Data Protection and Cybersecurity Legislation Top Priorities for President Obama



With his State of the Union address rapidly approaching, President Obama has started to discuss cybersecurity proposals that bode well for the industry.

There is a lot of discussion in the industry about President Obama starting to leak out cybersecurity legislation leading up to next week’s State of the Union address. A focus from the President and cyber being a top priority is an encouraging step in the right direction. Without a doubt, security is hard — any IT security pro will tell you that. But, the industry as a whole (end-users, researchers and vendors alike) has to invest properly and innovate properly to get this done. There just aren’t any shortcuts in getting to an improved state of cybersecurity — not just in the private sector, but for government and law enforcement agencies alike.

One of the items President Obama has focused on to date is the need for a robust data breach notification law. Having a data breach notification law would accelerate the need for companies to invest in better data security technology. It would ensure that companies have the correct policies and processes in place in order to identify and report if a breach has been attempted or successful.

It’s very difficult to predict malicious behavior, whether it’s from an insider or an outsider. This is why companies shouldn’t just focus on the network or user level, but on the data level. With the correct protection applied to the data itself, it doesn’t matter whether a disgruntled employee or a skilled hacker is trying to attack a business' data, as neither will be able to access it. Today, attacks against company data are inevitable, but losing sensitive data as a result is not.

Cheri Keith

Please post your comments here

How to Protect Unstructured Sensitive Data

Organizations' most valuable data assets often exist in unstructured form, making them increasing challenging to protect. Learn about Digital Guardian's approach to securing unstructured data in this whitepaper.

Download now

Related Articles
At RSA, Govt. Says Attribution Key to Cyber Strategy

Despite the difficulty of attributing cyber attacks, government officials stood by attribution as a key tool in responding to cyber incidents.

Having The Talk About Security With Your Family

It’s the most painful time of the year, when millions of us go home for the holidays and get accosted by relatives desperate for tech support. Our civilian brethren are going to be looking for advice about security and privacy, and, this year, perhaps more than any other in recent memory, it’s vital that we get the right information to them.

Sony Pictures Hacked, Blackmailed by Attackers

Are we doomed to be victims of these attacks forever or can something really be done to prevent them?