News Stay informed about the latest enterprise technology news and product updates.

Will cybersecurity legislation's data sharing measures hurt privacy?

Information sharing plays a big role in proposed cybersecurity legislation, but will the new measures hurt data privacy? Discuss with us during #GRChat May 7 at 12 p.m. EST.

U.S. cybersecurity legislation is once again under debate after huge data breaches have cost the public and private...

sectors billions of dollars in recent years. The U.S. House has passed the Protecting Cyber Networks Act, a bill that compels companies to share cyberthreat information with federal investigators and one another. Like previous iterations, however, the proposed cybersecurity legislation has raised questions: Business proponents are concerned about how the data sharing component will impact private-sector resources, and the NSA's data collection controversy has made some skeptical about the notion of sharing any additional information with the federal government.

Join SearchCompliance on Twitter Thursday, May 7, at 12 p.m. EST, for a #GRCchat about the U.S. cybersecurity proposals and whether they are the correct first step to data breach protection. Topics we may discuss include the pros and cons of the proposed cybersecurity legislation, whether the data sharing policies will hurt consumer privacy and how the new measures could influence business processes.

SearchCompliance editors will lead the chat from the site's Twitter handle, @ITCompliance, joined by other TechTarget writers, editors and experts.

Details:

Date: Thursday, May 7, 2015

Time: 12 p.m. EST

Host: @ITCompliance

Hashtag: Use and follow #GRCchat

Is this your first #GRCchat? Whether you're a first-timer or returning tweet chatter, read the following pointers before signing on:

To follow the conversation, type "#GRCchat" into Twitter's search bar. From this page, select "All" to view tweets in real time.

Your first #GRCchat tweet should be introductory, including your name, title and organization.

@ITCompliance will ask a series of questions related to cybersecurity legislation starting at 12 p.m. EDT (Q1, Q2, etc.). In your tweeted responses to each question, please preface with A1 (Answer 1), A2 and so on, then remember to include "#GRCchat". Each tweet sent during the chat should include the hashtag.

Please note that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question (consider using format "1 of 2" or "1/2" to identify there is more)

Throughout the discussion, retweet (RT) and favorite tweets you agree with and reply to those you don't.

Please direct questions, RSVPs or other concerns to SearchCompliance Editor Ben Cole. "See" you on Twitter!

Next Steps

Learn more about federal officials' push for better cybersecurity information sharing and how CIOs are starting to be held accountable for lacking data breach protection.

Dig Deeper on Risk management and compliance

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Is public/private sector information sharing the best way to achieve data breach protection and cybersecurity?
Cancel

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close