Cybersecurity Act Of 2012 And The Cloud

Cybersecurity Act of 2012 and the Cloud

Speaking of Laws and Regulations Governing the Cloud Computing Environment, we cannot ignore the latest cybersecurity bills proposed this year. There have been many cyber bills proposed, but none was as important as the Cybersecurity Act of 2012, supported by the Obama Administration. Cybersecurity is a top administration priority for Obama’s second term. His approach to IT security will influence the U.S cloud computing environment over the next four years.

When it comes to cloud computing, security is top-of-mind for each institution, public and private. In a recent study, defense contractor Lockheed Martin and its Cyber Security Alliance partners acquired feedback from government agencies in an effort to measure attitudes around cloud computing and cybersecurity. 85% of government technology decision makers cite cybersecurity as a high priority, with at least one or more related initiatives underway.

This year, in July, senators Joseph Lieberman and Susan Collins proposed the Cybersecurity Act of 2012 . The act would have required companies to voluntary create best practices for the protection of key infrastructures from cyber attacks. In August, The Cybersecurity Act of 2012was defeated in the Senate, but President Obama continues to support some of the cyber security standards.

The Cybersecurity Act of 2012 sets cyber security standards for critical infrastructure, and encourages information sharing on cyber threats between businesses and the U.S. government. Data breach or intrusion risks are seen to be higher for any company that stores personal information or that operates in the cloud.

The Cybersecurity Act of 2012 is the product of a public-private partnership and would:

  •    Allow private industry groups to develop and recommend voluntary cybersecurity best practices
  •    Allow owners of critical infrastructure to participate in a voluntary cybersecurity program.
  •    Permit information-sharing among the private sector and the federal government.
  •    Require designated critical infrastructure to report cyber incidents.

The Obama Administration has been particularly focused on improving government services through the use of cloud computing technologies. Government agencies using cloud computing technologies should keep a close eye on The Cybersecurity Act. No matter the outcome of the legislation, companies still have to ensure that they are compliant with existing laws with respect to cybersecurity.

By Rick Blaisdell /RicksCloud

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some…

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to…

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery Preventing a Cloud Disaster is one thing. Recovering from a disaster is a whole other area of concern. Today’s infographic provided by CloudVelox outlines some best practices and safeguards in order to help your business make more informed decisions. About Latest Posts Follow Us!CloudTweaksEstablished in 2009,…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

Featured Sponsors

Watching You Shop: Stores And Mannequins “Read” Their Customers And Respond

Watching You Shop: Stores And Mannequins “Read” Their Customers And Respond

Watching You Shop The mannequin in the store window stares blankly ahead as shoppers look at the clothes it is dressed in and contemplate a purchase. One shopper makes some comments. “It’s nice. I wonder if they have my size.” Another takes a few steps inside the store to see where these particular clothes might…

Sponsors

What To Do When You’ve Outgrown Your Basic Business Software

What To Do When You’ve Outgrown Your Basic Business Software

What To Do When You’ve Outgrown Your Basic Business Software You know that feeling. You have multiple business products that aren’t communicating, meaning your employees are doing more work, uploading redundant data into different systems. The software is sluggish and can’t be accessed via browser. You’re paying per user, which is starting to get painful.…

Placement Opportunities - Find Out!

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter