Scarinci Hollenbeck, LLC
The Firm
201-896-4100 info@sh-law.comFirm Insights
Author: Scarinci Hollenbeck, LLC
Date: June 14, 2018
The Firm
201-896-4100 info@sh-law.comSo far this year, several private and public entities, including the City of Atlanta and Delta Airlines, suffered high-profile cyber-attacks. In its latest cybersecurity strategy, the U.S. Department of Homeland Security (DHS) is advocating increased information sharing as a means to prevent and address threats.
In a press statement, Secretary of Homeland Security Kirstjen Nielsen emphasized that the United States has reached a “historic turning point” with respect to cyber threats. “Digital security is now converging with personal and physical security, and it is clear that our cyber adversaries can now threaten the very fabric of our republic itself,” Nielsen said. “In an age of brand-name breaches, we must think beyond the defense of specific assets—and confront systemic risks that affect everyone from tech giants to homeowners. Our strategy outlines how DHS will leverage its unique capabilities on the digital battlefield to defend American networks and get ahead of emerging cyber threats.”
The latest DHS cybersecurity guidance, which was required under section 1912 of the 2017 National Defense Authorization Act, does not establish any groundbreaking new strategies. However, it does suggest that the agency is asserting itself as the lead federal agency with respect to bolstering the country’s cyber defenses. It also confirms that DHS strongly believes that collaboration across the wider cybersecurity community, including with the federal government, state and local governments, industry, and the international community, is the best way to mitigate cyber threats.
According to DHS, its strategy is built around the following goals:
The DHS strategy places emphasis on encouraging non-government entities to report cyber incidents, and work with other incident responders to develop consistent processes for notifying potential victims. “Encouraging a culture of reporting, notification, and information sharing will increase the security and resilience of critical infrastructure, help prevent, counter, and disrupt illicit cyber actors, and enable the government to assess and potentially manage responses to incidents of unknown severity,” the strategy states.
Understandably, many businesses are wary about voluntarily sharing information with federal regulators. Accordingly, it is imperative that agencies like the DHS continue to update and fine-tune their cyber and data protection strategies, particularly with respect to preventing information provided by the private sector from being misused.
The DHS strategy also highlights that growing risks posed by the Internet of Things (IoT) and cloud technology. More than 20 billion devices are expected to be connected to the Internet by 2020, according to the agency.
“The continued globalization of the information technology supply chain and shifting of information and services to a cloud or other shared infrastructure introduces additional risks. As Internet-connected and other new technologies rapidly proliferate, the number of attack vectors also increases,” DHS states. “Developers and manufacturers of many internet-of-things and other consumer devices are frequently motivated by speed to market rather than strong security. Even specialized technologies, like medical devices and industrial control systems, remain susceptible to compromise.”
To foster more secure and resilient technologies and networks and create a more defensible cyber ecosystem, DHS aims to:
For businesses, the DHS cyber guidance confirms that the federal government believes that the private sector plays a critical role in protecting the country’s infrastructure and other critical resources from cyber threats. Accordingly, it will continue to roll out best practices for the private sector and encourage their adoption.
Do you have any feedback, thoughts, reactions or comments concerning this topic? Feel free to leave a comment below for Fernando M. Pinguelo. If you have any questions about this post, please contact me or the Scarinci Hollenbeck attorney with whom you work at 201-806-3364. To learn more about data privacy and security, visit eWhiteHouse Watch – Where Technology, Politics, and Privacy Collide (http://ewhwblog.com).
No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.
