SlideShare a Scribd company logo
1 of 6
CONTINUED 
SENATE RULES COMMITTEE 
Office of Senate Floor Analyses 
1020 N Street, Suite 524 
(916) 651-1520 Fax: (916) 327-4478 
AB 2200 
THIRD READING 
Bill No: AB 2200 
Author: John A. Pérez (D) 
Amended: 8/30/14 in Senate 
Vote: 21 
SENATE GOVERNMENTAL ORGANIZATION COMMITTEE: 8-1, 6/24/14 
AYES: Correa, Cannella, De León, Galgiani, Hernandez, Lieu, Padilla, Torres 
NOES: Vidak 
NO VOTE RECORDED: Berryhill, Vacancy 
SENATE APPROPRIATIONS COMMITTEE: 5-0, 8/14/14 
AYES: De León, Hill, Lara, Padilla, Steinberg 
NO VOTE RECORDED: Walters, Gaines 
ASSEMBLY FLOOR: 74-3, 5/28/14 - See last page for vote 
SUBJECT: California Cyber Security Steering Committee 
SOURCE: Author 
DIGEST: This bill creates a 13-member California Cyber Security Steering 
Committee (Committee) in the Governor’s Office of Emergency Services (OES); 
continues in existence the California Cyber Security Task Force (Task Force); and 
requires the Committee to seek to implement the policy recommendations of the 
Task Force based on specified priorities. Sunsets the provisions of this bill on 
January 1, 2020. 
Senate Floor Amendments of 8/30/14 delete the provision requiring the Task Force 
to operate within the current information technology budget of departments and 
agencies they serve; and make a clarifying change.
AB 2200 
Page 2 
Senate Floor Amendments of 8/22/14 substitute the creation of a Committee 
instead of a California Cyber Security Commission, and continue in existence the 
Task Force. 
CONTINUED 
ANALYSIS: 
Existing law: 
1. Establishes the Department of Technology (DOT) within the Government 
Operations Agency, responsible for establishing and enforcing state 
information technology strategic plans, policies, standards, and enterprise 
architecture. The Director of DOT is the State Chief Information Officer, and 
is responsible for enhancing the security, reliability, and quality of information 
technology networks, services, and systems. 
2. Requires each state agency to have a chief information officer who is 
appointed by the head of the state entity, and is responsible for supervising all 
information technology, including information security. 
3. Establishes the Office of Information Security (OIS), within DOT, which is 
responsible for ensuring the confidentiality, integrity, and availability of state 
systems and applications. Requires the OIS to develop an information security 
program and establish policies, standards, and procedures directing state 
agencies to effectively manage security and risk. 
4. Establishes OES to provide critical infrastructure protection and related 
emergency response. 
This bill: 
1. Makes various legislative findings and declarations relative to the state’s 
growing dependence on technology which has made it increasingly vulnerable 
technically, legally, and financially to both foreign and domestic cybersecurity 
attacks and that for the purposes of public safety and protection of public 
assets, the state has a role in coordinating and improving its overall security 
and response capabilities. 
2. Continues in existence the Task Force, created in OES and DOT. 
3. Requires OES and DOT to convene stakeholders, both public and private, to 
act in an advisory capacity and compile policy recommendations on cyber
AB 2200 
Page 3 
security for the state. Requires the Task Force to complete and issue a report 
of policy recommendations to the Governor’s Office and Legislature. 
4. Requires the Task Force to meet at least quarterly within existing resources to 
ensure the policy recommendations from the report are implemented and any 
necessary modifications which may arise are addressed in a timely manner. 
5. Requires OES and DOT to collaborate with the Committee to help streamline 
implementation of policy recommendations set forth in the Task Force’s 
report. Also, requires that this collaboration be guided by specific priorities as 
described in this bill. 
6. Authorizes OES and DOT to conduct the strategic direction of risk assessments 
performed by the Military Department’s Computer Network Defense Team as 
budgeted in the Budget Act of 2014. 
7. Creates the Committee within OES consisting of 13 members, as specified. 
Stipulates that members of the Committee will meet at least quarterly and 
serve without compensation, except that members will be entitled to receive 
actual and necessary travel expenses while on official business of the 
Committee. Provides that representatives appointed by the Governor, Speaker 
of the Assembly, or Senate Rules Committee shall serve a two-year term; any 
designee shall serve at the pleasure of the official who designated them; and 
provides that eight members will constitute a quorum. 
8. Requires the Committee to seek to implement the policy recommendation of 
CONTINUED 
the Task Force based on the following priorities: 
A. Developing cyber prevention, defense, and response strategies and 
defining a hierarchy of command within the state. 
B. Partnering with the United States Department of Homeland Security to 
develop an appropriate information sharing system to effectively 
disseminate cyber threat and response information and data to relevant 
private and public sector entities. 
C. Providing recommendations for information technology security 
standards. 
D. Compiling and integrating the research conducted by academic 
