Cybersecurity Act Of 2012 And The Cloud

Cybersecurity Act of 2012 and the Cloud

Speaking of Laws and Regulations Governing the Cloud Computing Environment, we cannot ignore the latest cybersecurity bills proposed this year. There have been many cyber bills proposed, but none was as important as the Cybersecurity Act of 2012, supported by the Obama Administration. Cybersecurity is a top administration priority for Obama’s second term. His approach to IT security will influence the U.S cloud computing environment over the next four years.

When it comes to cloud computing, security is top-of-mind for each institution, public and private. In a recent study, defense contractor Lockheed Martin and its Cyber Security Alliance partners acquired feedback from government agencies in an effort to measure attitudes around cloud computing and cybersecurity. 85% of government technology decision makers cite cybersecurity as a high priority, with at least one or more related initiatives underway.

This year, in July, senators Joseph Lieberman and Susan Collins proposed the Cybersecurity Act of 2012 . The act would have required companies to voluntary create best practices for the protection of key infrastructures from cyber attacks. In August, The Cybersecurity Act of 2012was defeated in the Senate, but President Obama continues to support some of the cyber security standards.

The Cybersecurity Act of 2012 sets cyber security standards for critical infrastructure, and encourages information sharing on cyber threats between businesses and the U.S. government. Data breach or intrusion risks are seen to be higher for any company that stores personal information or that operates in the cloud.

The Cybersecurity Act of 2012 is the product of a public-private partnership and would:

  •    Allow private industry groups to develop and recommend voluntary cybersecurity best practices
  •    Allow owners of critical infrastructure to participate in a voluntary cybersecurity program.
  •    Permit information-sharing among the private sector and the federal government.
  •    Require designated critical infrastructure to report cyber incidents.

The Obama Administration has been particularly focused on improving government services through the use of cloud computing technologies. Government agencies using cloud computing technologies should keep a close eye on The Cybersecurity Act. No matter the outcome of the legislation, companies still have to ensure that they are compliant with existing laws with respect to cybersecurity.

By Rick Blaisdell /RicksCloud

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Are Cloud Servers The Right Choice For Your Business?

Are Cloud Servers The Right Choice For Your Business?

Cloud servers offer power, flexibility, reliability, and client friendly hosting for small and medium businesses that have outgrown shared hosting. New business hosting clients are bombarded with an incredible diversity of different choices for their site’s hosting. It can be a challenge to negotiate the range of platforms and the marketing hype that many hosting

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts It’s no secret that Cloud Computing is more than just a buzz term as that ship has sailed off a long time ago. More and more companies are adopting the uses and benefits of cloud computing while aggressively factoring cloud services spending into their budget. Included is an excellent

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About Latest Posts Follow Us!CloudTweaksEstablished in 2009,

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving