Feds stay busy
- By Florence Olsen
- May 03, 2004
Federal officials can point to a hectic cybersecurity events calendar. Since November 2002, the federal government has been involved in many cybersecurity activities.
Homeland Security Act becomes law.
Explanation: Statute creates a Homeland Security Department
to focus federal resources on fighting terrorism, including cyberterrorism.
Cybersecurity Research and Development Act becomes law.
Statute authorizes new levels of federal spending on cybersecurity research and development.
Federal Information Security Management Act (FISMA) becomes law.
Explanation: The statute requires federal agencies to set and enforce secure configuration
standards for all new and existing computer information systems.
National Strategy to Secure Cyberspace released.
Explanation: White House document outlines cybersecurity objectives for DHS and other federal agencies.
Rep. Adam Putnam (R-Fla.) drafts legislation to amend the Securities Exchange Act of 1934 and names it the Corporate Information Security Accountability Act of 2003.
Explanation: Draft legislation would require publicly traded companies to include an information security report in their annual filing with the Securities and Exchange Commission, similar to the report companies were required to make about their Year 2000 readiness.
Corporate Information Security Group formed.
Explanation: Software industry opposes Putnam's legislation; Putnam creates a group of
private-sector companies to produce an alternative plan.
Putnam awards grades to federal agencies for computer security.
Federal government earns a D average for cybersecurity; many agencies have failing grades.
National Cyber Security Summit held.
DHS officials and business leaders meet to plan cybersecurity actions; computers owned or operated by the private sector control 85 percent of the nation's critical power and communications infrastructure.
Cyber Security Industry Alliance formed.
Explanation: Eleven leading computer security companies organize to influence public
policy and spending on cybersecurity.
Office of Management and Budget releases FISMA report to Congress.
Explanation: Report reveals many security vulnerabilities, including a lack of contingency plans for operating agency computer systems in an emergency.
The Corporate Information Security Working Group and five industry-led task forces formed during the National Cyber Security Summit release reports with recommendations.
Explanation: Reports include many detailed and potentially effective recommendations, but stop short of proposing sweeping changes in the status quo.