Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Telecoms Asked to Devise Cybersecurity Plans

13/06/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmzcvndivnze1l2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0


The U.S. federal government’s top telecommunications regulator is proposing a “new regulatory paradigm” by calling on communications providers to step up and assume new responsibilities to manage cyber risks.

Federal Communications Commission Chairman Tom Wheeler outlined in a June 12 speech his vision for relying on industry and the market as an alternative to implementing new regulations. He described a voluntary initiative to help secure information networks operated by telecommunications companies and Internet service providers.

Wheeler said the new paradigm must be based on private-sector innovation and the alignment of private interests, such as return on investment, with public interests, such as public safety and national security.

“It needs to be more dynamic than rules, and – this is a key point – it needs to be more demonstrably effective than blindly trusting the market,” he said. “… The bottom line is that this new paradigm can’t be ‘happy talk’ about good ideas – it has to work in the real world. We need market accountability on cybersecurity that doesn’t exist today, so that appropriately predictive and proactive investment is made to improve cyber readiness.”

The largest U.S. broadband provider, Comcast, says it and other Internet service providers are up to the task to work with the FCC. “We have and will continue to be committed to taking a leadership role in establishing practices that meet the dynamic and ever-changing nature of these threats,” Myrna Soto, Comcast Cable senior vice president and chief information and infrastructure security officer, says in a statement.

Wheeler, though, hinted that the FCC could adopt cybersecurity regulations if industry fails to adopt effective IT security best practices. “While I am confident that it will work, we must be ready with alternatives if it doesn’t,” he said.

This article has been extracted from http://www.govinfosecurity.com, please click on this link to read the article in full http://www.govinfosecurity.com/telecoms-asked-to-devise-cybersecurity-plans-a-6949

Montash is a multi-award winning, global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...