{"id":528,"date":"2004-03-08T00:00:00","date_gmt":"2004-03-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/03\/08\/the-path-to-safety\/"},"modified":"2021-12-30T11:37:35","modified_gmt":"2021-12-30T11:37:35","slug":"the-path-to-safety","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/03\/08\/the-path-to-safety\/","title":{"rendered":"The Path to Safety?"},"content":{"rendered":"<p>Industry readies plan for pre-emptive network defense.  Later this month some of the largest companies in the United States, led by the IT sector, will publicize a set of recommendations on hardening cyber-infrastructure so that the government doesn&#8217;t legislate the effort for them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recommendations&#8212;all voluntary&#8212;are to include television advertising aimed at small businesses and data collection research with the federal government, according to sources involved in the planning.<\/p>\n<p>A little more than a year after the White House released its National Strategy to Secure Cyberspace, which includes a blueprint showing the private sector how to improve network security, federal policy-makers remain concerned that industry-owned networks are vulnerable to terrorist attack.<\/p>\n<p>Patrick Leahy, D-Vt., said the country has been fortunate that terrorists have not infiltrated U.S. networks.  &#8220;We can assume, unfortunately, that they would if they had the opportunity,&#8221; Leahy said.  &#8220;It is essential that we work with the private sector to thoroughly assess our weaknesses and take steps to deal with them.&#8221;  &#8220;In most cases, the recommendations will be more like road maps of what we need to do to get where we want to be,&#8221; said Gary Garcia, vice president of information security policy at the ITAA.<\/p>\n<p>A primary aim of the industry-led initiative, which comprises five task forces, is to encourage buy-in from stakeholders, including infrastructure owners, users and vendors, Garcia said.  To reach out to smaller businesses and individual users, the task forces are recommending public awareness campaigns, sources said.<\/p>\n<p>The fear is that Congress will impose expensive new security obligations on corporations because so much of the country&#8217;s interdependent infrastructure is held in private hands.  Last year, Rep. Adam Putnam, R-Fla., floated the idea of mandating security audit reporting, but Putnam is still talking with industry leaders about alternative proposals, an aide said.<\/p>\n<p>While much of the task forces&#8217; work sets only a framework for improving network security, some recommendations will provide specific direction, sources said.  The plans will include detailed schedules and will recommend projects for improved education, such as including a network security course in the ordinary curricula at community colleges, Schmidt said.  Before month&#8217;s end, the industry group plans to launch a Web site enumerating its recommendations and other information to better secure private networks, sources said.<\/p>\n<p>http:\/\/www.eweek.com\/article2\/0,4149,1542841,00.asp?kc=EWRSS03119TX1K0000594<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-528","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=528"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/528\/revisions"}],"predecessor-version":[{"id":3015,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/528\/revisions\/3015"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}