Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Washington Senate OKs Measure Creating State Office of Cybersecurity

In response to a security breach that exposed personal information from around 1.6 million unemployment claims filed last year, the Washington Senate has unanimously passed a measure that creates a state Office of Cybersecurity.

In response to a security breach that exposed personal information from around 1.6 million unemployment claims filed last year, the Washington Senate has unanimously passed a measure that creates a state Office of Cybersecurity.

Washington State Senate

The measure, passed by the chamber on Wednesday, creates the new office within the Office of the Chief Information Officer. The bill now heads to the House for consideration.

If passed by the full Legislature and signed by Gov. Jay Inslee, the office would set security policies and develop centralized protocols for managing the state’s information technology assets.

Earlier this month, the state auditor’s office said the breach involved third-party software used by the auditor’s office to transmit files. The software vendor, Accellion, announced last month that it had been attacked in December.

The measure would direct all state entities — institutions of higher education, the Legislature, the judiciary, and state agencies — to adopt programs that incorporate cybersecurity standards set by the office and to report any major cybersecurity incident within 24 hours.

The new office would be the point of contact for all policy related to data privacy and protection, and would be charged with investigating all major cybersecurity incidents.

Related: Washington State Targeted by Phishing Campaign

Related: Over 1 Million Impacted by Data Breach at Washington State Auditor

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.