institutions, federal laboratories, and other cybersecurity experts.
AB 2200 
Page 4 
E. Expanding the state’s public-private cybersecurity partnership network 
CONTINUED 
both domestically and internationally. 
F. Developing and providing training programs with the state’s higher 
education and labor entities to produce a credentialed and qualified 
state cybersecurity taskforce. 
G. Expanding collaboration with the state’s law enforcement apparatus. 
H. Proposing potential operational or functional enhancement, as well as 
investment or spending recommendation and guidance. 
I. Coordinating the pursuit of fiscal resources to enhance the state’s 
cybersecurity, information technology, data privacy, cyber research, 
and technology-based emergency response capabilities. 
9. Authorizes the Task Force to issue reports to the Governor and the Legislature 
detailing the activities of the Task Force, including, but not limited to, progress 
on the Task Force’s tasks and actions taken and recommended in response to 
an incident, as appropriate. 
10. Requires the Task Force to engage or accept (a) the services of agency or 
department personnel, (b) the services of stakeholder organizations, and (c) 
federal, private, or other nonstate funding, to operate, manage, or conduct the 
business of the Task Force. 
11. Requires each department and agency to cooperate with the commission and 
furnish it with information and assistance necessary or useful to further the 
purposes of this bill. 
12. Contains a January 1, 2020 sunset provision. 
Background 
The OIS is the primary state office charged with protecting state information and 
ensuring confidentiality, integrity, and availability of state systems and 
applications. In short, OIS is responsible, along with other agencies, for ensuring 
the state’s cybersecurity. However, various other programs and agencies have 
roles related to managing the state’s cybersecurity.
AB 2200 
Page 5 
In May 2013, the Governor’s Office convened the Task Force to assess 
departmental technology systems and assemble key stakeholders to discuss 
cybersecurity issues. The state has made a number of cybersecurity investments, 
including: funding research at Lawrence Livermore Laboratories and augmenting 
the cybersecurity unit within the California National Guard. In addition, numerous 
academic and private sector organizations are working on the issue of 
cybersecurity. 
FISCAL EFFECT: Appropriation: No Fiscal Com.: Yes Local: No 
CONTINUED 
Unknown with latest amendments. 
SUPPORT: (Verified 8/25/14) 
Bay Area Council 
League of California Cities 
Risk and Insurance Management Society 
San Diego Regional Economic Development Corporation 
SMUD 
OPPOSITION: (Verified 8/25/14) 
Office of the San Diego County District Attorney 
ARGUMENTS IN SUPPORT: The League of California Cities writes that this 
bill places cybersecurity on more solid footing, with enhanced visibility and 
importance within the state policymaking arena. This is an issue of rapidly 
increasing importance that not only affects the financial data of businesses and 
personal data of private individuals, but has national security implications - as 
evidenced by the fact that the U.S. Defense Department has taken a leading role, in 
part due to concerns about potential cyber-attacks launched by other nations. 
Closer to home, California municipalities, to the degree they are digitizing their 
financial and other data and engaging in electronic transactions, are also at risk, so 
this is and will remain a critical issue for many of our larger cities. 
ARGUMENTS IN OPPOSITION: The Office of the San Diego County 
District Attorney writes, “we believe this proposal is misguided and will have a 
deleterious effect on the work that is currently being done in this region served by 
our Computer and Technology Crime High-Tech Response Team (CATCH). For 
the past several years, the legislature has decreased our funding, leading to budget 
uncertainty that jeopardized the very existences of these critical teams. The state
AB 2200 
Page 6 
even disbanded the Advanced Training Division (ATC), which provided critical 
training for these task forces. Incredibly, despite the state’s damaging actions over 
the past several years, our task force has increased investigations and prosecutions. 
Now, AB 2200 seeks to deliver what can only be described as life-threatening 
blow to the very law enforcement groups who are the most knowledgeable about 
one of the fastest growing and economically threatening criminal trends in our 
communities.” 
ASSEMBLY FLOOR: 74-3, 5/28/14 
AYES: Achadjian, Alejo, Allen, Ammiano, Bigelow, Bloom, Bocanegra, Bonilla, 
Bonta, Bradford, Brown, Buchanan, Ian Calderon, Campos, Chau, Chesbro, 
Conway, Cooley, Dababneh, Dahle, Daly, Dickinson, Eggman, Fong, Fox, 
Garcia, Gatto, Gomez, Gonzalez, Gordon, Gorell, Gray, Grove, Hagman, Hall, 
Harkey, Roger Hernández, Holden, Jones, Jones-Sawyer, Levine, Linder, 
Logue, Lowenthal, Maienschein, Medina, Melendez, Mullin, Muratsuchi, 
Nazarian, Nestande, Olsen, Pan, Patterson, Perea, John A. Pérez, V. Manuel 
Pérez, Quirk, Quirk-Silva, Rendon, Ridley-Thomas, Rodriguez, Salas, Skinner, 
Stone, Ting, Wagner, Waldron, Weber, Wieckowski, Wilk, Williams, Yamada, 
Atkins 
NOES: Donnelly, Beth Gaines, Mansoor 
NO VOTE RECORDED: Chávez, Frazier, Vacancy 
MW:d 8/30/14 Senate Floor Analyses 
SUPPORT/OPPOSITION: SEE ABOVE 
**** END ****

