provide 5 years of free credit freezes.
In the Cybersecurity Act of 2015, Congress created the Health Care Industry Cybersecurity Task Force.
6 “critical” recommendations were offered:
Define and streamline leadership, governance, and expectations for health care industry cybersecurity.
Increase the security and resilience of medical devices and health IT.
Develop the health care workforce capacity necessary to prioritize and ensure cybersecurity awareness and technical capabilities.
Increase health care industry readiness through improved cybersecurity awareness and education.
Identify mechanisms to protect research and development efforts and intellectual property from attacks or exposure.
Improve information sharing of industry threats, weaknesses, and mitigations.
The local government: Montgomery Co. Maryland
The hackers demanded: 9 bitcoins, valued at between $40,000 and $50,000
Other local governmetns have been able to retrieve data from back up and not pay the ransom, was that tried? Yes, but for reasons unrelated to the hack the backup was not a viable option
What was the value of the data to the county? $5 million
Montgomery Advertiser | Montgomery County pays ransom, gets data back
Wisconsin’s election officials have created a state elections security team, and here’s what you need to know:
Wisconsin Law Journal | State creating elections security team, plan
Politico | How to erect an economic powerhouse using cybersecurity
Cybersecurity as an Engine for Growth Authors: Natasha Cohen, Rachel Hulvey, Jittip Mongkolnchaiarunya, Anne Novak, Robert Morgus and Adam Segal
A new report, Cybersecurity as an Engine for Growth, looked at Beersheba, Israel; Malvern, United Kingdom; and San Antonio, United States to find 3 ways cyber security can lead to economic growth:
Politico Morning Cyber Security | How to erect an economic powerhouse using cybersecurity
How does the spy network analogy play out for data?
Say your a city controller making payments to a contractor. The payment can be processed instaneously without being hacked because the information is broken down into packets, encrypted and each packet is sent a different path & then reassembled so that the city knows the funds have been withdrawn and the contract recipient has funds deposited.
New York State Assembly is pursuing SB06880 to require a consumer to be notified of a breach within 15 days of discovering the breach.New York SB 06880 (2017)
Supporting changes to New York’s Data Security and Notification Act, the state Attorney General states:
New York Daily News |Op-Ed by New York A.G. Eric Schneiderman | Raising our guard vs. mega-breaches
Long Island Business News | AG calls for tighter regs after Equifax breach
Convenience and Fuel retailers and a coalition of that includes the American Hotel & Lodging Association, International Franchise Association, National Association of Realtors, National Association of Truck Stop Operators, National Council of Chain Restaurants, National Grocers Association, National Retail Federation, Society of Independent Gasoline Marketers of America, and the U.S. Travel Association support 4 principles of data security legislation:
Illinois is proposing to eliminate fees that credit-reporting companies are allowed to charge for imposing or lifting a credit security freeze.
2 Attorneys General (MA and NY) are suing, or my soon sue, Equifax for violating state consumer laws.
This sparked legislation to require credit reporting agencies to have the same scrutiny as banks, hospitals and others that handle confidential consumer data.
WGBH | Mass. AG Maura Healey Will Sue Equifax Over Data Breach
Nebraska State Sen. Adam Morfeld is proposing a bill to require a credit reporting agency that has a breach to offer lifetime credit monitoring for free.
Morfeld’s reasoning? Equifax response to its hack was not enough
Virginia de-certified touch screen voting machines that do not leave a paper trail after voting machines were hacked within seconds at a tech conference earlier this year.
A vote by the State Election Department triggered the removal of the voting machines.
Tech Crunch | Virginia just decertified its most hackable voting machines
What is a data trespass law? While it sounds like data security, these laws create a crime against physically entering land to acquire data like pollution or animal cruetly.
Are data trespass laws constititional? Maybe not. A Federal Appeals court has found a Wyoming law likely violates the 1st Amendment.
Who is for these laws? Land owners, members of the Farm Bureau
Who is against these laws? People for the Ethical Treatment of Animals, Center for Food Safety, National Press Photographers Association
Casper Star Tribune | Denver court rules against Wyoming data trespass law
Recent cyber security philanthropic gifts:
Inside Philanthropy | Are Gifts for Cybersecurity the Next Gold Rush for Campus Fundraisers?
Hurricane Harvey exposed the need for energy security legislation by:
Oracle repoprtedly broke with other tech companies, to openly back a federal human trafficking bill.
