Down the Rabbit-Hole…Again?

The New York Times ran an interesting story on January 5 about a House Republican inviting input from businesses on which regulations were impeding economic recovery.  I am sure the House will get at least a few comments on this topic.  Since I had just finished reading Professor Tim Wu’s new book–The Master Switch–I had the distinct feeling I had seen this process before.

All security professionals operate in a highly regulated environment and more information security regulations can be expected in 2011.  The Internet is a commons and needs regulation, but it is not clear if this should be government regulation, private industry self-regulation, or a combination of both.  Government regulation recently has seemed inept and unable to prevent either disastrous financial meltdowns or near-disastrous oil spills.

Professor Wu’s interesting book documents the interplay of industry and government control in the telecom and media business over the past 100 years.  One theme of this book is the attempt by the industry to control the regulatory process for the benefit of specific industry players.  It is not a pretty picture nor an optimistic picture.  The author does offer the idea that all of us need to be involved in the regulatory process at some level.  Ultimately regulations or lack of regulations are just a reflection of the political trends of the times.  Security professionals need to be heard in this process just as much as industry lobbyists.  Professional group activities are one way to participate.

You might think there is no way you can have any influence.  However, a friend recently forwarded me a success story about government regulation.   This is the story, by another professor, Herbert Needleman,  of the successful regulation and control of lead in the environment. While this took 30 years, the level of lead in the air decreased by 30X from the days of lead-containing gasoline.  Most interesting is the description of lead industry research purporting to show that rats with lead-containing diets were healthier than rats with no lead!!   The other interesting point in the lead story is the almost heroic work of a few people, who ultimately were proved right.  One individual can make a big difference even in Washington.

Frederick Scholl

Frederick Scholl is an accomplished Global Senior Information Security Risk Manager. Dr. Scholl earned a BS and Ph.D. in Electrical Engineering from Cornell University. In 1991, Fred founded Monarch Information Networks, LLC to enable forward-thinking organizations to protect their information. Previously, he co-founded Codenoll Technology Corporation (NASDAQ: CODN). He chaired the IEEE committee that wrote the first standard for Ethernet communication over fiber optic links, now used world-wide.

Book an Appointment for Cybersecurity Issues

Request an appointment with Dr. Fred Scholl. We will discuss any cybersecurity issues you have.

More Good Reading

Cybersecurity Thrives in An Organizational Context

The First National Cybersecurity Summit

New Privacy Laws Require Security Professionals Up Their Game

Cybersecurity Workforce Development: Real or Imagined Problem?

Antidote for Fake Everything

Information Security Risks, Gray Rhinos and Black Swans

Managing Information Security On a Limited Budget

Building a Security Start-Up

Cybersecurity Risk Management for Directors

My Reading List for Security Start-Ups

Should Your CIO Learn to Code?

How IT Leaders Can Keep a Seat at the Table

Equifax points out—again—the need for speed in security management

Anatomy of a Security Breach

The Smartest Information Security Companies

Book Review: Play Bigger

Long Term Beneficiaries of WannaCry

RISK: A NEW MOVIE ABOUT JULIAN ASSANGE

TRADE SECRET THEFT CONTINUES UNABATED

TENNESSEE LEGISLATORS MUDDY WATERS AROUND PRIVACY BREACH NOTIFICATION REQUIREMENTS

LEADERSHIP CHECKLIST FOR SECURITY PROFESSIONALS

SIEM VENDORS HAVE IT ALL BACKWARDS

THE SECRET TO GROWING YOUR SECURITY STARTUP

CLOUD JOBS PEAKING?

The Spy Who Couldn’t Spell

IS THERE A CYBERSECURITY PROFESSIONALS SHORTAGE?

No Blue Pill for Cybersecurity Failures

Presidential Cybersecurity Commission Makes Some Good Suggestions

Understanding Intelligence

Align Your Security Program With the Business

Don’t fall victim to BEC

Enterprise Risk Management and Information Security

Evidence Based Risk Assessment: Lessons Learned from the Y-12 Breach

First Conviction for Illegally Distributing Android Apps

Locking Up the Ivory Tower

Cloud Vulnerabilities

More Security Lessons Learned from the Y-12 Breach

Security or Compliance?

Home Disaster Recovery Planning

Cloud Computing: Trust but Verify

Background Checks May Not Be Enough

PERFECT SECURITY STORM FOR LAW FIRMS?

How Not To Be a Cyber Janitor

SECURITY MEMO: IT CAN’T HAPPEN HERE, CAN IT?

Don’t Forget Cloud Availability

Compliance v. Security

GAO Report on Information Security in Federal Government

Lean Security

Mitigate Your Social Engineering Vulnerabilities

HIPAA Security. Are We Making Progress?

Brand Your Security Program

PDCA is Dead

LEARNING FROM PAST MISTAKES

How Better Security Can Create Shared Value

C’est La Vie, You Never Can Tell: Lessons Learned from the HBGary Hack

DDOS Tutorial

The future of information technology

Data Governance Anyone?

Learning from the oil spill disaster

Down the Rabbit-Hole…Again?

Ideas on Risk Management