Overview
Explore the Cybersecurity Act of 2015 in this 52-minute conference talk from BSidesCharm 2017. Delve into the intricacies of information sharing legislation, examining existing laws such as the Wiretap Act, Stored Communications Act, and Computer Fraud Abuse Act. Learn about key components of the Cybersecurity Act, including honey tokens, integrated defenses, and cyber threat indicators. Understand the implications for privacy, liability, and antitrust concerns. Gain insights into the XML format for sharing threat information and discuss the concept of honeypiles. Conclude with a Q&A session to address any remaining questions about this significant piece of cybersecurity legislation.
Syllabus
Introduction
Disclosure
Cybersecurity Act of 2015
Information Sharing Bill
Existing Laws
Wiretap Act
Wiretap Exceptions
Stored Communications
Computer Fraud Abuse Act
Data Security Laws
Cybersecurity Act
Honey Tokens
Integrated defenses
Information sharing
Cyber threat indicators
XML format
Default example
Privacy
Liability
Antitrust
Conclusion
Questions
Honeypile