The legislation:Stop Enabling Sex Traffickers Act, sponsored by Senator Richard Blumenthal (D-CT) and Senator Robert Portman (R-OH)
What this bill would do: Amend protections for social networking sites & online platforms such as Google and Facebook from being held legally liable for content shared by those on the site.
What do tech opponents say? These amendments will create endless lawsuits and stifle digital innovation.
Tech Crunch | Oracle breaks with tech industry in backing human trafficking bill
A review of grid security by Symatec reveals that since 2015 hackers have been trying to gain access to the energy sector. Here’s what you need to know:
The Hill | Sophisticated hacking campaign has targeted energy sector since 2015
National Association of Insurance Commissioner’s approved Insurance Data Security Model Law to improve cyber risk management in the U.S. insurance market.
What does the model law do?
8 States have a plan to replace their voting machines: MN, MI, NV, NM, CO, AR, MD, RI
Politico | Cash-strapped states brace for Russian hacking fight
Governing | State Election Officials Need Money to Boost Cybersecurity, But Where Will They Get It?
Experts say self driving cars are better protected from hackers; making human driven cars more likely to face a hacker.
Why are non-selfing driving cars easier to hack? Because the cars send signals via sensors to themselves about distances and the like over low-level system that hackers have been penetrating for years.
The fusion of these sensors in self-driving cars creates a ecueity protection as each sensor doesn’t trust the others data and the system as a hwole can override a command.
Guardian News | Assume self-driving cars are a hacker’s dream? Think again
Hurricane Harvey marks the 1st wide scale commerical use of drones after a disaster.
In addition to news crews utilizing drone footage, drones have been deployed by :
465,000 pacemakers are under voluntary recall for security issues that could allow a cybersecurity breach that would allow a 3rd party to :
No known cybersecurity issues with the pacemakers are known.
Regulatory Affairs Professionals Society | Abbott Recalls 465,000 Pacemakers for Cybersecurity Patch
In 2013 North Carolina created the 1st Innovation Center (iCenter) in the U.S.
Since 2013, the iCenter has become focused on changing the culture of state government by:
What does this mean? State innovation centers are a way to introduce new technology to all levels of government within a state.
Data Centers are chosing to set up shop in Iowa. Corn fields and data servers go together like Bluebell Ice cream and Texas.
The latest data center by Apple Inc. includes an economic incentive package that includes:
What does the Hawkeye State have to offer?
AP | Apple gets $208 million in tax breaks to build Iowa data center
Nevada is streamlining its state email servers, for all its state employees, to a single provider contract.
Government Technology | Nevada CIO: State’s Major IT Initiatives Are Moving Forward
Cinncinati is using predictive modeling to determine which properties might fall into disrepair to thwart blight before it occurs.
The Business: Integrated Roadways
What are integrated roadways? Roads with sensors, phone, and internet connectivity, telecommunications, fiber-optic cable, and high-speed Internet, as well as other hardware, inside road surfaces.
Would these integrated roads collect data for the benefit of the city? Yes.
What type of dats would roadways collect? data on vehicle counts, speeds, and weights to give cities access to information
Virginia has a new state level program to train veterans to fill cybersecurity jobs.
Virginia’s vetrans training program :VetSuccess Immersion Academies via SANS CyberTalent Solutions
The veterans can take up to 3 courses and receive certification when they qualify.
The State: Virginia
The goal of the public-private partnership: “optimizing opportunities for innovative collaboration and investment in Virginia’s transportation system”
The data shared with the private sector: 22 different data sets, with initial data sets including traffic volumes, speed limits, travel advisories, lane closures, crashes, truck restrictions, traffic sensors, incidents, sign messages and locations, paving schedules, short- and long-term weather events, the Six-Year Improvement Plan, major road construction and Signal Phase and Timing data.
Equipment World | Virginia DOT launches SmarterRoads data portal for transportation app development
Gartner Inc. estimates that cybersecurity spending will increase in 2017:
Spending will be focused on:
By 2020, bundled cybersecurity contracts will account for 40% of all managed security service contracts and will include:
Maryland is offering its Medicaid patients a Telehealth App with these policy goals:
State Government Tech | Maryland Offers Medicaid Users Free Telemedicine App
These 30 Governors, Republican and Democrat, signed onto ther National Governor’s Association Confront the Cyber Threat Initiative: AL, AK, AZ, AR, CA, CO, CT, DE, Guam, HI, ID, IN, IA, KY, LA, MA, MD,MI, MN, MO, MT, NV, NH, NJ, NC, ND, OK, OR, PA, Puerto Rico, RI, UT, VT, Virgin Islands, WA, WV, WI, WY.