More Related Content

What's hot

OGI Progress Report to the American People
OGI Progress Report to the American PeopleOGI Progress Report to the American People
OGI Progress Report to the American PeopleObama White House
 
White House IP Enforcement Coordinator Requests Comments on Development of St...
White House IP Enforcement Coordinator Requests Comments on Development of St...White House IP Enforcement Coordinator Requests Comments on Development of St...
White House IP Enforcement Coordinator Requests Comments on Development of St...Patton Boggs LLP
 
Capital Thinking ~ March 11, 2013
Capital Thinking ~ March 11, 2013Capital Thinking ~ March 11, 2013
Capital Thinking ~ March 11, 2013Patton Boggs LLP
 
Department of Education Preliminary Regulatory Reform Plan
Department of Education Preliminary Regulatory Reform PlanDepartment of Education Preliminary Regulatory Reform Plan
Department of Education Preliminary Regulatory Reform PlanObama White House
 
Maryland's 12 Core Goals for Homeland Security
Maryland's 12 Core Goals for Homeland SecurityMaryland's 12 Core Goals for Homeland Security
Maryland's 12 Core Goals for Homeland Securitymdgov
 
Summary and-analysis-of-ntia-public safety broadband planning grant
Summary and-analysis-of-ntia-public safety broadband planning grantSummary and-analysis-of-ntia-public safety broadband planning grant
Summary and-analysis-of-ntia-public safety broadband planning grantState of Georgia
 
Federal Legislative and Regulatory Update
Federal Legislative and Regulatory UpdateFederal Legislative and Regulatory Update
Federal Legislative and Regulatory Updatepearsoncareer
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIABenedict Ishabakaki
 
Capital Thinking ~ January 21, 2013
Capital Thinking ~ January 21, 2013Capital Thinking ~ January 21, 2013
Capital Thinking ~ January 21, 2013Patton Boggs LLP
 
Federal Acquistion Regulation Preliminary Regulatory Reform Plan
Federal Acquistion Regulation Preliminary Regulatory Reform PlanFederal Acquistion Regulation Preliminary Regulatory Reform Plan
Federal Acquistion Regulation Preliminary Regulatory Reform PlanObama White House
 
Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailandgcanavati
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...Duane Blackburn
 
Capital Thinking ~ February 4, 2013
Capital Thinking ~ February 4, 2013Capital Thinking ~ February 4, 2013
Capital Thinking ~ February 4, 2013Patton Boggs LLP
 
Sookman oba casl._slides
Sookman oba casl._slidesSookman oba casl._slides
Sookman oba casl._slidesbsookman
 

What's hot (18)

Open Government Directive
Open Government DirectiveOpen Government Directive
Open Government Directive
 
OGI Progress Report to the American People
OGI Progress Report to the American PeopleOGI Progress Report to the American People
OGI Progress Report to the American People
 
White House IP Enforcement Coordinator Requests Comments on Development of St...
White House IP Enforcement Coordinator Requests Comments on Development of St...White House IP Enforcement Coordinator Requests Comments on Development of St...
White House IP Enforcement Coordinator Requests Comments on Development of St...
 
Capital Thinking ~ March 11, 2013
Capital Thinking ~ March 11, 2013Capital Thinking ~ March 11, 2013
Capital Thinking ~ March 11, 2013
 
Department of Education Preliminary Regulatory Reform Plan
Department of Education Preliminary Regulatory Reform PlanDepartment of Education Preliminary Regulatory Reform Plan
Department of Education Preliminary Regulatory Reform Plan
 
Maryland's 12 Core Goals for Homeland Security
Maryland's 12 Core Goals for Homeland SecurityMaryland's 12 Core Goals for Homeland Security
Maryland's 12 Core Goals for Homeland Security
 
Ohio Probate Law Journal Article
Ohio Probate Law Journal ArticleOhio Probate Law Journal Article
Ohio Probate Law Journal Article
 
Open Government Directive
Open Government DirectiveOpen Government Directive
Open Government Directive
 
Summary and-analysis-of-ntia-public safety broadband planning grant
Summary and-analysis-of-ntia-public safety broadband planning grantSummary and-analysis-of-ntia-public safety broadband planning grant
Summary and-analysis-of-ntia-public safety broadband planning grant
 
Federal Legislative and Regulatory Update
Federal Legislative and Regulatory UpdateFederal Legislative and Regulatory Update
Federal Legislative and Regulatory Update
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
 
Capital Thinking ~ January 21, 2013
Capital Thinking ~ January 21, 2013Capital Thinking ~ January 21, 2013
Capital Thinking ~ January 21, 2013
 
Federal Acquistion Regulation Preliminary Regulatory Reform Plan
Federal Acquistion Regulation Preliminary Regulatory Reform PlanFederal Acquistion Regulation Preliminary Regulatory Reform Plan
Federal Acquistion Regulation Preliminary Regulatory Reform Plan
 
Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailand
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
 
Federal and State Income Taxation of Individuals Course, Form #12.003
Federal and State Income Taxation of Individuals Course, Form #12.003Federal and State Income Taxation of Individuals Course, Form #12.003
Federal and State Income Taxation of Individuals Course, Form #12.003
 
Capital Thinking ~ February 4, 2013
Capital Thinking ~ February 4, 2013Capital Thinking ~ February 4, 2013
Capital Thinking ~ February 4, 2013
 
Sookman oba casl._slides
Sookman oba casl._slidesSookman oba casl._slides
Sookman oba casl._slides
 

