Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Understanding the Cybersecurity Act of 2015

via YouTube

Overview

Explore the Cybersecurity Act of 2015 in this 52-minute conference talk from BSidesCharm 2017. Delve into the intricacies of information sharing legislation, examining existing laws such as the Wiretap Act, Stored Communications Act, and Computer Fraud Abuse Act. Learn about key components of the Cybersecurity Act, including honey tokens, integrated defenses, and cyber threat indicators. Understand the implications for privacy, liability, and antitrust concerns. Gain insights into the XML format for sharing threat information and discuss the concept of honeypiles. Conclude with a Q&A session to address any remaining questions about this significant piece of cybersecurity legislation.

Syllabus

Introduction
Disclosure
Cybersecurity Act of 2015
Information Sharing Bill
Existing Laws
Wiretap Act
Wiretap Exceptions
Stored Communications
Computer Fraud Abuse Act
Data Security Laws
Cybersecurity Act
Honey Tokens
Integrated defenses
Information sharing
Cyber threat indicators
XML format
Default example
Privacy
Liability
Antitrust
Conclusion
Questions
Honeypile

Reviews

Start your review of Understanding the Cybersecurity Act of 2015

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.