The Compact calls for 3 major strides:
The Federal Trade Commission settled a data privacy investigation by Uber agreeing to 20 years of privacy audits.
The FTC says the company “failed consumers”
CNBC | Uber agrees to 20 years of privacy audits after FTC says it ‘failed consumers’
First comes banning investments in the country du jour, now comes stopping outsourcing funds or policy initiatives related to cybersecurity to Russia.
Amendments bandied about D.C. by Senators Durbin, Warren and Whitehouse prohibit the use of federal funds to establish or support a “joint cybersecurity initiative” with Russia.
This trend is heading toward statehouses near you.
Politico | Morning Cybersecurity | Amendments to the policy roadmap
North Carolina’s electronic voting system in 2016 was hacked. The way hackers got in was through the company that provided the poll book- the electronic data that allows voting personnel to verify voters.
What changes we will we see to election procurement:
NPR | Russian Cyberattack Targeted Elections Vendor Tied To Voting Day Disruptions
71 % of health care organizations budget for cyber security
The majority say cybersecurity is more than 3% of their budget
A majority have hired a chief information security officer or other executive level cybersecurity position
75% do regular cybersecurity testing
80% of US healthcare orgnaizations will increase cybersecurity spending in 2017
Healthcare Dive | HIMSS survey: Hospitals ramping up cybersecurity efforts
Michigan created a volunteer public private task force to step in at a moment’s notice to resolve a cyber attack on state systems.
What is the group called? Michigan Cyber Civilian Corps, MiC3
Has Michigan Cyber Civilian Corps, MiC3 been deployed? No
How does it function? Like a volunteer fire department
Who has volunteered? cybersecurity experts from government, education and private industry
Has any other state done this? No.
Governing | Michigan’s Volunteer-Based Cybersecurity Strategy Catches On
GCN | Why state and local government still struggle with cybersecurity
Missouri tests its state employees with its own phishing scams to keep state employees laser focused on cybersecurity.
Government Technology | In Illinois, Cybersecurity Training for State Employees Now Required by Law
Illinois HB 2371 requires every state employee to complete annual cybersecurity training. The Department of Information resources may offer a video in lieu of training.
By every employee, the Legislature managed to exclude these employees:
Government Technology | In Illinois, Cybersecurity Training for State Employees Now Required by Law
Johnson Co. Kansas relies on big data to address public safety and mental health concerns. The use of bug data has saved the local government:
How did Johnson Co. do it? By cross referencing 2 databases- county wide criminal jsutice database and a health and human services database that notes mental health issues.
State Tech | Johnson County (Kan.) Calls On Big Data to Link Public Safety and Mental Health
As schools place a greater concern on ensuring parents that student data is protected, schools are asking their edcation vendors more about data security.
Ed Tech | 3 Tips to Keep Parents Assured that Student Data Is Protected
A tech researcher visiting DefCon Voting Village in Las Vegas, hacked a U.S. styled voting machine within 2 minutes.
Companies are finding cybersecuity weaknesses in employees by sending faux phishing emails and seeing which employees bite.
Corporate test data shows cyber literacy training reduces the number of employees who fall for phishing scams.
How many years until there are cyber literacy requirements in public education? in state contracts?
SC Media | Diagnosing employee phishing weaknesses key to improving email security
Taxpayers for Common Sense is ahead of the curve by creating a database to track federal cybersecurity spending.
The cybersecurity spending database is organized by agency and tracks spending for last 10 years.
The Consumer Tech Association filing with the Commerce Department recommends government action on cybersecurity/datasecurity policies for education because there are so many differnt players in education.
The recommendations that we may soon see in Education Procurement Contracts:
Your Roomba is mapping your house and collecting data. Let’s repeat, your Roomba is colelcting data about how to get around your house and what is in your house.
Better yet, the company hasn’t asked you whether they can keep the data, store the data or sell the data. What retailer wouldn’t want to buy data that says you have no loveseat? or only 1 sad and lonely dining chair?
