100%(4)4 out of 4 people found this document helpful
This preview shows page 1 - 3 out of 3 pages.
arguably the most important aspect of the act. The Cybersecurity Act of 2015 allows for private and public sharing of cybersecurity threat information.oWhat should the DHS NCCIC (public) share with private sector organizations? What type of threat information would enable private organizations to better secure their networks?oOn the flip side, what should private organizations share with the NCCIC? As itis written, private organization sharing is completely voluntary. Should this be mandatory? If so, what are the implications to the customers' private data?oThe government is not allowed to collect data on citizens. How should the act be updated to make it better and more value-added for the public-private partnership in regards to cybersecurity?Part 3: Private Sector OrganizationsReview the General Data Protection Regulation (GDPR)of the European Commission (EU). It includes many provisions and arguably strengthens data protection for individuals within the EU. It even includes the right to be forgotten. The United States does not have a similar regulation. There have only been a few regulations implemented related to US citizens'private data, which include medical and financial industries. Some argue implementing regulation such as GDPR in the United States would hinder innovation. They contend that the End User License Agreements (EULA) provide sufficient protections and allow the citizens tomake the choice of what is and is not shared.
oAs a private sector organization, do you believe that an equivalent to GDPR should be implemented in the United States?Part 4: Protecting Critical Infrastructure and the HomelandThe Department of Defense (DoD) Cyber Strategy 2018discusses the protection of critical infrastructure and the homeland.oWhat does that mean to private organizations such as yours?
You've reached the end of your free preview.
Want to read all 3 pages?
National security, NSS, PRIVATE SECTOR ORGANIZATIONS, Cybersecurity technologies