CSIAC SME and member of the American Bar Association's Information Security Committee, Richard "Rick" Aldrich, gives a snapshot of the recent developments in cyberlaw, policy, standards, court cases and industry legal frameworks. These slides focus on emerging issues such as cloud data storage, the scope of 3rd-party doctrine, encryption, warrants for
Topic: DoD Cyber Policy
On January 28th, 2011, Egypt disappeared from the global map. In a coordinated shutdown of all major Egyptian internet service providers--an effort by its government to squelch public dissent- -virtually all Egyptian Internet addresses became unreachable worldwide.1 The action was unprecedented in Internet history.2 At the same time, the U.S. Senate
Building on the success of the “Hack the Pentagon” bug bounty pilot in which hackers from across the country were provided legal authorization to spot vulnerabilities in specific Department of Defense networks in return for cash payments, the Department of Defense (DoD) today unveiled two new initiatives designed to further enhance the DoD cybersecurity.
Defending Department of Defense (DoD) networks, systems and data (DDNSD) is a complex and ongoing challenge. On November 13, 2013, the DoD Chief Information Officer issued a new cybersecurity strategy for the Department. At the end of March an unclassified version was made publicly available. Click on the icon below to download a copy of the document. In the