02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

On Security and Privacy, States Are Taking the Lead<br />

By Andrea Little Limbago, Chief Social Scientist, Virtru<br />

When Toyota announced the second data breach of the year, initial signs pointed to the group<br />

OceanLotus, a Vietnamese-linked state sponsored espionage group. The Marriott breach, and the almost<br />

400,000 compromised customer records, has been linked to China. These incidents continue the steady<br />

drumbeat of new data breaches linked to nation-states, but we’re also seeing a rise in other sources of<br />

data breaches. An unsecured database accidentally exposed two billion personal records, while<br />

Collection #1 and subsequent collections’ combined for 3.5 billion user records posted on a hacking site.<br />

Together, these compromises highlight the proliferation of attackers, the growing size of data breaches,<br />

and the prominence of unsecured and accidental data exposures. However, despite this proliferation, the<br />

United States lacks a federal privacy regulation to incentivize better protection and security standards<br />

while also introducing accountability. Absent a federal privacy regulation, individual states are initiating<br />

their own data protection and privacy regulations to help combat these threats and shift corporate<br />

incentives.<br />

Data protection and privacy legislation are not usually included in discussions of the latest cyber defenses<br />

and the threat landscape. However, they should be viewed as core components for augmenting<br />

deterrence by denial. While many of the new and existing authorities develop deterrence by punishment,<br />

much less focus has been devoted to explicitly shifting incentives to prioritize data protections. In fact,<br />

57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!