OASIS Cyber Threat Intelligence (CTI) TC

 View Only
  • 1.  Re: [cti] Cybersecurity Act of 2015

    Posted 12-20-2015 16:13
    It may soon evolve in the media and among the cyber community that other provisions of the bill attract greater attention than the privacy or government surveillance aspects of the bill.   I am referring to the defensive measures language, including mitigate , and how expansive defensive measures can be interpreted; and further, how the immunity provisions enable risk taking with respect to pushing the envelope of what defensive measures and business use cases will be permitted?  In short, where will the law go in permitting aggressive counterintelligence commercial businesses practices?  And what increased level of permissiveness will law enforcement allow, especially in early stages of its rollout?   My prediction is that some companies (already doing aggressive practices) will come into the open with bold marketing in order to seize market share. Yet, it's not completely clear how much mitigation means, or will be construed by law enforcement to mean. Doug Douglas DePeppe, LLM, JD EosEdge Legal Cyberlaw and Services 719.357.8025 This email and any attachments contain information belonging to the sender which may be confidential and legally privileged.  The information is only for the intended recipient.  If you are not the intended recipient, any disclosure, copy, distribution, or action taken in reliance on the contents of the information contained in this transmission is strictly prohibited.  If you have received this transmission in error, promptly inform me and delete the message. Sent from my Mobile


  • 2.  Word Cloud display of Cybersecurity Act of 2015

    Posted 12-20-2015 21:26
      |   view attached
    Rich et al., We just produced a potentially useful slide (if not a poster) that contains an automatically generated Cirrus Word Cloud image of the Act's word frequencies. It quite nicely conveys at a glance, a sense of what is contained in the Act. We're fine with anyone distributing this slide/image as well as the source is kept. best, tony Attachment: cybersecurity_act_word-frequency.pdf Description: Adobe PDF document

    Attachment(s)