From shipping to staffing, the Chamber and its partners have the tools to save your business money and the solutions to help you run it more efficiently. Join the U.S. Chamber of Commerce today to start saving.
Critical Infrastructure Protection, Information Sharing and Cyber Security
Critical Infrastructure Protection and Information Sharing
As 85% of our nation's critical infrastructure is owned or operated by the private sector, it is vital to our economic and national security that business is actively involved in the formulation of homeland security policies. One of the most important next steps to critical infrastructure protection is establishing a set of rules that provide legal protection for companies who conduct risk assessments and share information on vulnerabilities with the appropriate government entities. Without legal and regulatory protection, companies risk exposure to antitrust sanctions stemming from sharing information or to lawsuits from customers over the disclosure of the companies' vulnerability to intentional interference or incapacitation.
U.S. Chamber Activities
The Chamber will work with the appropriate government entities to establish rules that will give critical infrastructure owners the protection they need from liability and freedom of information act requests, while also requiring the government to keep confidential proprietary business information.
The need to address cybersecurity threats to American and global businesses has gone from an IT issue to a top priority for the C-suite and the boardroom. For many businesses, it's not a matter of if an intrusion will happen, but when. In an interconnected world, economic security and national security are linked.
The rapid adoption of information technology has transformed global commerce. By using the internet, people can shop anywhere in the world, without ever leaving their homes. Thanks to the "Information Revolution", businesses are increasingly more productive, are open to additional markets, and more people have access to critical information faster than ever before.
However, this same revolution that propels global commerce also emboldens hackers, thieves, and other cyber criminals. Unprotected computers are susceptible to viruses and worms that can damage or destroy a company's network. These risks must be effectively managed if businesses are to consolidate and build upon the opportunities created by the information revolution.
U.S. Chamber Activities
The Chamber works to influence policies, legislation, and regulations that promote private sector solutions to cyber security. We support legislation and regulations that enable companies to share information about threats to and breach of computer network security without fear of criminal or civil liability.
cyber Issue Experts
Ann M. Beauchesne
Matthew J. Eggers