- The Foundry: Conservative Policy News Blog from The Heritage Foundation - http://blog.heritage.org -
7 Steps to Solve Congressional Cyber Stalemate
Posted By Sarah Friesen On April 8, 2013 @ 5:00 pm In Security | Comments Disabled
Congress is back in session and “ready” to tackle cybersecurity . Regrettably, some in Congress are again proposing 19th century–style legislative solutions to this ultimately 21st-century problem. Let’s hope they think it through this time before offering the same failed ideas.
Over the past several months, the world has witnessed a large number of cyber attacks that have hit targets as varied as South Korean banks , U.S. newspapers , and the Internet itself . As cyber threats continue to evolve and grow, the corresponding need for effective cybersecurity policies  grows as well. The need is real, but positive action requires wisdom and some out-of-the-box thinking.
Any new policies must deal with the fact that the cyber realm is constantly changing. Technological improvements occur so rapidly that it is difficult to keep track of them, let alone create legislation that can keep up with it all. This is why the “something is better than nothing ” mentality needs to be discarded. Congress should take the time to create a thoughtful and dynamic legislation that will not hold the U.S. back with slow, static regulations. If the process is rushed by the desire to come up with anything, the short-term and long-term results could be catastrophic.
Instead, a good cybersecurity policy should include the following seven elements :
These could be presented in one comprehensive bill or in a number of bills from applicable committees. Regardless, in order to fully address cyber, Congress needs to craft legislation that fosters dynamic cybersecurity and does not bog it down in regulations.
Whatever legislation Congress creates should integrate these seven elements . Without them, the U.S. will remain vulnerable to cyber attacks.
Sarah Friesen is currently a member of the Young Leaders Program at The Heritage Foundation. For more information on interning at Heritage, please click here. 
Article printed from The Foundry: Conservative Policy News Blog from The Heritage Foundation: http://blog.heritage.org
URL to article: http://blog.heritage.org/2013/04/08/7-steps-to-solve-congressional-cyber-stalemate/
URLs in this post:
 Image: http://blog.heritage.org/wp-content/uploads/ChineseHacker_130220.jpg
 to tackle cybersecurity: http://www.washingtonpost.com/blogs/post-tech/post/the-circuit-cybersecurity-top-topic-of-discussion-this-week/2013/04/08/02a67e7a-a061-11e2-82bc-511538ae90a4_blog.html
 South Korean banks: http://blog.heritage.org/2013/03/21/north-korea-ups-the-ante-with-cyber-attack/
 U.S. newspapers: http://blog.heritage.org/2013/02/06/chinese-hackers-target-u-s-newspapers/
 the Internet itself: http://blog.heritage.org/2013/03/29/internet-hit-by-largest-cyber-attack-yet/
 effective cybersecurity policies: http://www.heritage.org/research/reports/2013/04/a-congressional-guide-seven-steps-to-us-security-prosperity-and-freedom-in-cyberspace
 something is better than nothing: http://blog.heritage.org/2012/07/25/cybersecurity-legislation-should-be-done-well-or-not-at-all/
 click here.: http://www.heritage.org/about/departments/ylp.cfm
Copyright © 2011 The Heritage Foundation. All rights reserved.