critical infrastructure

On Monday, May 11, 2017, President Donald Trump signed an Executive Order on “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.”  The Executive Order comes after Trump had postponed signing a similar executive order on cybersecurity on Feb. 1, and another draft executive order had been circulated Feb. 10.

The final Executive

This post was written by Timothy J. Nagle.

On Tuesday, the White House cybersecurity coordinator posted a blog on the White House website describing incentives that may be made available to private sector “owners and operators.” The blog reviews the purpose of the Executive Order (information sharing, privacy and adoption of cybersecurity practices) that was

This post was also written by Timothy J. Nagle.

One of the most significant takeaways from Reed Smith’s June 25, 2013 teleseminar, “Cybersecurity in Critical Infrastructure Industries,” is the availability of industry and governmental resources to assist oil and gas companies, electric utilities, and municipal water systems in assessing cybersecurity threats and finding ways to

This post was also written by Timothy J. Nagle.

“Electric Grid Vulnerability: Industry Responses Reveal Security Gaps,” by the staffs of U.S. Reps. Ed Markey (D-Mass.) and Henry Waxman (D-Cal.), resulted from a survey of more than 100 utilities. The report and the contemporaneous House Energy and Commerce Committee hearing on “Cyber Threats and

On February 12, the executive order “Improving Critical Infrastructure Cybersecurity” was issued, accompanied by a Presidential Policy Directive as well as a mention from President Obama in the State of the Union address. Similar to the previously discussed November 2012 draft, the executive order addresses: improvements in information sharing between the public and private

This post was written by Timothy J. Nagle.

An earlier blog post analyzed a draft Executive Order on critical infrastructure cybersecurity. A newer version of the order is similar to its predecessor, but the ultimate goals remain: using existing regulatory authority, improving information sharing, developing a “voluntary” framework of standards, incentivizing (or punishing?) owners and

This post was also written by Amy Mushahwar.

Since three cyber security bills passed the House in April (H.R.2096, H.R.3523, and H.R.3834), all eyes have been on Washington for cyber security developments in the Senate. This past week there were several. The week began with a hearing on Tuesday, July