This type of private property data is screaming for legislation. Legislation about disclosure of the data, sale of the data, consent to store the data, and how protected is the Roomba from hackers?
USA Today | Your Roomba already maps your home. Now the CEO plans to sell that map.
Congress’ H.R. 3170 tackles cyber security in small businesses by requiring cyber security training for small business devleopment centers.
In 2016, California created the State Innovation Lab.
California maintains an Office of Digital Innovation.
The policy goal in California is to “create novel, deployable technologies that address needs identified by state entity partners — with a particular focus on open-sourced technology.”
State Tech | How Innovative States Stay Ahead of the Tech Curve
Body cameras- love them, hate them- they collect data and a lot of data.
Lots of people support body cameras:
Body cameras are everywhere in law enforcement, so how are counties handling all that data?
State Tech | How Counties Manage the Body-Worn-Camera Video Data Boom
2017 Q2 reflects record spedning by tech giants.
The 10 top issues tech wants elected officials and policymakers to know:
Data Center Dynamics | Tech, data center firms increase US lobbying spend
Arkansas Workforce Services experienced a data breach that exposed the personally identifable details of 600,000 residents and 19,000 employment applications.
The state is seeking new database services.
U.S. News and World Report | Data Breach Has Arkansas Seeking New Vendor
Yes, the California Supreme Court held that the California Medical Board can access private patient records in the state prescription database because the state interest in regulating potent prescription drugs and protecting patients from negligent doctors.
Access to patient records + Texas Medical Board Sunset Review = Patient Privacy vs. State Interest Amendments
Law 360 | Calif. Justices OK Medical Board’s Access To Rx Database
The 2016-2017 Chair of the National Governor Association, Virginia Governor Terry McAuliffe, explains that cyber security directly impacts these policy areas and businesses:
National Governors Association is pushing for state reform of cyber security laws because:
The National Governor’s Association initiative, Meet the Threat, calls for:
Lloyds of London estimates a global cyber attack will result in damages similar to hurricane Sandy, or $53 billion in economic losses from a global hacking of cloud services.
How do the $53 Billion oin costs break down?
Average economic losses $4.6 billion to $53 billion
Actual losses could be as high as $121 billion
$45 billion of that sum may not be covered by cyber policies, because
companies are underinsuring
If operating systems are hacked, average losses range from $9.7 billion to $28.7 billion.
How is Texas regulating the cyberinsurance market?
Washington State University kept sensitive personal information on a backup disk locked in a $159 safe in a small safe in a storage unit.
The WSU storage unit was burlagized, and was the only unit burgalarized.
The takeaway for policy makers: Do not allow state institutions to store personal data in storage units.
Common sense governing. Better late than never.
A poll by Carbon Black reveals the concern level of voters for election integrity.
SC Media | Cybersecurity concerns may stop 59 million Americans from voting in 2018
In August 2016, Maryland officials notices hackers were trying to get to voter information, that set off a flurry of legislator and regulator activity. Here’s where they ended up almost a year later:
Wall Street Journal | How Maryland Contended With Attempted Hack Of Its Voter-Registration System
To avoid the use of stolen personally identifiable information, the uK is seeing a rise in the use of biometric identifiers.
SC Media | Rise in use of biometrics products for cyber-security, report predicts
Oregon’s Senate Bill 90 creates a new position of Chief Information Officer who is responsible for:
Why are Frederick County Public Schools (Maryland) adopting new data security rules? The School experiences a data breach.
5 Elements from the new data breach policy:
Also requires a 3rd party contractor to test the schools’ data security regularly.
Frederick News Post | New FCPS data security policy takes measures to protect student information
How to pass electric grid cybersecurity standards in 2 steps of legislstive logic:
Natural Gas Intel | Senate Energy Policy Reform Bill Revived, Fast-Tracked
A bipartisan, and awkwardly named piece of legislation, the Promoting Good Cyber Hygiene Act, calls for:
1/2 of health care organizations say they are prepared for a data breach.
The American Medical Association proposes these data security incentives:
Health IT Security | Incentivize Cybersecurity Best Practices for Data Security
Automakers say they need flexibility to adapt technology of self driving cars.
What’s known for flexibility? the sarcastic answer: enacted statutes and their ability to keep up with technology
What’s the solution for cybersecurity for self driving cars? According to the American Center for Mobility self imposed rules by industry are the best option.
Automotive News | Cybersecurity push may tie up autonomous-car legislation
Department of Defense is adding cybersecurity standards to its procurement process.
Requirements in the new contracting rules that take effect this fall are:
FedScoop | Pentagon will soon hold contractors to elevated cyber standards
Data Breach at HHSC? No, a box of client records was left in a box unattended by a dumpster in Houston.
The personal information exposed included:
The HHSC response:
SC Media | 2,000 Texas HHSC clients health data compromised
HHSC | HIPAA Notice: Houston-area Accidental Loss of Client Information
Vermont’s Governor signed S135 that will expand economic opportunity for financial technology industries.
Arizona’s Governor signed HB2417 that recognizes blockchain signatures and smart contracts
Buckley Sandler | Vermont Governor Enacts Law Including Blockchain Application
GOP Data Firm, Deep Root Analytics, stored personal details of roughly 198 million citizens unprotected and publicly assessible.
A cybersecurity firm says potentially all of America’s 200 million registered voters were exposed, including names, dates of birth, home addresses, phone numbers, and voter registration details.
The complaint: McAleer v. Deep Root
SC Media | No recourse, perhaps, for 200M affected in breach of RNC database, attorney says
21 States responded to President Trump’s repeal of Obama era internet privacy regulations, by offering state regulations for internet privacy. Let’s take a peak.
In California, one internet service providfer, AT&T, has spent $2.71M in the last year.
Federal preemption isn’t a concern because the FCC laws and rules share duties with the states and there is no explicit preemption.
NCSL | PRIVACY LEGISLATION RELATED TO INTERNET SERVICE PROVIDERS
The Recorder | Calif. Pushes Internet Privacy Rules That Trump Repealed
21 States responded to President Trump’s repeal of Obama era internet privacy regulations, by offering state regulations for internet privacy. Let’s take a peak.
In California, Assembly Bill 375, will:
Federal preemption isn’t a concern because the FCC laws and rules share duties with the states and there is no explicit preemption.
NCSL | PRIVACY LEGISLATION RELATED TO INTERNET SERVICE PROVIDERS
The Recorder | Calif. Pushes Internet Privacy Rules That Trump Repealed
Some say hospitals that get hit by a ransomware attack need not disclose the ransomware data breach.
The question- If data is held hostage/accessed but is not taken must that be disclosed?
The supporters for disclosure say: More mandatory reporting.This regulatory gap limits the health-care system’s ability to fight cybercriminals.
Who is counted among supporters of disclosure? Congressman Ted Lieu, a California Democrat who along with Congressmen Will Hurd, a Texas Republican
What do hospital lawyers say? Hospitals have financial and competitive incentives to avoid all but required reporting
WallStreet Journal | Why Some of the Worst Cyberattacks in Health Care Go Unreported
Cyber security is becoming an element in analysis for bond markets.
Is this shift a result of a catalyst? Yes, the use of malware toward local governmental entities
Does this follow inthe footsteps of other entities disclosing cyber protections to investors? Yes, utilities and hospitals are starting to disclose any information to potential investors in bond documents about cyber risks or defenses
Reuters | U.S. muni market slowly starts paying heed to cyber risks
State: Illinois
Illinois’ Solutions to prevent election hacking in the 2018 mid term elections:
Politico | LAND OF LINCOLN PREPS FOR 2018
WGN | Illinois among 8 states investigating Russian hacking of its elections
Virginia Gov. Terry McAuliffe, Chair of the National Governor Association, urges states to:
Fitness Tracker data storage in the cloud leaves individuals subject to the following data privacy issues:
Irish Times | Fitness trackers run into resistance over data security concerns
The Securities Exchange Commission has issued a warning investment advisers that they need to be more proactive in data security by:
Reuters | SEC identifies adviser cyber security flaws
Reuters | Exclusive: New SEC enforcement chiefs see cyber crime as biggest market threat
Has a US city had its credit rating downgraded after a cyber attack? No
Do financial industry analysts think it possible to downfgrade a city’s credit rating after a cyber attack? yes
What factors can play into whether a local governmental entity’s credit rating could get downgraded?
Governing | Can a Cyberattack Cause a Credit Rating Downgrade?
State: California
The legislation: Assemblyman Matt Dababneh sought to apply the standard applied to business of requiring 1 year of ID theft protection services for anyone who is impacted by any government breach in California. AB 241 (2017)
The Opposition is winning as the bill stalls. The loyal opposition includes California State Assn. of Counties, the Urban Counties of California, and the League of California Cities
Opposition arguments:
Government Tech | New Legislation Pressures California Lawmakers to Strengthen Data Security
The federal HEALTH CARE INDUSTRY CYBERSECURITY TASK FORCE released 27 recommendations in its June 2017 report, and set forth these 5 future regulatory issues for health care cybersecurity:
Develop a cohesive plan for implementing this report’s recommendations and develop appropriate metrics to measure data security implementation progress.
Conduct a risk analysis, similar to the National Infrastructure Protection Plan, with an overlay for health care cybersecurity and privacy. Based upon the analysis, develop a comprehensive cybersecurity roadmap for the HPH Sector.
Establish an ongoing public-private forum, similar to this Task Force, to further the discussions of health care industry cybersecurity as the industry evolves. The Task Force members found this engagement with federal partners beneficial to understand our common cybersecurity challenges and concerns.
HHS leadership should partner more closely with existing DHS efforts with the insurance industry in helping identify a roadmap to enable private insurance approaches in the health care industry. The sometimes-conflicting roles of HHS as a regulatory body and facilitator for improved security could be mitigated by encouraging an industry-based insurance market.
Enable an ongoing conversation and develop strategies to identify resources and incentives that would help to overcome the barriers faced by small and rural organizations.
Create a cybersecurity leader role within HHS to align industry- facing efforts for health care cybersecurity.
Establish a consistent, consensus-based health care-specific Cybersecurity Framework
Require federal regulatory agencies to harmonize existing and future laws and regulations that affect health care industry cybersecurity.
Identify scalable best practices for governance of cybersecurity across the health care industry.
Explore potential impacts to the Physician Self-Referral Law, the Anti-Kickback Statute, and other fraud and abuse laws to allow large health care organizations to share cybersecurity resources and information with their partners.
Secure legacy systems.
Improve manufacturing and development transparency among developers and users.
Increase adoption and rigor of the secure development lifecycle (SDL) in the development of medical devices and EHRs.
Require strong authentication to improve identity and access management for health care workers, patients, and medical devices/EHRs.
Employ strategic and architectural approaches to reduce the attack surface for medical devices, EHRs, and the interfaces between these products.
Establish a Medical Computer Emergency Readiness Team (MedCERT) to coordinate medical device-specific responses to cybersecurity incidents and vulnerability disclosures.
Every organization must identify the cybersecurity leadership role for driving for more robust cybersecurity policies, processes, and functions with clear engagement from executives.
Establish a model for adequately resourcing the cybersecurity workforce with qualified individuals.
Create MSSP models to support small and medium-size health care providers
Small and medium-sized health care providers should evaluate options to migrate patient records and legacy systems to secure environments (e.g., hosted, cloud, shared computer environments).
Develop executive education programs targeting Executives and Boards of Directors about the importance of cybersecurity education.
Establish a cybersecurity hygiene posture within the health care industry to ensure existing and new products/systems risks are managed in a secure and sustainable fashion.
Establish a conformity assessment model for evaluating cybersecurity hygiene that regulatory agencies and industry could rely on, instead of a diversity of auditors.
The NIST Baldrige Cybersecurity Excellence Builder, should be further developed: 1) specific to health care, and 2) specific to the types of health care operations that are widely deployed across the industry and have limited access to cybersecurity resources (e.g., small hospitals or practices, rural locations with limited access to security resources).
Increase outreach and engagement for cybersecurity across federal, state, local, tribal, territorial, and the private sector partners through an education campaign including meetings, conferences, workshops, and tabletop exercises across regions and industry.
Provide patients with information on how to manage their health care data, including a cybersecurity and privacy grading system for consumers to make educated decisions when selecting services or products around non-regulated health care services and products.
Develop guidance for industry and academia on creating economic impact analysis and loss for cybersecurity risk for health care research and development.
Pursue research into protecting health care big data sets.
Tailor information sharing for easier consumption by small and medium-size organizations who rely on limited or part-time security staff.
Broaden the scope and depth of information sharing across the health care industry and create more effective mechanisms for disseminating and utilizing data.
Encourage annual readiness exercises by the health care industry.
