Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cybersecurity Presentation Insert Name CSIA 412. Agenda 0 Purpose of Legislation 0 Influence of Legislation 0 Legislation vs. Other Regulatory Demands.

Similar presentations


Presentation on theme: "Cybersecurity Presentation Insert Name CSIA 412. Agenda 0 Purpose of Legislation 0 Influence of Legislation 0 Legislation vs. Other Regulatory Demands."— Presentation transcript:

1 Cybersecurity Presentation Insert Name CSIA 412

2 Agenda 0 Purpose of Legislation 0 Influence of Legislation 0 Legislation vs. Other Regulatory Demands 0 Compliance with Cybersecurity Standards 0 Policy Development

3 Legislation Influence

4 Purpose of Legislation Legislation establishes the policies needed within an organization to ensure functionality, as it institute practices needed in order to safeguard the organization as a whole as well as the consumers they serve 1.

5 Influence of Legislation 0 Standard practice promotes decreased cyber attack while promoting increased confidentiality, integrity, and availability. 0 Legislation promotes ingenuity in security practices.

6 Legislation vs. other regulatory demands

7

8 Cybersecurity Standards

9 Compliance Within every industry there are standards and guidelines that are voluntary and then there are those which are mandatory. The cyber security industry is no different as there are various non-negotiable standards and guidelines companies must adhere to.

10 Company Policies

11 Developing Policies InitiationDevelopmentImplementationMaintenanceRetirement

12 Summary 0 Legislation is passed as a means to address various needs within the cybersecurity industry. 0 EO, NIST standards, guidelines, and agency standards also address cybersecurity needs but have specific purposes and are often aimed at specific entities within the industry. 0 Compliance with legislation is often mandatory and leads to an increased standard of practice within companies. 0 Policies are developed and maintained as a result of looking at industry practices vs. current practices and assist companies in reaching their goals.

13 References COPPA (n.d.). Children’s online privacy protection act. Retrieved from: http://www.coppa.org/comply.htm Federal Trade Commission. (n.d.) Gramm-Leach-Bliley Act. Retrieved from: http://www.ftc.gov/tips- advice/business-center/privacy-and-security/gramm-leach-bliley-act Ferrell, T. (2001). Impact of HIPAA security rules on healthcare organizations. SANS Institute. Retrieved from: https://www.sans.org/reading-room/whitepapers/policyissues/impact-hipaa-security- rules-healthcare-organizations-495 NIST. (2014). NIST General Information. Retrieved from: http://www.nist.gov/public_affairs/general_information.cfm Noblett, T. (2015). Business of IT. TechNet Magazine. Retrieved from: https://technet.microsoft.com/en-us/magazine/2006.09.businessofit.aspx University of Maryland University College. (2015). Module 1: Legislative process [Online class reading]. Retrieved from: https://learn.umuc.edu/d2l/le/content/47852/viewContent/2363909/View


Download ppt "Cybersecurity Presentation Insert Name CSIA 412. Agenda 0 Purpose of Legislation 0 Influence of Legislation 0 Legislation vs. Other Regulatory Demands."

Similar presentations


Ads by Google