Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Is Regulation Inevitable for Enterprise Security?

    Written by

    Larry Dignan
    Published June 2, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Are you ready to declare your company secure against attacks from cyberterrorists?

      If youre not, get moving. The odds are increasing that in the not-so-distant future, legislators will make corporate America adhere to yet-to-be-defined best practices in cybersecurity.

      Just as the Sarbanes-Oxley Act of 2002 is designed to assure investors that financial records of a corporation are properly prepared and accurate, and the Health Insurance Portability and Accountability Act mandates better procedures for maintaining and exchanging information on medical patients, the processes by which you secure your data and computing resources may be the next facet of your operations to face compliance legislation.

      Rep. Adam Putnam (R-Fla.) last fall drafted the Corporate Information Security Accountability Act of 2003, which would require companies to button down their information systems. The bill has not yet gone before the House of Representatives, but many of the proposals in Putnams draft as well as other recommendations are being batted about in a working group created by the subcommittee Putnam chairs, the Government Reform Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census.

      In the name of protecting national infrastructure, you may be asked to conduct annual security audits, produce an inventory of key assets and their vulnerabilities, carry cybersecurity insurance and even have your security measures verified by independent third parties, if the core features of the proposed legislation make it to the floor of the House.

      The work is proceeding. In April, the working group submitted 23 suggestions to the subcommittee, including a provision that would shield companies from large, punitive lawsuits over security breaches.

      Whats at stake, in Putnams view, is domestic security. Not only could terrorists take down your systems, they could also use your computing resources to attack federal, state and local computer networks.

      Putnams subcommittee resides under the Committee on Government Reform, headed by Rep. Tom Davis (R-Va.), who sponsored the Federal Information Security Management Act of 2002 (FISMA), which requires federal agencies to identify information security risks and fix problem areas.

      Putnams staff is evaluating the proposals and will kick them back to the working group, which includes representatives of 22 trade associations, ranging from the National Association of Manufacturers (NAM) to the Business Software Alliance to the U.S. Chamber of Commerce. Few of the members have actually implemented technology systems and security controls.

      No timeline has been set on when legislation could reach the House floor, but Chrisan Herrod, a professor at the National Defense University, a joint military-educational facility, says she doesnt expect Putnam to push a bill before the November election. Putnam says his timeline is “short,” but doesnt define it. Meanwhile, groups such as the Information System Security Association (ISSA) are working to identify best-practices guidelines for corporations, and hope companies will adopt them out of self-interest.

      But, if they dont, “we reserve our right to legislate,” says Bob Dix, staff director of Putnams subcommittee. “What did it take to get corporate America motivated about Y2K? It took a Securities and Exchange Commission requirement to include a readiness statement in the annual report.”

      Check out eWEEK.coms Security Center at http://security.eweek.com for the latest security news, reviews and analysis.

      Be sure to add our eWEEK.com developer and Web services news feed to your RSS newsreader or My Yahoo page

      Next Page: Is more regulation inevitable?

      Is Regulation Inevitable for Enterprise Security? – Page 2

      Herrod, along with security experts such as Darwin John, the former chief information officer of the Federal Bureau of Investigation, see more regulation as inevitable. Why? Corporations arent going to voluntarily adopt best practices and revamp security systems when the returns on investment are murky.

      At Fannie Mae, Herrod helped ensure that the mortgage company matched its business partners compliance with the Gramm-Leach-Bliley Act of 1999, which requires financial data privacy. At GlaxoSmithKline, her projects revolved around compliance with Food and Drug Administration rules. “The only reason I got any money to implement was regulation,” Herrod says.

      Putnams effort is the latest to beef up the nations cybersecurity. President Clinton issued a directive on information security in 1998, outlining basic requirements such as antivirus protection and authentification. President Bush followed up with a plan that urged a public-private partnership to secure the Internet. That plan, penned in 2003 by Richard Clarke, former special advisor to the president for cyberspace security, has had little impact so far.

      Meanwhile, cybersecurity is getting worse. In the last six weeks, source code from Cisco Systems was leaked on the Internet, the Sasser worm wreaked havoc on corporate systems and Gartner reported that consumers lost $1.2 billion in 2003 due to “phishing attacks.”

