Data Protection and Cybersecurity Legislation Top Priorities for President Obama



With his State of the Union address rapidly approaching, President Obama has started to discuss cybersecurity proposals that bode well for the industry.

There is a lot of discussion in the industry about President Obama starting to leak out cybersecurity legislation leading up to next week’s State of the Union address. A focus from the President and cyber being a top priority is an encouraging step in the right direction. Without a doubt, security is hard — any IT security pro will tell you that. But, the industry as a whole (end-users, researchers and vendors alike) has to invest properly and innovate properly to get this done. There just aren’t any shortcuts in getting to an improved state of cybersecurity — not just in the private sector, but for government and law enforcement agencies alike.

One of the items President Obama has focused on to date is the need for a robust data breach notification law. Having a data breach notification law would accelerate the need for companies to invest in better data security technology. It would ensure that companies have the correct policies and processes in place in order to identify and report if a breach has been attempted or successful.

It’s very difficult to predict malicious behavior, whether it’s from an insider or an outsider. This is why companies shouldn’t just focus on the network or user level, but on the data level. With the correct protection applied to the data itself, it doesn’t matter whether a disgruntled employee or a skilled hacker is trying to attack a business' data, as neither will be able to access it. Today, attacks against company data are inevitable, but losing sensitive data as a result is not.

Cheri Keith

Please post your comments here

How to Protect Unstructured Sensitive Data

Organizations' most valuable data assets often exist in unstructured form, making them increasing challenging to protect. Learn about Digital Guardian's approach to securing unstructured data in this whitepaper.

Download now

Related Articles
Security is hard. Like, really hard.

But it’s not impossible.

Sticky Fingers via Sticky Keys: A Quest for Data Exfil (Screenshot Demo)

Senior director of cybersecurity Tim Bandos presents the discovery, analysis, and mitigation of a Sticky Key attack in the latest from DG ATAC - our Advanced Threat and Analysis Center.

Opsec Pros Share Overlooked Components of Operational Security Programs

A panel of infosec experts discuss what the most commonly overlooked components of operational security programs are.