Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
On July 13, 2023, the U.S. Government released the Implementation Plan for the National Cybersecurity Strategy, a roadmap which was published earlier in the year. While the National Cybersecurity Strategy was a product for all, the implementation plan is aimed toward those federal agencies tasked with ensuring that its objectives move from concept to tangible result. As we consider the implementation plan, it is helpful to revisit what the original strategy said about roles, specifically for the U.S. Government: “Government’s role is to protect its own systems; to ensure private entities, particularly critical infrastructure, are protecting their systems; and to carry out core governmental functions such as engaging in diplomacy, collecting intelligence, imposing economic costs, enforcing the law, and, conducting disruptive actions to counter cyber threats.” National Cybersecurity Strategy (March 2023). The implementation plan is the “kick-off” to moving the government forward to execute on those stated roles.
Continue reading by getting
started with a subscription.
By Steve Salkin and Brett Burney
It’s time to stop the hype, stop talking up AI as if it’s the next best thing since sliced bread and prove that it’s a useful tool and technology that can actually be used in the actual practice of law.
By Alan Friel, David Manek, Sasha Kiosse, David Farber and Colleen M. Yushchak
The assessment and audit requirements of the new generation of state data protection laws will force U.S. companies to move beyond mere window dressing and instead require them to develop fulsome data protection programs.
By Roy Hadley
The cybersecurity landscape is on the brink of a transformative shift, with predictive analytics and behavioral analysis leading the charge for more resilient and adaptive defenses.
By Scott Warren
It appears that hackers are using AI to sift large digital data to identify more convincing approaches for their scams as well as weaknesses in weaknesses in software coding or network security.