Cybergovernance Journal Update – 1/13/17
Cybersecurity vulnerabilities don’t just happen at the institutional level, but across interconnected and interdependent systems. A commonly adopted and widely accepted framework could lessen those shared risks.
WSJ, Jan. 6
We can no longer just focus on identifying and protecting critical digital infrastructures, given their interconnections, interdependencies, and risks to all aspects of the economy and society… the private sector and government should collaborate on a roadmap for improving the security and robustness of digital networks…
JDSupra, Jan. 11
The initial framework was the result of a collaborative process involving industry, government and academia, supervised by NIST. The new version adds “new details on managing cyber supply chain risks, clarifying key terms, and introducing measurement methods for cybersecurity…”
CSO, Jan. 12
The NACD Cyber-Risk Oversight Program for corporate directors, confers the CERT Certificate in Cybersecurity Oversight, intended to increase cybersecurity literacy as well as educate boards on their role in overseeing the company’s cyber preparedness…
SC Magazine, Jan. 4
Amassing 523 distinct coding flaws this past year, Google’s Android mobile operating system took top spot with the most discovered vulnerabilities in 2016. Google’s bug-bounty program could be among the reasons that Android accumulated a disproportionate number of reported flaws last year…
CircleID, Jan. 6
November 2, 2016, the Chinese government announced the adoption of a new cybersecurity law which will enter into force on July 1, 2017. The Chinese law stands for a top-down governmental approach. Will we see a new type of conflict between multi-stakeholder networks and national Internet policies?