Cybersecurity Act Of 2012 And The Cloud

Cybersecurity Act of 2012 and the Cloud

Speaking of Laws and Regulations Governing the Cloud Computing Environment, we cannot ignore the latest cybersecurity bills proposed this year. There have been many cyber bills proposed, but none was as important as the Cybersecurity Act of 2012, supported by the Obama Administration. Cybersecurity is a top administration priority for Obama’s second term. His approach to IT security will influence the U.S cloud computing environment over the next four years.

When it comes to cloud computing, security is top-of-mind for each institution, public and private. In a recent study, defense contractor Lockheed Martin and its Cyber Security Alliance partners acquired feedback from government agencies in an effort to measure attitudes around cloud computing and cybersecurity. 85% of government technology decision makers cite cybersecurity as a high priority, with at least one or more related initiatives underway.

This year, in July, senators Joseph Lieberman and Susan Collins proposed the Cybersecurity Act of 2012 . The act would have required companies to voluntary create best practices for the protection of key infrastructures from cyber attacks. In August, The Cybersecurity Act of 2012was defeated in the Senate, but President Obama continues to support some of the cyber security standards.

The Cybersecurity Act of 2012 sets cyber security standards for critical infrastructure, and encourages information sharing on cyber threats between businesses and the U.S. government. Data breach or intrusion risks are seen to be higher for any company that stores personal information or that operates in the cloud.

The Cybersecurity Act of 2012 is the product of a public-private partnership and would:

  •    Allow private industry groups to develop and recommend voluntary cybersecurity best practices
  •    Allow owners of critical infrastructure to participate in a voluntary cybersecurity program.
  •    Permit information-sharing among the private sector and the federal government.
  •    Require designated critical infrastructure to report cyber incidents.

The Obama Administration has been particularly focused on improving government services through the use of cloud computing technologies. Government agencies using cloud computing technologies should keep a close eye on The Cybersecurity Act. No matter the outcome of the legislation, companies still have to ensure that they are compliant with existing laws with respect to cybersecurity.

By Rick Blaisdell /RicksCloud

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery Preventing a Cloud Disaster is one thing. Recovering from a disaster is a whole other area of concern. Today’s infographic provided by CloudVelox outlines some best practices and safeguards in order to help your business make more informed decisions. About Latest Posts Follow Us!CloudTweaksEstablished in 2009,

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future of Work: What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving