On Sept. 16, 2022, the White House released a comprehensive framework for responsible digital asset development and, in particular, cryptocurrency. Agencies across the federal government have been working for the past six months to develop frameworks and policy recommendations to advance the six key priorities identified in President Biden’s March 9 executive order on Ensuring … Continue Reading
In response to recent highly publicized cybersecurity incidents, President Biden signed an Executive Order on May 12, 2021, that contains eight key initiatives aimed at modernizing the federal government’s response to cyberattacks. Although the initiatives outlined in the Executive Order only apply to federal contractors (many of which already comply with agency-specific cybersecurity rules), all … Continue Reading
Many cybersecurity experts have warned that the United States is already engaged in covert cyber warfare against hostile actors around the world. The latest cybersecurity Executive Order reflects formal recognition that, regardless of whether we call it war, cyber threat activity directed at U.S. critical infrastructure has created a national emergency. Exercising authority granted by … Continue Reading
In issuing the Cybersecurity Executive Order last February, President Obama declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America’s economic prosperity in the 21st century will depend on cybersecurity.” Now, important benchmarks in implementing this Executive Order have been reached. … Continue Reading
Co-Authored by: Theodore J. Kobus III A tempting response to the Cybersecurity Executive Order (the “Order”), announced by President Obama at his State of the Union address, is to ignore it. It is vague in key particulars, such as which companies are part of the “critical infrastructure” and therefore subject to the Order. The only … Continue Reading
We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the only item hackers are after. Indeed, the chief of the United States Cyber Command and director of the National Security Agency … Continue Reading