The Cybersecurity Act of 2015 allows for private and public sharing of

The cybersecurity act of 2015 allows for private and

This preview shows page 1 - 3 out of 3 pages.

arguably the most important aspect of the act. The Cybersecurity Act of 2015 allows for private and public sharing of cybersecurity threat information. o What should the DHS NCCIC (public) share with private sector organizations? What type of threat information would enable private organizations to better secure their networks? o On the flip side, what should private organizations share with the NCCIC? As it is written, private organization sharing is completely voluntary. Should this be mandatory? If so, what are the implications to the customers' private data? o The government is not allowed to collect data on citizens. How should the act be updated to make it better and more value-added for the public-private partnership in regards to cybersecurity? Part 3: Private Sector Organizations Review the General Data Protection Regulation (GDPR) of the European Commission (EU). It includes many provisions and arguably strengthens data protection for individuals within the EU. It even includes the right to be forgotten. The United States does not have a similar regulation. There have only been a few regulations implemented related to US citizens' private data, which include medical and financial industries. Some argue implementing regulation such as GDPR in the United States would hinder innovation. They contend that the End User License Agreements (EULA) provide sufficient protections and allow the citizens to make the choice of what is and is not shared.
Image of page 1
o As a private sector organization, do you believe that an equivalent to GDPR should be implemented in the United States? Part 4: Protecting Critical Infrastructure and the Homeland The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland. o What does that mean to private organizations such as yours?
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 3 pages?

  • Fall '14
  • unknown
  • National security, NSS, PRIVATE SECTOR ORGANIZATIONS, Cybersecurity technologies

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture