SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
1
Cyber-insurance carriers prepare for the convergence of
information security, privacy and litigation.
Part eight of a series
August 2013
Author: Dave Sweigert, M.Sci., CISSP, CISA, PMP
ABSTRACT
As the White House drives an industry risk-based approach for cybersecurity that
may reduce privacy, insurance carriers are watching the development of liability
caps to incentivize those entities that embrace this approach.
Background
The Cybersecurity Framework (CSF) is
an evolving structure and process for
“voluntary” certification of private sector
critical infrastructure and key resource
(CI/KR) operators, encouraged to use a
consensus developed risk-based
approach proposed by the White
House1
.
The White House has brought increased
visibility to the risk management function
of CI/KR operators and has endorsed
concepts to incentivize private industry
to adopt the CSF as a consensus-based
risk management framework (RMF) for
the purposes of limiting cyber incident
liability.
The CSF is a type of the blueprint for a
safe harbor, providing protection from
1
Executive Order -- Improving Critical Infrastructure
Cybersecurity, 2/12/2013. See: Sec. 7. Baseline
Framework to Reduce Cyber Risk to Critical
Infrastructure
thorny tort and product liability litigation
for those entities that implement it.
Cyber-insurance
Liability caps – a form of tort reform –
could be based upon the CSF. When
applied to cyber incident damages, caps
would limit liability as to the downstream
consequences of a cyber-based initiated
severe incident (calamity created by the
consequences resulting from a cyber
breach).
Cyber-insurance is an insurance product
used to protect policyholders from
cybersecurity risks; but may not fully
protect against the downstream
cascading consequences associated
with CI/KR (e.g. power black-outs).
Presently, insurers require a
policyholder to have some level of
cybersecurity as a condition of such
coverage. However, damages are
generally within the sphere of losses to
2
the enterprise; such as, data breach
litigation, physical damage to the
enterprise, damaging acts as a result of
criminal activity, etc.
Widespread adoption of the CSF (to be
released in draft form in October 2013)
would provide a level of certainty to the
cyber-insurance industry as to what
measures are considered to be a
consensus-based industry best practice.
Premiums can then be adjusted to favor
policyholders implementing the CSF.
Liability caps can also be legislatively
applied to those private CI/KR operators
that have deployed the CSF. Threshold
ceiling amounts as to potential damages
can be established for those entities
relying on the CSF; which will establish
the tangible and material standards of
the “safe harbor” via de facto standards.
Will technical safeguards limit cyber
incident liability?
While the U.S. National Institute for
Standards and Technology (NIST) is
engaging stakeholders to address the
technical components of the CSF, the
U.S. Department of Commerce (DoC,
parent organization to NIST) has been
busy engaging stakeholders as to
incentive strategies. Two recently
published DoC recommendations
include:
 Partnering with the Insurance
Industry to Promote Effective
Cybersecurity Measures and Best
Practices
“ …. the cyber insurance market should
respond with premium increases for
policyholders that fail to adopt effective
cybersecurity protections, and
corresponding reductions for those that
agree to join the Program (CSF) and
adopt effective Framework practices…”
 Limiting Liability for
Cybersecurity Breaches and
Actions Under the Program
“…The Administration is currently
studying the idea of limited liability
protections in other areas that could be
directly related to the Program (CSF),
depending on its development. For
example, as part of the National
Strategy for Trusted Identities in
Cyberspace (NSTIC), which the
President issued in order to address
critical cybersecurity weaknesses
caused by inadequate online
identification and authentication
solutions, the President stated that “the
Federal government may need to
establish or amend both policies and
laws to address” concerns such as “the
uncertainty and fear of unbounded
liability that have limited the market’s
growth,” but concerns about where
liability should fall still exist….”
In sum, these two recommendations
appear to suggest that the cyber-
insurance industry should explore how
macro-level technical safeguards (such
as the NSTIC program) could (1)
provide an affirmative defense to tort
3
and product liability lawsuits and (2) cap
liability of litigation directed at private
CIKR operators that have experienced a
severe cyber incident.
However, the DoC report points out that
it can be difficult to measure the
effectiveness of a technical counter-
measure in the abstract.
NSTIC as a national identity floor to
reduce cyber liability
In the foregoing DoC recommendations,
NSTIC appears to be akin to the ship’s
Maritime weather radio (technical
safeguard to reduce liability) in the
context of U.S. v. Carroll Towing.
NSTIC is an identity and authentication
management initiative of NIST (the
same agency guiding the industry
collaboration to define and publish the
CSF).
Some believe that “identity is the new
perimeter”, meaning that it is taken for
granted that every Internet-connected
I.T. enterprise has a firewall, border
gateway and other perimeter protecting
devices. So too, the theory goes, that
these enterprises should rely on a
standards-based identity infrastructure,
resembling the practical reliance on
social security numbers or State issued
drivers’ licenses to verify identity.
However, privacy advocates are critical
of the NSTIC program as it reduces
anonymity of Internet users and creates
an identity infrastructure requiring
verification of an individual’s identity for
the purposes of cyber space.
Pro-NSTIC advocates claim that the
program establishes a business grade
class of service on the Internet; enabling
a more secure commercial quality of
Internet activity.
If NSTIC is absorbed into the NIST CSF
it may create a new de facto national
standard for identity management.
Private CI/KR operators would most
certainly embrace any technology
recognized by the cyber-insurance
industry to reduce liability. Legislative
bodies would recognize the favorable
effect of such a technology to improve
the operations of their private CI/KR
constituents when proposing caps on
cyber liability. These would be very
strong and convincing arguments which
privacy advocates would need to
overcome to slow the adoption of NSTIC
as the new identity perimeter for the
Internet under the CSF.
About the author: Dave Sweigert is a
Certified Information Systems Security
Professional, Certified Information
Systems Auditor, Project Management
Professional and holds Master’s
degrees in Information Security and
Project Management. A former
consultant to the U.S. National Security
Agency, he is a practitioner of
cybersecurity. He is also the moderator
of the NSTIC discussion group on
LinkedIn.

Más contenido relacionado

La actualidad más candente

Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-IT Strategy Group
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture IJECEIAES
 
Debunking Myths for Cyber-Insurance
Debunking Myths for Cyber-InsuranceDebunking Myths for Cyber-Insurance
Debunking Myths for Cyber-InsurancePriyanka Aash
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive OrderBooz Allen Hamilton
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategyfEngel
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Education & Training Boards
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyMazeBolt Technologies
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWilliam Tanenbaum
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualWilliam Tanenbaum
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt TechnologiesCost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt TechnologiesMazeBolt Technologies
 

La actualidad más candente (20)

Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
Debunking Myths for Cyber-Insurance
Debunking Myths for Cyber-InsuranceDebunking Myths for Cyber-Insurance
Debunking Myths for Cyber-Insurance
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategy
 
Funsec3e ppt ch14
Funsec3e ppt ch14Funsec3e ppt ch14
Funsec3e ppt ch14
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
CDCATInsurance 2016
CDCATInsurance 2016CDCATInsurance 2016
CDCATInsurance 2016
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
 
safety-act-faq
safety-act-faqsafety-act-faq
safety-act-faq
 
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt TechnologiesCost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
 

Similar a Cyber-insurance and liability caps proposed as incentives by Department of Commerce

MFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Fairfax
 
Cybersecurity Framework for Executive Order 13636 -- Incident Command System
Cybersecurity Framework for Executive Order 13636 -- Incident Command SystemCybersecurity Framework for Executive Order 13636 -- Incident Command System
Cybersecurity Framework for Executive Order 13636 -- Incident Command SystemDavid Sweigert
 
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...IJNSA Journal
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? Abraham Vergis
 
Building on incident management metrics to support Executive Order 13636
Building on incident management metrics to support Executive Order 13636Building on incident management metrics to support Executive Order 13636
Building on incident management metrics to support Executive Order 13636David Sweigert
 
EY-blockhain-in-insurance.pdf
EY-blockhain-in-insurance.pdfEY-blockhain-in-insurance.pdf
EY-blockhain-in-insurance.pdfssuserfd0175
 
DHS look at Cyber Insurance
DHS look at Cyber InsuranceDHS look at Cyber Insurance
DHS look at Cyber InsuranceDavid Sweigert
 
IRJET- Smart Contracts for Insurance based on Hyperledger Fabric
IRJET-  	  Smart Contracts for Insurance based on Hyperledger FabricIRJET-  	  Smart Contracts for Insurance based on Hyperledger Fabric
IRJET- Smart Contracts for Insurance based on Hyperledger FabricIRJET Journal
 
Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...David Sweigert
 
Blockchain for automotive: An insight towards the IPFS blockchain-based auto ...
Blockchain for automotive: An insight towards the IPFS blockchain-based auto ...Blockchain for automotive: An insight towards the IPFS blockchain-based auto ...
Blockchain for automotive: An insight towards the IPFS blockchain-based auto ...IJECEIAES
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project ProposalChris Young
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final PresentationKartik Uppal
 
Holistic approach to cybersecurity being engineered by maryland companies 8-13
Holistic approach to cybersecurity  being engineered by maryland companies 8-13Holistic approach to cybersecurity  being engineered by maryland companies 8-13
Holistic approach to cybersecurity being engineered by maryland companies 8-13Signals Defense, LLC
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Miguel A. Amutio
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the CloudCourtney Fisk
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 

Similar a Cyber-insurance and liability caps proposed as incentives by Department of Commerce (20)

MFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Cybersecurity Services flyer
MFX Cybersecurity Services flyer
 
Cybersecurity Framework for Executive Order 13636 -- Incident Command System
Cybersecurity Framework for Executive Order 13636 -- Incident Command SystemCybersecurity Framework for Executive Order 13636 -- Incident Command System
Cybersecurity Framework for Executive Order 13636 -- Incident Command System
 
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
Building on incident management metrics to support Executive Order 13636
Building on incident management metrics to support Executive Order 13636Building on incident management metrics to support Executive Order 13636
Building on incident management metrics to support Executive Order 13636
 
EY-blockhain-in-insurance.pdf
EY-blockhain-in-insurance.pdfEY-blockhain-in-insurance.pdf
EY-blockhain-in-insurance.pdf
 
DHS look at Cyber Insurance
DHS look at Cyber InsuranceDHS look at Cyber Insurance
DHS look at Cyber Insurance
 
IRJET- Smart Contracts for Insurance based on Hyperledger Fabric
IRJET-  	  Smart Contracts for Insurance based on Hyperledger FabricIRJET-  	  Smart Contracts for Insurance based on Hyperledger Fabric
IRJET- Smart Contracts for Insurance based on Hyperledger Fabric
 
NIST article I wrote
NIST article I wroteNIST article I wrote
NIST article I wrote
 
Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...
 
Blockchain for automotive: An insight towards the IPFS blockchain-based auto ...
Blockchain for automotive: An insight towards the IPFS blockchain-based auto ...Blockchain for automotive: An insight towards the IPFS blockchain-based auto ...
Blockchain for automotive: An insight towards the IPFS blockchain-based auto ...
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
 
Holistic approach to cybersecurity being engineered by maryland companies 8-13
Holistic approach to cybersecurity  being engineered by maryland companies 8-13Holistic approach to cybersecurity  being engineered by maryland companies 8-13
Holistic approach to cybersecurity being engineered by maryland companies 8-13
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the Cloud
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 

Más de David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 

Más de David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Cyber-insurance and liability caps proposed as incentives by Department of Commerce