Viewers also liked

amrapali builders@@@@hacking windows internals.pdf
amrapali builders@@@@hacking windows internals.pdfamrapali builders@@@@hacking windows internals.pdf
amrapali builders@@@@hacking windows internals.pdfamrapalibuildersreviews
 
NSA Journal of Information Warfare
NSA Journal of Information WarfareNSA Journal of Information Warfare
NSA Journal of Information WarfareDavid Sweigert
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.Emiland
 
What I Carry: 10 Tools for Success
What I Carry: 10 Tools for SuccessWhat I Carry: 10 Tools for Success
What I Carry: 10 Tools for SuccessJonathon Colman
 

Viewers also liked (7)

amrapali builders@@@@hacking windows internals.pdf
amrapali builders@@@@hacking windows internals.pdfamrapali builders@@@@hacking windows internals.pdf
amrapali builders@@@@hacking windows internals.pdf
 
NSA Journal of Information Warfare
NSA Journal of Information WarfareNSA Journal of Information Warfare
NSA Journal of Information Warfare
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.
 
What I Carry: 10 Tools for Success
What I Carry: 10 Tools for SuccessWhat I Carry: 10 Tools for Success
What I Carry: 10 Tools for Success
 

Similar to California Cyber Security Task Force - Status August 2014

Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
 
Dr Dev Kambhampati | USA Cybersecurity R&D Strategic Plan
Dr Dev Kambhampati | USA Cybersecurity R&D Strategic PlanDr Dev Kambhampati | USA Cybersecurity R&D Strategic Plan
Dr Dev Kambhampati | USA Cybersecurity R&D Strategic PlanDr Dev Kambhampati
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportLandon Harrell
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementDavid Sweigert
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksTechWell
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxphilipnelson29183
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?Robert Bromwich
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfAlexandre Pinheiro
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]Lucy Kitchin
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonPatton Boggs LLP
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022Dawn Yankeelov
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 

Similar to California Cyber Security Task Force - Status August 2014 (20)

Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
Information Sharing and Protection
Information Sharing and ProtectionInformation Sharing and Protection
Information Sharing and Protection
 
Dr Dev Kambhampati | USA Cybersecurity R&D Strategic Plan
Dr Dev Kambhampati | USA Cybersecurity R&D Strategic PlanDr Dev Kambhampati | USA Cybersecurity R&D Strategic Plan
Dr Dev Kambhampati | USA Cybersecurity R&D Strategic Plan
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final Report
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal Risks
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?
 
Lewallen final
Lewallen   finalLewallen   final
Lewallen final
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdf
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

