Data Protection and Cybersecurity Legislation Top Priorities for President Obama



With his State of the Union address rapidly approaching, President Obama has started to discuss cybersecurity proposals that bode well for the industry.

There is a lot of discussion in the industry about President Obama starting to leak out cybersecurity legislation leading up to next week’s State of the Union address. A focus from the President and cyber being a top priority is an encouraging step in the right direction. Without a doubt, security is hard — any IT security pro will tell you that. But, the industry as a whole (end-users, researchers and vendors alike) has to invest properly and innovate properly to get this done. There just aren’t any shortcuts in getting to an improved state of cybersecurity — not just in the private sector, but for government and law enforcement agencies alike.

One of the items President Obama has focused on to date is the need for a robust data breach notification law. Having a data breach notification law would accelerate the need for companies to invest in better data security technology. It would ensure that companies have the correct policies and processes in place in order to identify and report if a breach has been attempted or successful.

It’s very difficult to predict malicious behavior, whether it’s from an insider or an outsider. This is why companies shouldn’t just focus on the network or user level, but on the data level. With the correct protection applied to the data itself, it doesn’t matter whether a disgruntled employee or a skilled hacker is trying to attack a business' data, as neither will be able to access it. Today, attacks against company data are inevitable, but losing sensitive data as a result is not.

Cheri Keith

Please post your comments here

How to Protect Unstructured Sensitive Data

Organizations' most valuable data assets often exist in unstructured form, making them increasing challenging to protect. Learn about Digital Guardian's approach to securing unstructured data in this whitepaper.

Download now

Related Articles
2016 Verizon DBIR: It’s All About the Benjamins, Baby

Since the beginning of the data breach era, which most often is pegged to the disclosure of the ChoicePoint compromise, security analysts have been looking for telltale signs of shifts in the techniques and motives that attackers are using. But after more than a decade of breaches and the collection of data about what’s caused them, what’s become clear is that there’s no magic or mystery behind it.

Everything Old is New Again

The adage that there is nothing new under the sun is especially relevant in the security field. Attacks and the technologies that spring up to defend against them tend to run in cycles, and the recent resurgence of DDoS attacks of various stripes has shown once again that we still don’t have a real handle on how to stop this problem.

Americans and Cybersecurity: Five Surprising Facts

Most Americans have been the victim of a cybercrime, and don’t expect things to get better anytime soon.