Microsoft, Other IT Companies Support Cybersecurity Legislation

The sponsors of comprehensive, bipartisan, risk-based cybersecurity legislation Wednesday thanked Microsoft Corp. and others for supporting the Protecting Cyberspace as a National Asset Act, S. 3480.

Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman, ID-Conn., Ranking Member Susan Collins, R-Me., and Federal Financial Management Subcommittee Chairman Thomas Carper, D-Del., said they were grateful for the support of notable IT players because it provides momentum as the legislation moves forward.

"Our cybersecurity legislation was crafted with precision and care," Lieberman said. "We did our homework. We consulted with a broad spectrum of stakeholders in the field, and we produced a bill that has broad support within the IT industry and the Internet security community.  That support is testament to the strength of our legislation - and to its collaborative approach toward the private sector. I look forward to working with our Senate colleagues to produce a bill for Congress to pass and the President to sign this year."

Collins said: "To create our comprehensive cybersecurity bill, we devoted significant time to solicit and gather multiple stakeholder views from the private sector and from government. We did so to ensure that our legislation would be as effective as possible. Today, support from these major companies and private sector organizations, which are dominant players on the world cyber stage, illustrates the power of that collaboration. The only way that our nation can defend against a debilitating cyber attack is for the private sector and the federal government to work together, in tandem, against this common and virulent enemy. As our bill notes in its title, cyberspace is a national asset, linked to so many critical aspects of daily life in America. We must guard it as such, and that stewardship will require all hands on desk. Our bill creates a true partnership designed to find solutions to the ongoing threat of a national cyber assault."

Carper said: "There's a principle that I have strived to follow since my early days in the House of Representatives and as Governor of the great state of Delaware: 'the government should steer the boat, not row the boat.' That statement is as true today, as it was when I entered government some 30 odd years ago. And it's especially relevant on an issue like cybersecurity which touches every facet of our modern-day society. I want to thank our supporters for taking the time to meet with me and my colleagues over the past few years as we developed this critically important piece of legislation. And to those who are still on the fence with supporting our bill -- or perhaps don't agree with any of it - we still welcome your thoughts, ideas, and participation as we strive to ensure that Congress does it's part to protect one of America's most precious resources, cyberspace."

In a letter to  Lieberman, Collins and Carper, Microsoft managing director for governmental affairs Fred Humphries said: "Your bill, the Protecting Cyberspace as a National Asset Act of 2010 (S. 3480), demonstrates a deep understanding of the challenges that the nation faces in cyberspace, and provides a much needed structure and process to address those issues… If enacted, S. 3480 will help to strengthen the appropriate roles of government in building and implementing a national strategy and also in protecting its own enterprise. We strongly support the intended outcomes of this legislation and key provisions it offers to advance cyber security."

Other industry players have also had positive reaction to the bill:

Verizon Communications Chief Network Security Officer Sara Santarelli said: "Unfunded regulatory mandates and command-and-control type governance must be avoided. The most effective approach, which appears to be the direction that this bill is taking, is a public-private partnership where government provides assistance and expertise to the private sector, coupled with incentives like confidentiality and liability protection to encourage the private sector to implement desired activities and with freedom to take decisive actions."

EMC Corporation and RSA, the Security Division of EMC, Executive Vice President Art Coviello and Chief Security Officer Dave Martin said in a letter: "We thank you for crafting a comprehensive bill that incorporates a risk-based approach to protecting information infrastructure in both the public and private sectors. S. 3480 includes provisions to elevate cyber security in organizations and to enable risk managers in the federal government and covered critical infrastructure sectors, to effectively assess, address, and mitigate cyber security risks to their organizations. We believe that this is the right approach."

Symantec Executive Vice President & Chief Technology Officer Mark Bregman said: "Symantec would like to convey our support for the Protecting Cyberspace as a National Asset Act of 2010. This important legislation will enhance and modernize our nation's overall cybersecurity posture in order to safeguard our critical infrastructure from attack. The bill also importantly recognizes cybersecurity as a shared government and private sector responsibility which requires a coordinated strategy to detect, report and mitigate cyber incidents. We look forward to working with the Committee to help advance this important legislation."

Karen Evans, Former Administrator for E-Government and IT, Office of Management and Budget: "I am really excited about the introduction of this legislation especially as it relates to strengthening the authorities of DHS. It is necessary for the Director of the National Center for Cybersecurity and Communications to have the appropriate authorities to really make a difference and improve the security posture of the federal agencies and critical infrastructure and this bill does exactly that. I am especially excited with the inclusion of the workforce provisions such as the establishment of the cyber talent competitions and challenges. By addressing all aspects of the cybersecurity issue, the passage of this bill will really make a difference in reducing the overall risk to our federal agencies and critical infrastructure."

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3