California Cyber Security Task Force - Status August 2014

  • 1. CONTINUED SENATE RULES COMMITTEE Office of Senate Floor Analyses 1020 N Street, Suite 524 (916) 651-1520 Fax: (916) 327-4478 AB 2200 THIRD READING Bill No: AB 2200 Author: John A. Pérez (D) Amended: 8/30/14 in Senate Vote: 21 SENATE GOVERNMENTAL ORGANIZATION COMMITTEE: 8-1, 6/24/14 AYES: Correa, Cannella, De León, Galgiani, Hernandez, Lieu, Padilla, Torres NOES: Vidak NO VOTE RECORDED: Berryhill, Vacancy SENATE APPROPRIATIONS COMMITTEE: 5-0, 8/14/14 AYES: De León, Hill, Lara, Padilla, Steinberg NO VOTE RECORDED: Walters, Gaines ASSEMBLY FLOOR: 74-3, 5/28/14 - See last page for vote SUBJECT: California Cyber Security Steering Committee SOURCE: Author DIGEST: This bill creates a 13-member California Cyber Security Steering Committee (Committee) in the Governor’s Office of Emergency Services (OES); continues in existence the California Cyber Security Task Force (Task Force); and requires the Committee to seek to implement the policy recommendations of the Task Force based on specified priorities. Sunsets the provisions of this bill on January 1, 2020. Senate Floor Amendments of 8/30/14 delete the provision requiring the Task Force to operate within the current information technology budget of departments and agencies they serve; and make a clarifying change.
  • 2. AB 2200 Page 2 Senate Floor Amendments of 8/22/14 substitute the creation of a Committee instead of a California Cyber Security Commission, and continue in existence the Task Force. CONTINUED ANALYSIS: Existing law: 1. Establishes the Department of Technology (DOT) within the Government Operations Agency, responsible for establishing and enforcing state information technology strategic plans, policies, standards, and enterprise architecture. The Director of DOT is the State Chief Information Officer, and is responsible for enhancing the security, reliability, and quality of information technology networks, services, and systems. 2. Requires each state agency to have a chief information officer who is appointed by the head of the state entity, and is responsible for supervising all information technology, including information security. 3. Establishes the Office of Information Security (OIS), within DOT, which is responsible for ensuring the confidentiality, integrity, and availability of state systems and applications. Requires the OIS to develop an information security program and establish policies, standards, and procedures directing state agencies to effectively manage security and risk. 4. Establishes OES to provide critical infrastructure protection and related emergency response. This bill: 1. Makes various legislative findings and declarations relative to the state’s growing dependence on technology which has made it increasingly vulnerable technically, legally, and financially to both foreign and domestic cybersecurity attacks and that for the purposes of public safety and protection of public assets, the state has a role in coordinating and improving its overall security and response capabilities. 2. Continues in existence the Task Force, created in OES and DOT. 3. Requires OES and DOT to convene stakeholders, both public and private, to act in an advisory capacity and compile policy recommendations on cyber
  • 3. AB 2200 Page 3 security for the state. Requires the Task Force to complete and issue a report of policy recommendations to the Governor’s Office and Legislature. 4. Requires the Task Force to meet at least quarterly within existing resources to ensure the policy recommendations from the report are implemented and any necessary modifications which may arise are addressed in a timely manner. 5. Requires OES and DOT to collaborate with the Committee to help streamline implementation of policy recommendations set forth in the Task Force’s report. Also, requires that this collaboration be guided by specific priorities as described in this bill. 6. Authorizes OES and DOT to conduct the strategic direction of risk assessments performed by the Military Department’s Computer Network Defense Team as budgeted in the Budget Act of 2014. 7. Creates the Committee within OES consisting of 13 members, as specified. Stipulates that members of the Committee will meet at least quarterly and serve without compensation, except that members will be entitled to receive actual and necessary travel expenses while on official business of the Committee. Provides that representatives appointed by the Governor, Speaker of the Assembly, or Senate Rules Committee shall serve a two-year term; any designee shall serve at the pleasure of the official who designated them; and provides that eight members will constitute a quorum. 8. Requires the Committee to seek to implement the policy recommendation of CONTINUED the Task Force based on the following priorities: A. Developing cyber prevention, defense, and response strategies and defining a hierarchy of command within the state. B. Partnering with the United States Department of Homeland Security to develop an appropriate information sharing system to effectively disseminate cyber threat and response information and data to relevant private and public sector entities. C. Providing recommendations for information technology security standards. D. Compiling and integrating the research conducted by academic institutions, federal laboratories, and other cybersecurity experts.
