- The Foundry: Conservative Policy News from The Heritage Foundation - http://blog.heritage.org -

7 Steps to Solve Congressional Cyber Stalemate

Posted By Sarah Friesen On April 8, 2013 @ 5:00 pm In Security | Comments Disabled

Chinafotopress/ZUMApress/Newscom [1]

Chinafotopress/ZUMApress/Newscom

Congress is back in session and “ready” to tackle cybersecurity [2]. Regrettably, some in Congress are again proposing 19th century–style legislative solutions to this ultimately 21st-century problem. Let’s hope they think it through this time before offering the same failed ideas.

Over the past several months, the world has witnessed a large number of cyber attacks that have hit targets as varied as South Korean banks [3], U.S. newspapers [4], and the Internet itself [5]. As cyber threats continue to evolve and grow, the corresponding need for effective cybersecurity policies [6] grows as well. The need is real, but positive action requires wisdom and some out-of-the-box thinking.

Any new policies must deal with the fact that the cyber realm is constantly changing. Technological improvements occur so rapidly that it is difficult to keep track of them, let alone create legislation that can keep up with it all. This is why the “something is better than nothing [7]” mentality needs to be discarded. Congress should take the time to create a thoughtful and dynamic legislation that will not hold the U.S. back with slow, static regulations. If the process is rushed by the desire to come up with anything, the short-term and long-term results could be catastrophic.

Instead, a good cybersecurity policy should include the following seven elements [6]:

  1. Enabling information sharing instead of mandating it. If organizations and agencies can share information amongst themselves, then everyone can be more prepared for cyber attacks.
  2. Encouraging the development of a viable cybersecurity liability and insurance system. This will remove cost from the consumer and incentivize the producer to take reasonable protective actions when developing products and services.
  3. Creating a private-sector structure that fosters cyber supply-chain security ratings. This will help ensure the security of cyber hardware, which has to be physically replaced if it is compromised.
  4. Defining limited cyber self-defense standards for industry. The government should allow companies to take steps beyond strict prevention to protect themselves from cyber threats.
  5. Advocating for more private-sector efforts to promote general awareness, education, and training across America. The private sector and local organizations need to increase efforts to regularly provide the American public with consistent, accurate, and up-to-date information.
  6. Reforming science, technology, engineering, and mathematics (STEM) education to create a strong cyber workforce within industry and government. The emphasis the education system places on STEM needs to be improved in order to produce and maintain a strong and capable cyber workforce.
  7. Leading responsible international cyber engagement. Since the cyber realm does not reside in any one country, an international cybersecurity effort is necessary.

These could be presented in one comprehensive bill or in a number of bills from applicable committees. Regardless, in order to fully address cyber, Congress needs to craft legislation that fosters dynamic cybersecurity and does not bog it down in regulations.

Whatever legislation Congress creates should integrate these seven elements [6]. Without them, the U.S. will remain vulnerable to cyber attacks.

Sarah Friesen is currently a member of the Young Leaders Program at The Heritage Foundation. For more information on interning at Heritage, please click here. [8]


Article printed from The Foundry: Conservative Policy News from The Heritage Foundation: http://blog.heritage.org

URL to article: http://blog.heritage.org/2013/04/08/7-steps-to-solve-congressional-cyber-stalemate/

URLs in this post:

[1] Image: http://blog.heritage.org/wp-content/uploads/ChineseHacker_130220.jpg

[2] to tackle cybersecurity: http://www.washingtonpost.com/blogs/post-tech/post/the-circuit-cybersecurity-top-topic-of-discussion-this-week/2013/04/08/02a67e7a-a061-11e2-82bc-511538ae90a4_blog.html

[3] South Korean banks: http://blog.heritage.org/2013/03/21/north-korea-ups-the-ante-with-cyber-attack/

[4] U.S. newspapers: http://blog.heritage.org/2013/02/06/chinese-hackers-target-u-s-newspapers/

[5] the Internet itself: http://blog.heritage.org/2013/03/29/internet-hit-by-largest-cyber-attack-yet/

[6] effective cybersecurity policies: http://www.heritage.org/research/reports/2013/04/a-congressional-guide-seven-steps-to-us-security-prosperity-and-freedom-in-cyberspace

[7] something is better than nothing: http://blog.heritage.org/2012/07/25/cybersecurity-legislation-should-be-done-well-or-not-at-all/

[8] click here.: http://www.heritage.org/about/departments/ylp.cfm

Copyright © 2011 The Heritage Foundation. All rights reserved.