Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

White House Ponders Cyber Security Incentives for Critical Infrastructure Companies

Critical Infrastructure

The federal government is planning to offer critical infrastructure companies incentives to join a voluntary program designed to improve cybersecurity.

Critical Infrastructure

The federal government is planning to offer critical infrastructure companies incentives to join a voluntary program designed to improve cybersecurity.

The incentives are an outgrowth of the Executive Order on cybersecurity that President Obama signed earlier this year. According to the White House, the order focuses on information sharing, privacy and the adoption of cybersecurity best practices, and in keeping with those principles the government is working with critical infrastructure owners to create a Cybersecurity Framework.  

“After a final Framework is released in February 2014, we will create a Voluntary Program to help encourage critical infrastructure companies to adopt the Framework,” blogged Michael Daniel, special assistant to the President and Cybersecurity Coordinator. “As directed in the EO [executive order], the Departments of Homeland SecurityCommerce, and Treasury have identified potential incentives and provided their recommendations to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs.”

“Over the next few months, agencies will examine these options in detail to determine which ones to adopt and how, based substantially on input from critical infrastructure stakeholders,” he wrote. 

These incentives include making participating in the voluntary program a condition of the weighted criteria for federal critical infrastructure grants. Other incentives include considering participating in the program as secondary criteria for providing companies with technical assistance and providing greater liability protection for companies participating in the program that are attacked.

“The efforts to develop a Cybersecurity Framework called for by the president’s Executive Order are extremely important to upgrading the cybersecurity of our critical infrastructure,” said Mike Brown, vice president and general manager of federal business for EMC’s RSA security division. “In order to make those efforts more effective, the administration’s identification of incentives to help foster adoption of the voluntary program could provide some impetus to the framework’s adoption. Some of the more effective incentives still require legislative actions from Congress.”

David Pack, director of LogRhythm Labs, has been involved in the authoring of the Cybersecurity Framework. Incentivizing adoption of the framework is a good idea, he said, although not all of the incentives are likely to be implemented and some may be more effective than others.

 “There is still a lot of work to do before the framework will be complete,” he said. “[The National Institute of Standards and Technology] NIST must consolidate all of the work that was done by the hundreds of attendees of the 3rd workshop, where the framework content was developed.  There will be a 4th workshop in September to prepare the results, and the preliminary framework will be published for public comment in October. Finally after a few months of public comment and additional updates/edits, the framework’s final version will be published by NIST.”

Advertisement. Scroll to continue reading.
Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...