Critical Infrastructure Protection, Information Sharing and Cyber Security
Public Sector Links
DHS 2009 Cyber Security Awareness Month – "Our Shared Responsibility" and other resources
DHS Cyber Security Vulnerability Assessment (CVSA) Description
DHS CSVA (17MB)
DHS National Strategy to Secure Cyberspace (Feb. 2003)
DHS United States Computer Emergency Readiness Response Team (US-CERT)
FBI Director Mueller speech on cyber crime (Oct. 2009)
FTC's "Protecting Personal Information: A Guide for Business"
National Association of State Chief Information Officers' (NASCIO) Cyber Security Awareness Website
National Institute of Standards and Technology's (NIST) Computer Security Resource Center
NISTIR 10/9/09 Federal Register notice
NIST Guidelines for Teleworking Security (June 2009)
White House Cyberspace Policy Review
and related documents (May 2009)
White House Announces the New Cyber Security Coordinator (Dec. 22, 2009)
Private Sector Links
Microsoft Online Safety – Consumer Online Safety Education
Microsoft Online Safety – Fraud Prevention
National Cyber Security Alliance (NCSA)
U.S. Chamber-NCSA Resources for Business tip sheet
Verizon's 2009 and 2008 data breach investigation reports
International Links
Critical Infrastructure Protection and Information Sharing
Background
As 85% of our nation's critical infrastructure is owned or operated by the private sector, it is vital to our economic and national security that business is actively involved in the formulation of homeland security policies. One of the most important next steps to critical infrastructure protection is establishing a set of rules that provide legal protection for companies who conduct risk assessments and share information on vulnerabilities with the appropriate government entities. Without legal and regulatory protection, companies risk exposure to antitrust sanctions stemming from sharing information or to lawsuits from customers over the disclosure of the companies' vulnerability to intentional interference or incapacitation.
U.S. Chamber Activities
The Chamber will work with the appropriate government entities to establish rules that will give critical infrastructure owners the protection they need from liability and freedom of information act requests, while also requiring the government to keep confidential proprietary business information.
Cyber Security
Background
The rapid adoption of information technology has transformed global commerce. By using the internet, people can shop anywhere in the world, without ever leaving their homes. Thanks to the "Information Revolution", businesses are increasingly more productive, are open to additional markets, and more people have access to critical information faster than ever before.
However, this same revolution that propels global commerce also emboldens hackers, thieves, and other cyber criminals. Unprotected computers are susceptible to viruses and worms that can damage or destroy a company's network. These risks must be effectively managed if businesses are to consolidate and build upon the opportunities created by the information revolution.
U.S. Chamber Activities
The Chamber works to influence policies, legislation, and regulations that promote private sector solutions to cyber security. We support legislation and regulations that enable companies to share information about threats to and breach of computer network security without fear of criminal or civil liability.
2011 National Strategy for Trusted Identities in Cyberspace Release Event
As a way to combat online identity theft in the age of digital shoplifting, the White House has developed a plan dubbed the National Strategy for Trusted Identities in Cyberspace, or NSTIC. "Today, we take another major step; this one to ensure that the Internet's security features keep up with the many different types of online transactions people now engage in," Commerce Secretary Gary Locke (Above) said at the unveiling at the U.S. Chamber of Commerce last week.
Howard A. Schmidt, White House Cybersecurity Coordinator, says the strategy does not call for a card but a choice for individuals.