      Despite the lack of success from the governments previous plans, security experts are taking Putnams legislation push seriously because Congress was able to pass FISMA two years ago. Why not expand a cybersecurity edict to the private sector? “Ultimately the government is going to have to stand up and have clear requirements,” says AMR analyst Lance Travis, adding that the private sector is unlikely to follow information best practices in unison because of costs.

      Clarke says he doesnt favor additional regulation to govern cybersecurity, but would like current mandates to be more specific on information security. He also advocates a series of steps—avoid software vendors with insecure applications, require two-factor authentication, benchmark the security of applications, diversify software vendors, and so on—that both the public and private sectors can take.

      In any case, the clock is ticking. Recent cyber-attacks will only get worse unless the public and private sectors cooperate to beef up information security. One problem: Companies dont consider their networks part of the national infrastructure. Since all networks are interconnected, however, technology executives need to realize that their corporate networks could easily become a staging area for a cyberterrorism attack.

      “What we see today is the tip of the iceberg of what could happen if a terrorist set out to do something,” says Clarke. “As long as [an attack] is possible, you run the risk that somebody will do something more significant.”

      Next Page: What you can do today to get ahead of a cybersecurity regulation.

      Is Regulation Inevitable for Enterprise Security? – Page 3

      So what can you do today to get ahead of a cybersecurity regulation?

      For starters, track developments from Putnams subcommittee at http://reform.house.gov/TIPRC . Under the drafts key provisions, companies would be required to:

      • Perform a security audit to assess the risk of unauthorized access, disruption, modification and destruction of information and information systems.
      • Investigate cyber-risk insurance. Putnam says the insurance industry should cut prices for companies that meet best practices.
      • Take an inventory of critical infrastructure assets such as stray routers, servers and areas where theres easy access to networks. Herron says inventory is the most underrated security chore.
      • Develop risk mitigation, incident response and business continuity plans, and test these procedures quarterly to annually, depending on best practices for each area.
      • Submit to an information security audit by an independent third party.

      Four of these five practices are considered by security experts to be no-brainers. The final one—an information security audit—could be stickier. For starters, its unclear whether a newly created or existing agency would oversee the audits. Putnams draft puts information security verification under the SEC, but analysts such as Forrester Researchs Michael Rasmussen say such monitoring is “out of scope” for the agency.

      According to David Peyton, director of technology policy for NAM, the biggest issue surrounding any cybersecurity legislation is the lack of generally accepted practices. “Computer security audits are 80 to 90 years behind financial audits,” Peyton says.

      Some of the minimal best practices listed by ISSA include setting up a security policy with baseline expectations for security procedures and guidelines, establishing accountability for information access, cataloging types of information and correlating the level of risk with the value of the data.

      OUT OF THE LOOP?
      If executives dont get involved soon, they could find themselves adhering to standards set by Beltway regulators who operated without input from the technology executives and project managers who are responsible for and implement information security procedures, according to Herrod.

      “Whats scary about this is the people driving dont have business user input,” she says. “I dont think its thoroughly thought out—not that Putnam isnt right.”

      The lack of user input is not terribly surprising given the reaction from technology executives contacted by [itals]Baseline. Most executives had never heard of Putnam or his subsequent working group. However, executives dont doubt that cybersecurity regulation is on the way.

      David Womeldorf, chief technology officer of beverage equipment parts distributor Bevcore Solutions in Osseo, Minn., says he is comfortable with having security practices verified by a third party. Womeldorf doesnt want to disclose his security setup, but would be comfortable with an independent agent offering the public a “fairness statement, as in the accounting world, affirming that proper practices are in place.

      While its still early, security experts like John, now a principal at Blackwell Consulting, are convinced companies are going to face more information security regulation from legislators like Putnam: “This is a train going someplace, and its understandable that someone wants to lead it.”

      Larry Dignan
      Larry Dignan
      Larry formerly served as the East Coast news editor and Finance Editor at CNET News.com. Prior to that, he was editor of Ziff Davis Inter@ctive Investor, which was, according to Barron's, a Top-10 financial site in the late 1990s. Larry has covered the technology and financial services industry since 1995, publishing articles in WallStreetWeek.com, Inter@ctive Week, The New York Times, and Financial Planning magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.