Your home is likely your greatest asset, which is why it is so important to adequately protect it. Homeowners insurance protects you from the financial costs of unforeseen losses, such as theft, fire, and natural disasters, by helping you rebuild and replace possessions that were lost While the definition of “adequate” coverage depends upon a […]
Author: Jesse M. Dimitro
Making a non-contingent offer can dramatically increase your chances of securing a real estate transaction, particularly in competitive markets like New York City. However, buyers should understand that waiving contingencies, including those related to financing, or appraisals, also comes with significant risks. Determining your best strategy requires careful analysis of the property, the market, and […]
Author: Jesse M. Dimitro
Business Transactional Attorney Zemel to Spearhead Strategic Initiatives for Continued Growth and Innovation Little Falls, NJ – February 21, 2025 – Scarinci & Hollenbeck, LLC is pleased to announce that Partner Fred D. Zemel has been named Chair of the firm’s Strategic Planning Committee. In this role, Mr. Zemel will lead the committee in identifying, […]
Author: Scarinci Hollenbeck, LLC
Big changes sometimes occur during the life cycle of a contract. Cancelling a contract outright can be bad for your reputation and your bottom line. Businesses need to know how to best address a change in circumstances, while also protecting their legal rights. One option is to transfer the “benefits and the burdens” of a […]
Author: Dan Brecher
What is a trade secret and why you you protect them? Technology has made trade secret theft even easier and more prevalent. In fact, businesses lose billions of dollars every year due to trade secret theft committed by employees, competitors, and even foreign governments. But what is a trade secret? And how do you protect […]
Author: Ronald S. Bienstock
If you are considering the purchase of a property, you may wonder — what is title insurance, do I need it, and why do I need it? Even seasoned property owners may question if the added expense and extra paperwork is really necessary, especially considering that people and entities insured by title insurance make fewer […]
Author: Patrick T. Conlon
No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.
Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.
Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.
So far this year, several private and public entities, including the City of Atlanta and Delta Airlines, suffered high-profile cyber-attacks. In its latest cybersecurity strategy, the U.S. Department of Homeland Security (DHS) is advocating increased information sharing as a means to prevent and address threats.
In a press statement, Secretary of Homeland Security Kirstjen Nielsen emphasized that the United States has reached a “historic turning point” with respect to cyber threats. “Digital security is now converging with personal and physical security, and it is clear that our cyber adversaries can now threaten the very fabric of our republic itself,” Nielsen said. “In an age of brand-name breaches, we must think beyond the defense of specific assets—and confront systemic risks that affect everyone from tech giants to homeowners. Our strategy outlines how DHS will leverage its unique capabilities on the digital battlefield to defend American networks and get ahead of emerging cyber threats.”
The latest DHS cybersecurity guidance, which was required under section 1912 of the 2017 National Defense Authorization Act, does not establish any groundbreaking new strategies. However, it does suggest that the agency is asserting itself as the lead federal agency with respect to bolstering the country’s cyber defenses. It also confirms that DHS strongly believes that collaboration across the wider cybersecurity community, including with the federal government, state and local governments, industry, and the international community, is the best way to mitigate cyber threats.
According to DHS, its strategy is built around the following goals:
The DHS strategy places emphasis on encouraging non-government entities to report cyber incidents, and work with other incident responders to develop consistent processes for notifying potential victims. “Encouraging a culture of reporting, notification, and information sharing will increase the security and resilience of critical infrastructure, help prevent, counter, and disrupt illicit cyber actors, and enable the government to assess and potentially manage responses to incidents of unknown severity,” the strategy states.
Understandably, many businesses are wary about voluntarily sharing information with federal regulators. Accordingly, it is imperative that agencies like the DHS continue to update and fine-tune their cyber and data protection strategies, particularly with respect to preventing information provided by the private sector from being misused.
The DHS strategy also highlights that growing risks posed by the Internet of Things (IoT) and cloud technology. More than 20 billion devices are expected to be connected to the Internet by 2020, according to the agency.
“The continued globalization of the information technology supply chain and shifting of information and services to a cloud or other shared infrastructure introduces additional risks. As Internet-connected and other new technologies rapidly proliferate, the number of attack vectors also increases,” DHS states. “Developers and manufacturers of many internet-of-things and other consumer devices are frequently motivated by speed to market rather than strong security. Even specialized technologies, like medical devices and industrial control systems, remain susceptible to compromise.”
To foster more secure and resilient technologies and networks and create a more defensible cyber ecosystem, DHS aims to:
For businesses, the DHS cyber guidance confirms that the federal government believes that the private sector plays a critical role in protecting the country’s infrastructure and other critical resources from cyber threats. Accordingly, it will continue to roll out best practices for the private sector and encourage their adoption.
Do you have any feedback, thoughts, reactions or comments concerning this topic? Feel free to leave a comment below for Fernando M. Pinguelo. If you have any questions about this post, please contact me or the Scarinci Hollenbeck attorney with whom you work at 201-806-3364. To learn more about data privacy and security, visit eWhiteHouse Watch – Where Technology, Politics, and Privacy Collide (http://ewhwblog.com).
Let`s get in touch!
Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!