Data Protection and Cybersecurity Legislation Top Priorities for President Obama



With his State of the Union address rapidly approaching, President Obama has started to discuss cybersecurity proposals that bode well for the industry.

There is a lot of discussion in the industry about President Obama starting to leak out cybersecurity legislation leading up to next week’s State of the Union address. A focus from the President and cyber being a top priority is an encouraging step in the right direction. Without a doubt, security is hard — any IT security pro will tell you that. But, the industry as a whole (end-users, researchers and vendors alike) has to invest properly and innovate properly to get this done. There just aren’t any shortcuts in getting to an improved state of cybersecurity — not just in the private sector, but for government and law enforcement agencies alike.

One of the items President Obama has focused on to date is the need for a robust data breach notification law. Having a data breach notification law would accelerate the need for companies to invest in better data security technology. It would ensure that companies have the correct policies and processes in place in order to identify and report if a breach has been attempted or successful.

It’s very difficult to predict malicious behavior, whether it’s from an insider or an outsider. This is why companies shouldn’t just focus on the network or user level, but on the data level. With the correct protection applied to the data itself, it doesn’t matter whether a disgruntled employee or a skilled hacker is trying to attack a business' data, as neither will be able to access it. Today, attacks against company data are inevitable, but losing sensitive data as a result is not.

Cheri Keith

Please post your comments here

How to Protect Unstructured Sensitive Data

Organizations' most valuable data assets often exist in unstructured form, making them increasing challenging to protect. Learn about Digital Guardian's approach to securing unstructured data in this whitepaper.

Download now

Related Articles
2016 Verizon DBIR: It’s All About the Benjamins, Baby

Since the beginning of the data breach era, which most often is pegged to the disclosure of the ChoicePoint compromise, security analysts have been looking for telltale signs of shifts in the techniques and motives that attackers are using. But after more than a decade of breaches and the collection of data about what’s caused them, what’s become clear is that there’s no magic or mystery behind it.

Reflections on the State of the Union address and Obama's cybersecurity proposals

The highly anticipated State of the Union address has come and passed, leaving us with promises for bolstered cybersecurity at the government level.

Looking Back to Look Ahead: My Security Resolutions for 2016

Here are my personal security resolutions for 2016, as well as a retrospective look at 2015 in security.