Your search for executive order returned 36 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Opinion Executive order can provide boost

Executive order can provide boost

The rule may help leaders better understand the impact of cyber risks, says PwC's David Burg and Laurie Schive.

Opinion Executive order, NIST initiatives may help electric providers get ahead of the threat

Executive order, NIST initiatives may help electric providers get ahead of the threat

While a major attack has yet to take place on the U.S. energy sector, now is the right time for these critical infrastructure providers to ready their defenses.

News

NIST releases draft of security framework

The document was born out of President Obama's executive order to enhance critical infrastructure protection.

News NIST debuts preliminary framework for securing critical infrastructure

NIST debuts preliminary framework for securing critical infrastructure

A draft of the voluntary framework was released by NIST in support of President Obama's executive order on critical infrastructure security.

Webcast

Protecting Critical Infrastructure Against Advanced Cyber Threats

The national and economic security of a nation depends on the reliable functioning of critical infrastructure. The physical and electronic elements comprising critical infrastructure are increasingly and inextricably interwoven. Enemies of the state and others who would benefit from the disruption of critical infrastructure realize this and can turn to...

Brief

Los Angeles announces its first Cyber Intrusion Command Center

America's second-largest city, Los Angeles, has announced the creation of its first ever Cyber Intrusion Command Center, intended to combat threats aimed at city services.

News

Data breach bill dies as Canadian Parliament prorogues

Two controversial pieces of privacy legislation have been killed after Canada's prime minister prorogued parliament.

News A seat earned at the Round Table

A seat earned at the Round Table

The role of the CISO is rapidly garnering a strategic voice at many organizations.

Document 2013 ebook on application security

2013 ebook on application security

Applications are the soft underbelly of most organizations. And, because of the nature of applications - they may appear to be working fine -- the extent of their vulnerability is often unclear.

News NIST releases security framework for critical infrastructure

NIST releases security framework for critical infrastructure

On Wednesday, NIST published the 41-page guidance after months of feedback from the community.

News Report: Senator drafts information-sharing bill in the vein of CISPA

Report: Senator drafts information-sharing bill in the vein of CISPA

On Tuesday, Senator Dianne Feinstein, D-Calif., revealed that the draft bill was in the works and she planned to move forward with the legislation.

News

"Siesta" espionage campaign uncovered by researchers

Organizations in the finance, telecommunications, defense, and transportation industries have been targeted by attackers that may be looking to steal valuable information.

News

Canadian privacy commissioner proposes legal overhaul

Canadian Privacy Commissioner Jennifer Stoddart has called for fundamental reforms to Canada's privacy law that would make companies more accountable for privacy violations.

Opinion In search of some cheer

In search of some cheer

Like no other year before it, 2013 illustrated for the entire globe just how essential cyber security is to business endurance, economic durability and personal rights to privacy.

News

White House offers incentives for critical infrastructure companies participating in cyber security program

The tentative list of incentives would entice companies to participate in the "Cyber Security Framework," a measure that aims to help the nation stave off industrial attacks.

News

Google hackers wanted to know which Chinese intel operatives were being watched

Attackers who raided Google in 2010 to learn information about Chinese human rights activists were also trying to gain insight on which Chinese intelligence agents were on the radar of U.S. authorities, according to a report.

News RSA 2014: Coviello discusses NSA controversy in keynote address

RSA 2014: Coviello discusses NSA controversy in keynote address

In his keynote address at the RSA Conference in San Francisco, Art Coviello discussed the NSA allegations and also outlined four principles that would serve as a set of standards when it comes to cyber warfare.

Feature From private sector to government

From private sector to government

Phyllis Schneck takes a level-headed approach to how the DHS should address potential attacks against critical infrastructure.

Opinion Horse trading 2.0: Information is a valued commodity

Horse trading 2.0: Information is a valued commodity

The power of information as a commodity only continues to deepen as it satisfies so many disparate needs and wants.

Opinion The coming Internet of Things

The coming Internet of Things

We don't need to make the same mistakes of the first generation of PCs and servers, says the SANS Institute's John Pescatore.

Page 1 of 2

Sign up to our newsletters

POLL