{"id":493,"date":"2003-12-07T00:00:00","date_gmt":"2003-12-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/07\/cybersecurity-groups-work-on-white-papers\/"},"modified":"2021-12-30T11:37:28","modified_gmt":"2021-12-30T11:37:28","slug":"cybersecurity-groups-work-on-white-papers","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/07\/cybersecurity-groups-work-on-white-papers\/","title":{"rendered":"Cybersecurity groups work on white papers"},"content":{"rendered":"<p>Five working groups formed at the National Cyber Security Summit released initial reports that focus on delivering concrete results within a year, task force leaders said on Thursday.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The working groups have pledged to release white papers by 1 March, 2004, that outline their recommendations for securing businesses and consumers and creating more secure software.<\/p>\n<p>Critics have snubbed the United States&#8217; cybersecurity policy &#8212; the National Strategy to Secure Cyberspace &#8212; as largely voluntary and lacking regulatory prescriptions.<\/p>\n<p>The four organisations that sponsored the Summit were the Business Software Alliance, the Information Technology Association of America, the TechNet lobbying group and the US Chamber of Commerce.<\/p>\n<p>Security experts formed five groups to focus on specific problem areas: creating awareness in home computer users and small businesses; establishing a cybersecurity early warning system; making information security part of corporate governance; advocating technical best practices for security; and pushing security improvements into the software development process.<\/p>\n<p>Despite the pressure to deliver, reigning in the groups to focus on concrete ideas that could be implemented quickly was a task, Oracle&#8217;s Davidson said.<\/p>\n<p>More info: [url=http:\/\/news.zdnet.co.uk\/business\/0,39020645,39118329,00.htm]http:\/\/news.zdnet.co.uk\/business\/0,39020645,39118329,00.htm[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-493","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=493"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/493\/revisions"}],"predecessor-version":[{"id":2980,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/493\/revisions\/2980"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}