Wednesday, 18 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Regulation & Policy > CIOs play a role in responding to cybersecurity regulations
Regulation & Policy

CIOs play a role in responding to cybersecurity regulations

Last updated: May 15, 2024 6:10 am
Published May 15, 2024
Share
CIOs play a role in responding to cybersecurity regulations
SHARE

As cyberattacks towards companies and different organizations proceed to extend annually, governments globally are responding with cybersecurity laws that have an effect on CIOs.

MIT tracked a 20% enhance in information breaches from 2022 to 2023 and is following greater than 170 laws mandating cybersecurity necessities for companies, stated Stuart Madnick, a professor of data know-how at MIT. Madnick spoke in the course of the 2024 MIT Sloan CIO Symposium.

Cybersecurity laws stem from a number of entities within the U.S., together with the White Home, Congress, 36 state governments, the Federal Commerce Fee and the Securities and Alternate Fee (SEC), in addition to authorities entities in different international locations. Most of these laws have an effect on IT programs, Madnick stated.

Laws sometimes don’t concentrate on a single difficulty. Certainly, in assessing cybersecurity laws, Madnick stated there are a minimum of 18 necessities that the foundations persistently ask firms to implement. These can function a blueprint for CIOs seeking to keep abreast of compliance and put together for cyberthreats.

The penalties, publicly and financially, of violating these laws will be substantial.
Stuart MadnickProfessor of data know-how, MIT

“Many of those laws cowl a number of areas,” Madnick stated. The penalties, publicly and financially, of violating these laws will be substantial.”

High 5 cybersecurity regulation necessities

Whereas cybersecurity laws overlap in a number of areas, Madnick stated 5 necessities particularly have an effect on CIOs.

1) Software program invoice of supplies

A software program invoice of supplies (SBOM) is a complete stock of elements utilized in varied merchandise, Madnick stated. Laws such because the Nationwide Protection Authorization Act for Fiscal Yr 2023 mandates that any enterprise working with the Division of Protection or the Division of Vitality should current such an inventory for each new contract. In Europe, the Cybersecurity Act makes an analogous requirement.

See also  How CIOs Can Build AI-Ready IT Teams

Madnick cited the Log4j scenario for instance of how an SBOM record may very well be useful. Log4j is an embedded open supply software program element that was found to have a number of vulnerabilities that resulted in widespread cyberattacks. In mild of the vulnerabilities, CIOs and enterprise leaders have been pressured to decipher their programs to find out if Log4j was embedded inside the layers of their software program merchandise.

“Many firms did not know they’d it as a result of they personally had by no means acquired Log4j,” Madnick stated. “What they’d acquired was an accounting system, for instance, they usually did not understand the builders of these accounting programs had put in Log4j as a part of its elements.”

2) Safe by design

Safe by design means implementing cybersecurity measures originally of the product design course of relatively than including them on on the finish, which Madnick stated is a major problem for companies that do not function that means. However cybersecurity laws just like the California IoT Act require machine producers to implement cheap safety features all through the product’s design.

Madnick stated fascinated with cybersecurity originally would assist defend companies in the long run not solely from working afoul of laws, however from different points down the street.

“Tacking it on after the actual fact will not be at all times straightforward to do,” he stated. “In some circumstances, it nearly requires you to disassemble and redesign all the product.”

3) Prohibition on ransomware funds

A ransomware assault happens when cyberattackers lock down or steal an organization’s information and require fee to return or unlock it. Nonetheless, Madnick stated a number of U.S. state laws, together with in North Carolina, prohibit companies from paying ransomware calls for in an effort to discourage ransomware assaults by making them unprofitable for attackers.

See also  Microsoft Azure removes exit fee as EU regulations kick in

Some companies embrace ransom funds in company insurance policies or negotiate with insurance coverage firms to find out whether or not ransomware assaults will probably be coated, however Madnick stated CIOs might want to contemplate “what’s your company coverage” and “how does your company coverage relate to the varied laws on the market.”

4) Knowledge governance

CIOs should take note of information guidelines, together with what information will be collected, how lengthy it may be saved and the way it’s protected. A number of U.S. states have handed legal guidelines governing information privateness, and the GDPR serves because the EU’s main information governance laws.

“There’s an entire vary of points in information governance,” Madnick stated. Safeguarding information is a crucial difficulty in each firm, he added.

5) Incident reporting

Required cybersecurity incident reporting is a brand new improvement for many companies, Madnick stated. Till just lately, it wasn’t a requirement until a cybersecurity incident concerned the discharge of non-public info. He stated incident reporting is a “very lively space for laws.”

For instance, the SEC’s new cybersecurity guidelines require companies to report cybersecurity incidents with materials impression on an organization’s monetary situation or enterprise operations inside 4 days of the incident.

Makenzie Holland is a senior information author protecting huge tech and federal regulation. Previous to becoming a member of TechTarget Editorial, she was a normal task reporter for the Wilmington StarNews and against the law and schooling reporter on the Wabash Plain Supplier.

Source link

TAGGED: CIOs, Cybersecurity, play, Regulations, responding, role
Share This Article
Twitter Email Copy Link Print
Previous Article Engineering students invent a quieter leaf blower Engineering students invent a quieter leaf blower
Next Article It's all Greek to Digital Realty It’s all Greek to Digital Realty
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Planning reform is needed to unlock data centre growth

The UK’s complicated planning system has stifled knowledge centre enlargement for years by creating delays,…

April 7, 2025

Neudesic launches in Australia in a bid to speed up AI adoption for IT teams

Synthetic intelligence (AI) has gained important traction amongst enterprise leaders eager to discover methods it…

February 18, 2025

Premio secures triple ‘Best in Show’ honors for rugged edge innovation

Rugged edge and embedded computing supplier Premio received three “Finest in Present” awards at Embedded…

October 30, 2024

Will Google throw gasoline on the AI chip arms race?

The Nvidia processors, he explains, are for processing large, giant language fashions (LLMs), whereas the…

December 17, 2025

Fiberwood Raises €3.1M Grant

Fiberwood, a Järvenpää, Finland-based wooden know-how firm, acquired €3.1M Grant from the EU LIFE Programme.…

June 17, 2025

You Might Also Like

DETANGLE project supports EU cybersecurity regulations
Innovations

DETANGLE project supports EU cybersecurity regulations

By saad
The CIO’s guide to governance
AI

The CIO’s guide to governance

By saad
EU cybersecurity
Innovations

EU Cybersecurity Act overhaul targets rising threats

By saad
AI dominated the conversation in 2025, CIOs shift gears in 2026
AI

AI dominated the conversation in 2025, CIOs shift gears in 2026

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.