  • 1. 1 Cyber-insurance carriers prepare for the convergence of information security, privacy and litigation. Part eight of a series August 2013 Author: Dave Sweigert, M.Sci., CISSP, CISA, PMP ABSTRACT As the White House drives an industry risk-based approach for cybersecurity that may reduce privacy, insurance carriers are watching the development of liability caps to incentivize those entities that embrace this approach. Background The Cybersecurity Framework (CSF) is an evolving structure and process for “voluntary” certification of private sector critical infrastructure and key resource (CI/KR) operators, encouraged to use a consensus developed risk-based approach proposed by the White House1 . The White House has brought increased visibility to the risk management function of CI/KR operators and has endorsed concepts to incentivize private industry to adopt the CSF as a consensus-based risk management framework (RMF) for the purposes of limiting cyber incident liability. The CSF is a type of the blueprint for a safe harbor, providing protection from 1 Executive Order -- Improving Critical Infrastructure Cybersecurity, 2/12/2013. See: Sec. 7. Baseline Framework to Reduce Cyber Risk to Critical Infrastructure thorny tort and product liability litigation for those entities that implement it. Cyber-insurance Liability caps – a form of tort reform – could be based upon the CSF. When applied to cyber incident damages, caps would limit liability as to the downstream consequences of a cyber-based initiated severe incident (calamity created by the consequences resulting from a cyber breach). Cyber-insurance is an insurance product used to protect policyholders from cybersecurity risks; but may not fully protect against the downstream cascading consequences associated with CI/KR (e.g. power black-outs). Presently, insurers require a policyholder to have some level of cybersecurity as a condition of such coverage. However, damages are generally within the sphere of losses to
  • 2. 2 the enterprise; such as, data breach litigation, physical damage to the enterprise, damaging acts as a result of criminal activity, etc. Widespread adoption of the CSF (to be released in draft form in October 2013) would provide a level of certainty to the cyber-insurance industry as to what measures are considered to be a consensus-based industry best practice. Premiums can then be adjusted to favor policyholders implementing the CSF. Liability caps can also be legislatively applied to those private CI/KR operators that have deployed the CSF. Threshold ceiling amounts as to potential damages can be established for those entities relying on the CSF; which will establish the tangible and material standards of the “safe harbor” via de facto standards. Will technical safeguards limit cyber incident liability? While the U.S. National Institute for Standards and Technology (NIST) is engaging stakeholders to address the technical components of the CSF, the U.S. Department of Commerce (DoC, parent organization to NIST) has been busy engaging stakeholders as to incentive strategies. Two recently published DoC recommendations include:  Partnering with the Insurance Industry to Promote Effective Cybersecurity Measures and Best Practices “ …. the cyber insurance market should respond with premium increases for policyholders that fail to adopt effective cybersecurity protections, and corresponding reductions for those that agree to join the Program (CSF) and adopt effective Framework practices…”  Limiting Liability for Cybersecurity Breaches and Actions Under the Program “…The Administration is currently studying the idea of limited liability protections in other areas that could be directly related to the Program (CSF), depending on its development. For example, as part of the National Strategy for Trusted Identities in Cyberspace (NSTIC), which the President issued in order to address critical cybersecurity weaknesses caused by inadequate online identification and authentication solutions, the President stated that “the Federal government may need to establish or amend both policies and laws to address” concerns such as “the uncertainty and fear of unbounded liability that have limited the market’s growth,” but concerns about where liability should fall still exist….” In sum, these two recommendations appear to suggest that the cyber- insurance industry should explore how macro-level technical safeguards (such as the NSTIC program) could (1) provide an affirmative defense to tort
  • 3. 3 and product liability lawsuits and (2) cap liability of litigation directed at private CIKR operators that have experienced a severe cyber incident. However, the DoC report points out that it can be difficult to measure the effectiveness of a technical counter- measure in the abstract. NSTIC as a national identity floor to reduce cyber liability In the foregoing DoC recommendations, NSTIC appears to be akin to the ship’s Maritime weather radio (technical safeguard to reduce liability) in the context of U.S. v. Carroll Towing. NSTIC is an identity and authentication management initiative of NIST (the same agency guiding the industry collaboration to define and publish the CSF). Some believe that “identity is the new perimeter”, meaning that it is taken for granted that every Internet-connected I.T. enterprise has a firewall, border gateway and other perimeter protecting devices. So too, the theory goes, that these enterprises should rely on a standards-based identity infrastructure, resembling the practical reliance on social security numbers or State issued drivers’ licenses to verify identity. However, privacy advocates are critical of the NSTIC program as it reduces anonymity of Internet users and creates an identity infrastructure requiring verification of an individual’s identity for the purposes of cyber space. Pro-NSTIC advocates claim that the program establishes a business grade class of service on the Internet; enabling a more secure commercial quality of Internet activity. If NSTIC is absorbed into the NIST CSF it may create a new de facto national standard for identity management. Private CI/KR operators would most certainly embrace any technology recognized by the cyber-insurance industry to reduce liability. Legislative bodies would recognize the favorable effect of such a technology to improve the operations of their private CI/KR constituents when proposing caps on cyber liability. These would be very strong and convincing arguments which privacy advocates would need to overcome to slow the adoption of NSTIC as the new identity perimeter for the Internet under the CSF. About the author: Dave Sweigert is a Certified Information Systems Security Professional, Certified Information Systems Auditor, Project Management Professional and holds Master’s degrees in Information Security and Project Management. A former consultant to the U.S. National Security Agency, he is a practitioner of cybersecurity. He is also the moderator of the NSTIC discussion group on LinkedIn.