Thursday, 29 Jan 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Regulation & Policy > CIOs play a role in responding to cybersecurity regulations
Regulation & Policy

CIOs play a role in responding to cybersecurity regulations

Last updated: May 15, 2024 6:10 am
Published May 15, 2024
Share
CIOs play a role in responding to cybersecurity regulations
SHARE

As cyberattacks towards companies and different organizations proceed to extend annually, governments globally are responding with cybersecurity laws that have an effect on CIOs.

MIT tracked a 20% enhance in information breaches from 2022 to 2023 and is following greater than 170 laws mandating cybersecurity necessities for companies, stated Stuart Madnick, a professor of data know-how at MIT. Madnick spoke in the course of the 2024 MIT Sloan CIO Symposium.

Cybersecurity laws stem from a number of entities within the U.S., together with the White Home, Congress, 36 state governments, the Federal Commerce Fee and the Securities and Alternate Fee (SEC), in addition to authorities entities in different international locations. Most of these laws have an effect on IT programs, Madnick stated.

Laws sometimes don’t concentrate on a single difficulty. Certainly, in assessing cybersecurity laws, Madnick stated there are a minimum of 18 necessities that the foundations persistently ask firms to implement. These can function a blueprint for CIOs seeking to keep abreast of compliance and put together for cyberthreats.

The penalties, publicly and financially, of violating these laws will be substantial.
Stuart MadnickProfessor of data know-how, MIT

“Many of those laws cowl a number of areas,” Madnick stated. The penalties, publicly and financially, of violating these laws will be substantial.”

High 5 cybersecurity regulation necessities

Whereas cybersecurity laws overlap in a number of areas, Madnick stated 5 necessities particularly have an effect on CIOs.

1) Software program invoice of supplies

A software program invoice of supplies (SBOM) is a complete stock of elements utilized in varied merchandise, Madnick stated. Laws such because the Nationwide Protection Authorization Act for Fiscal Yr 2023 mandates that any enterprise working with the Division of Protection or the Division of Vitality should current such an inventory for each new contract. In Europe, the Cybersecurity Act makes an analogous requirement.

See also  Musk makes surprise visit to Beijing as Tesla’s China-made cars pass data security rules – NBC 5 Dallas-Fort Worth

Madnick cited the Log4j scenario for instance of how an SBOM record may very well be useful. Log4j is an embedded open supply software program element that was found to have a number of vulnerabilities that resulted in widespread cyberattacks. In mild of the vulnerabilities, CIOs and enterprise leaders have been pressured to decipher their programs to find out if Log4j was embedded inside the layers of their software program merchandise.

“Many firms did not know they’d it as a result of they personally had by no means acquired Log4j,” Madnick stated. “What they’d acquired was an accounting system, for instance, they usually did not understand the builders of these accounting programs had put in Log4j as a part of its elements.”

2) Safe by design

Safe by design means implementing cybersecurity measures originally of the product design course of relatively than including them on on the finish, which Madnick stated is a major problem for companies that do not function that means. However cybersecurity laws just like the California IoT Act require machine producers to implement cheap safety features all through the product’s design.

Madnick stated fascinated with cybersecurity originally would assist defend companies in the long run not solely from working afoul of laws, however from different points down the street.

“Tacking it on after the actual fact will not be at all times straightforward to do,” he stated. “In some circumstances, it nearly requires you to disassemble and redesign all the product.”

3) Prohibition on ransomware funds

A ransomware assault happens when cyberattackers lock down or steal an organization’s information and require fee to return or unlock it. Nonetheless, Madnick stated a number of U.S. state laws, together with in North Carolina, prohibit companies from paying ransomware calls for in an effort to discourage ransomware assaults by making them unprofitable for attackers.

See also  Empowering women in cybersecurity at Infosecurity Europe 2024

Some companies embrace ransom funds in company insurance policies or negotiate with insurance coverage firms to find out whether or not ransomware assaults will probably be coated, however Madnick stated CIOs might want to contemplate “what’s your company coverage” and “how does your company coverage relate to the varied laws on the market.”

4) Knowledge governance

CIOs should take note of information guidelines, together with what information will be collected, how lengthy it may be saved and the way it’s protected. A number of U.S. states have handed legal guidelines governing information privateness, and the GDPR serves because the EU’s main information governance laws.

“There’s an entire vary of points in information governance,” Madnick stated. Safeguarding information is a crucial difficulty in each firm, he added.

5) Incident reporting

Required cybersecurity incident reporting is a brand new improvement for many companies, Madnick stated. Till just lately, it wasn’t a requirement until a cybersecurity incident concerned the discharge of non-public info. He stated incident reporting is a “very lively space for laws.”

For instance, the SEC’s new cybersecurity guidelines require companies to report cybersecurity incidents with materials impression on an organization’s monetary situation or enterprise operations inside 4 days of the incident.

Makenzie Holland is a senior information author protecting huge tech and federal regulation. Previous to becoming a member of TechTarget Editorial, she was a normal task reporter for the Wilmington StarNews and against the law and schooling reporter on the Wabash Plain Supplier.

Source link

TAGGED: CIOs, Cybersecurity, play, Regulations, responding, role
Share This Article
Twitter Email Copy Link Print
Previous Article Engineering students invent a quieter leaf blower Engineering students invent a quieter leaf blower
Next Article It's all Greek to Digital Realty It’s all Greek to Digital Realty
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Quetta Data Centers pioneers sustainable edge expansion in Spain

Quetta Knowledge Facilities, launched by Azora in collaboration with Core Tech Capital, is making important…

December 11, 2025

Verne and OCF power ENGYS’ sustainable HPC deployment

Verne, supplier of sustainable knowledge middle options for prime depth computing, has introduced the profitable…

June 25, 2024

OpenHands Raises $18.8M to Scale Enterprise Cloud Coding Agents

OpenHands, a quickly rising open platform for cloud-based coding brokers, has raised an $18.8 million…

November 22, 2025

Qualcomm unveils Snapdragon 8 Elite as world’s fastest mobile CPU

Be part of our day by day and weekly newsletters for the most recent updates…

October 22, 2024

Vizzy Raises £3.65M in Seed Funding

Vizzy, a London, UK-based expertise platform supplier for world manufacturers, raised £3.65M in Seed funding.…

April 20, 2025

You Might Also Like

DETANGLE project supports EU cybersecurity regulations
Innovations

DETANGLE project supports EU cybersecurity regulations

By saad
The CIO’s guide to governance
AI

The CIO’s guide to governance

By saad
EU cybersecurity
Innovations

EU Cybersecurity Act overhaul targets rising threats

By saad
AI dominated the conversation in 2025, CIOs shift gears in 2026
AI

AI dominated the conversation in 2025, CIOs shift gears in 2026

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.