Critical Infrastructure Protection, Information Sharing and Cyber Security

Public Sector Links

FCC Small Biz Cyber Planner

DHS 2009 Cyber Security Awareness Month – "Our Shared Responsibility" and other resources

DHS Cyber Security Vulnerability Assessment (CVSA) Description

DHS CSVA (17MB)

DHS National Strategy to Secure Cyberspace (Feb. 2003)

 

DHS United States Computer Emergency Readiness Response Team (US-CERT)

 

FBI Director Mueller speech on cyber crime (Oct. 2009)

 

FTC's "Protecting Personal Information: A Guide for Business"

 

FTC's On Guard Online

 

National Association of State Chief Information Officers' (NASCIO) Cyber Security Awareness Website

 

National Institute of Standards and Technology's (NIST) Computer Security Resource Center

 

NIST Publications

 

NIST Draft Interagency Report (NISTIR) 7628 – 9/25/09 Smart Grid Cyber Security Strategy and Requirements

 

NISTIR 10/9/09 Federal Register notice

 

NIST Guidelines for Teleworking Security (June 2009)

 

White House Cyberspace Policy Review

and related documents (May 2009)

 

White House Announces the New Cyber Security Coordinator (Dec. 22, 2009)

 

Private Sector Links

 

Center for Strategic and International Studies' Commission (CSIS) on Cyber Security for the 44th Presidency report (Dec. 2008)

Microsoft Online Safety – Consumer Online Safety Education

Microsoft Online Safety – Fraud Prevention

National Cyber Security Alliance (NCSA)

NCSA tips for small business

NCSA tools & resources

U.S. Chamber-NCSA Resources for Business tip sheet

Verizon's 2009 and 2008 data breach investigation reports

International Links

International Standards Organization

Critical Infrastructure Protection and Information Sharing

Background
As 85% of our nation's critical infrastructure is owned or operated by the private sector, it is vital to our economic and national security that business is actively involved in the formulation of homeland security policies. One of the most important next steps to critical infrastructure protection is establishing a set of rules that provide legal protection for companies who conduct risk assessments and share information on vulnerabilities with the appropriate government entities. Without legal and regulatory protection, companies risk exposure to antitrust sanctions stemming from sharing information or to lawsuits from customers over the disclosure of the companies' vulnerability to intentional interference or incapacitation.

U.S. Chamber Activities
The Chamber will work with the appropriate government entities to establish rules that will give critical infrastructure owners the protection they need from liability and freedom of information act requests, while also requiring the government to keep confidential proprietary business information.

Cyber Security

Background
The rapid adoption of information technology has transformed global commerce. By using the internet, people can shop anywhere in the world, without ever leaving their homes. Thanks to the "Information Revolution", businesses are increasingly more productive, are open to additional markets, and more people have access to critical information faster than ever before.

However, this same revolution that propels global commerce also emboldens hackers, thieves, and other cyber criminals. Unprotected computers are susceptible to viruses and worms that can damage or destroy a company's network. These risks must be effectively managed if businesses are to consolidate and build upon the opportunities created by the information revolution.

U.S. Chamber Activities
The Chamber works to influence policies, legislation, and regulations that promote private sector solutions to cyber security. We support legislation and regulations that enable companies to share information about threats to and breach of computer network security without fear of criminal or civil liability.

2011 National Strategy for Trusted Identities in Cyberspace Release Event

As a way to combat online identity theft in the age of digital shoplifting, the White House has developed a plan dubbed the National Strategy for Trusted Identities in Cyberspace, or NSTIC. "Today, we take another major step; this one to ensure that the Internet's security features keep up with the many different types of online transactions people now engage in," Commerce Secretary Gary Locke (Above) said at the unveiling at the U.S. Chamber of Commerce last week.

Howard A. Schmidt, White House Cybersecurity Coordinator, says the strategy does not call for a card but a choice for individuals.

View the Details of the NSTIC Program    HERE