Главная
Study mode:
on
1
Introduction
2
Disclosure
3
Cybersecurity Act of 2015
4
Information Sharing Bill
5
Existing Laws
6
Wiretap Act
7
Wiretap Exceptions
8
Stored Communications
9
Computer Fraud Abuse Act
10
Data Security Laws
11
Cybersecurity Act
12
Honey Tokens
13
Integrated defenses
14
Information sharing
15
Cyber threat indicators
16
XML format
17
Default example
18
Privacy
19
Liability
20
Antitrust
21
Conclusion
22
Questions
23
Honeypile
Description:
Explore the Cybersecurity Act of 2015 in this 52-minute conference talk from BSidesCharm 2017. Delve into the intricacies of information sharing legislation, examining existing laws such as the Wiretap Act, Stored Communications Act, and Computer Fraud Abuse Act. Learn about key components of the Cybersecurity Act, including honey tokens, integrated defenses, and cyber threat indicators. Understand the implications for privacy, liability, and antitrust concerns. Gain insights into the XML format for sharing threat information and discuss the concept of honeypiles. Conclude with a Q&A session to address any remaining questions about this significant piece of cybersecurity legislation.

Understanding the Cybersecurity Act of 2015

Add to list
0:00 / 0:00