Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Cybersecurity Bill Would Set Defense Plan for Local Agencies

A new Maryland bill would ask the state’s Department of Information Technology to develop a baseline plan for localities within the state to help battle cyber attacks.

A new Maryland bill would ask the state’s Department of Information Technology to develop a baseline plan for localities within the state to help battle cyber attacks.

Senate bill 120, introduced by Sen. Susan Lee, D-Montgomery, would give the Maryland Department of Information Technology the expanded responsibility of developing a cybersecurity strategy and helping agencies within the state implement it at their discretion.

Under current law, the Department of Information Technology oversees the defense of state systems, but not that of counties, school districts and other similar entities. Having a sample plan in place could be beneficial in preventing future attacks that disrupted the likes of the city of Baltimore and Salisbury Police Department recently and cost millions in reparations.

The legislation does not mandate significant increases in expenditures by the state or local governments, but rather leaves it up to each entity to potentially implement the plan, according to Lee.

This Maryland bill follows a 2019 North Dakota law that added the same provisions and power to its state Information Technology department.

The main point of this bill is to simply draw up guidance and advice for those around the state to be able to help prepare themselves brace for potential attacks, Lee told Capital News Service.

During a Senate Education, Health, and Environmental Affairs Committee hearing on Jan. 14, Lee compared this plan to having a fire extinguisher for protection and to prevent a possibly worse situation.

“Today we have to prepare for and respond to digital fires … upfront rather than scrambling on the back end,” Lee said during the hearing.

Advertisement. Scroll to continue reading.

Senate committee members responded favorably toward the bill, but looked to generate tighter language to define the tasks this bill sets forward.

Delegate Ned Carey, D-Anne Arundel, has cross-filed this bill in the House — along with three co-sponsors — and said he believes it should receive bipartisan support due to the well-known threat that professional hackers pose.

“The bill is intended to help,” Carey said. “We’re going to work hard to make sure this bill succeeds.”

Carey’s legislation, House bill 235, was heard by the Health and Government Operations Committee on Tuesday afternoon.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.