Provide security clearances for members of the health care community.
HEALTH CARE INDUSTRY CYBERSECURITY TASK FORCE REPORT | June 2017
The Hill | Federal task force: Here’s how to fix healthcare cybersecurity
The State Legislature that created the Office of Cyber Defense Coordination: Nevada
Within which state agency will the Office live? Nevada’s Department of Public Safety
The Legislation creating the office: Nevada’s AB 471 (2017)
What do these cyber offices look like in other states?
New Jersey Cybersecurity and Communications Integration Cell
Georgia has its State Government System Review Board, under the direction of Georgia’s CIO.
California’s Cybersecurity Integration Center is housed within the California Office of Emergency Services
Idaho lawmakers approved the Cybercore Integration Center on the Idaho National Laboratory campus
Oregon has pending legislation for the consolidation of cybersecurity powers under the state CIO, as well as establishing the Oregon Cybersecurity Center of Excellence and the Oregon Cybersecurity Fund.
Government Technology | Nevada Governor Signs Bill to Create Office of Cyber Defense Coordination
State: Massachusetts
The highest level Massachusetts government position created: Secretary of Technology
The MA Secretary of Technology would be tasked with hiring:
Originator of the MA Secretary of Technology post: The Massachusetts Governor
Data and cyber positions are gaining power insisde and outside government.
Greenfield Recorder | New Baker bill creates Cabinet position for technology
The brainchildren behind Intelligent Transportation Cybersecurity Task Force: Intelligent Transportation Society of America & nonprofit Cyber Future Foundation
Which stakeholders are involved? auto manufacturers, government leaders and transportation officials
What will the task forces study? cybersecurity issues- legal and liability issues and policy, regulation and legislation- to esnusre the highest elevel of safety and privacy in a connected transportation environment
Politico | Morning Cyber Security | NEW TRANSPORTATION THINKING
Healthcare Dive | What happens to telemedicine if we lose net neutrality?
Background: The FCC in 2017 overturned internet privacy
What is Congress Doing in Response? Congresswoman Marsha Blackburn, R-Tenn., chairwoman of the Communications and Technology Subcommittee, filed a bill to return the power to regulate the internet back to the FTC.
What do privacy advocacy rights advocates say about this bill? 17 states have bills to protect state resident data privacy. The federal bill by Congrresswoman Blackburn would preempt those state laws.
Improving the Outcomes of Government IT | Internet Privacy Bill Would Override State Laws
Nevada Senate passed an internet security bill that will:
Why are states passing internet security bills?
A court in Vermont ruled that the State Agency of Education must release school bullying information it has collected under the public information act.
Amendments to Congressman Tom Graves’ Active Cyber Defense Certainty Act include:
Politico Morning Cyber Security | Scoop: ‘Hack back’ bill gets version 2.0
State: Florida
The data breach: Department of Agriculture and Consumer Services online payment system was hacked and the following information was obtained:
What steps did Florida take? Ordered a review of the department’s cyber security measures & offering free credit monitoring
What was the reaction of gun owners? “ too little too late”
WWSB ABC 7 | Concealed weapons permit holders targeted in massive data breach
Satte Attorneys General reached an $18.5 Million settlement with Target.
Law 360 | State AGs Set Data Security Bar With Record $18.5M Pact
AG Paxton Announces $18.5 Million Settlement with Target to Resolve 2013 Data Breach
Country: Germany
The protections that Germany seeks to combat election hacking:
SC Media | Lawmakers in Germany push for encryption-busting trojan in lead up to election
Who is proposing a cyber national guard? Congressman Will Hurd, Chair of the House’s information technology subcommittee
Why push for a cyber national guard? to help recruit stronger talent to fill cybersecurity roles in the federal government
How does the private sector factor in? a cyber nataional guard would “allow industry professionals to bring innovative ideas back into the federal government without the government having to keep up with the salaries available in the technology community.”
The Hill | House IT chair eyes ‘cyber national guard’ as next legislative push
The GAO has issued a warning about the economic impact of data breaches & the economic boon of the Internet of Things, inter conencted devices.
The economic impact as a result of a data breach is tempered by the economic benefits of health care adopting connected devices (IoT technology). The numbers:
Health Care Dive | GAO warns about IoT security, privacy and safety issues
Thank you for subscribing to our newsletter.
Great things are just around the corner!