  • 4. AB 2200 Page 4 E. Expanding the state’s public-private cybersecurity partnership network CONTINUED both domestically and internationally. F. Developing and providing training programs with the state’s higher education and labor entities to produce a credentialed and qualified state cybersecurity taskforce. G. Expanding collaboration with the state’s law enforcement apparatus. H. Proposing potential operational or functional enhancement, as well as investment or spending recommendation and guidance. I. Coordinating the pursuit of fiscal resources to enhance the state’s cybersecurity, information technology, data privacy, cyber research, and technology-based emergency response capabilities. 9. Authorizes the Task Force to issue reports to the Governor and the Legislature detailing the activities of the Task Force, including, but not limited to, progress on the Task Force’s tasks and actions taken and recommended in response to an incident, as appropriate. 10. Requires the Task Force to engage or accept (a) the services of agency or department personnel, (b) the services of stakeholder organizations, and (c) federal, private, or other nonstate funding, to operate, manage, or conduct the business of the Task Force. 11. Requires each department and agency to cooperate with the commission and furnish it with information and assistance necessary or useful to further the purposes of this bill. 12. Contains a January 1, 2020 sunset provision. Background The OIS is the primary state office charged with protecting state information and ensuring confidentiality, integrity, and availability of state systems and applications. In short, OIS is responsible, along with other agencies, for ensuring the state’s cybersecurity. However, various other programs and agencies have roles related to managing the state’s cybersecurity.
  • 5. AB 2200 Page 5 In May 2013, the Governor’s Office convened the Task Force to assess departmental technology systems and assemble key stakeholders to discuss cybersecurity issues. The state has made a number of cybersecurity investments, including: funding research at Lawrence Livermore Laboratories and augmenting the cybersecurity unit within the California National Guard. In addition, numerous academic and private sector organizations are working on the issue of cybersecurity. FISCAL EFFECT: Appropriation: No Fiscal Com.: Yes Local: No CONTINUED Unknown with latest amendments. SUPPORT: (Verified 8/25/14) Bay Area Council League of California Cities Risk and Insurance Management Society San Diego Regional Economic Development Corporation SMUD OPPOSITION: (Verified 8/25/14) Office of the San Diego County District Attorney ARGUMENTS IN SUPPORT: The League of California Cities writes that this bill places cybersecurity on more solid footing, with enhanced visibility and importance within the state policymaking arena. This is an issue of rapidly increasing importance that not only affects the financial data of businesses and personal data of private individuals, but has national security implications - as evidenced by the fact that the U.S. Defense Department has taken a leading role, in part due to concerns about potential cyber-attacks launched by other nations. Closer to home, California municipalities, to the degree they are digitizing their financial and other data and engaging in electronic transactions, are also at risk, so this is and will remain a critical issue for many of our larger cities. ARGUMENTS IN OPPOSITION: The Office of the San Diego County District Attorney writes, “we believe this proposal is misguided and will have a deleterious effect on the work that is currently being done in this region served by our Computer and Technology Crime High-Tech Response Team (CATCH). For the past several years, the legislature has decreased our funding, leading to budget uncertainty that jeopardized the very existences of these critical teams. The state
  • 6. AB 2200 Page 6 even disbanded the Advanced Training Division (ATC), which provided critical training for these task forces. Incredibly, despite the state’s damaging actions over the past several years, our task force has increased investigations and prosecutions. Now, AB 2200 seeks to deliver what can only be described as life-threatening blow to the very law enforcement groups who are the most knowledgeable about one of the fastest growing and economically threatening criminal trends in our communities.” ASSEMBLY FLOOR: 74-3, 5/28/14 AYES: Achadjian, Alejo, Allen, Ammiano, Bigelow, Bloom, Bocanegra, Bonilla, Bonta, Bradford, Brown, Buchanan, Ian Calderon, Campos, Chau, Chesbro, Conway, Cooley, Dababneh, Dahle, Daly, Dickinson, Eggman, Fong, Fox, Garcia, Gatto, Gomez, Gonzalez, Gordon, Gorell, Gray, Grove, Hagman, Hall, Harkey, Roger Hernández, Holden, Jones, Jones-Sawyer, Levine, Linder, Logue, Lowenthal, Maienschein, Medina, Melendez, Mullin, Muratsuchi, Nazarian, Nestande, Olsen, Pan, Patterson, Perea, John A. Pérez, V. Manuel Pérez, Quirk, Quirk-Silva, Rendon, Ridley-Thomas, Rodriguez, Salas, Skinner, Stone, Ting, Wagner, Waldron, Weber, Wieckowski, Wilk, Williams, Yamada, Atkins NOES: Donnelly, Beth Gaines, Mansoor NO VOTE RECORDED: Chávez, Frazier, Vacancy MW:d 8/30/14 Senate Floor Analyses SUPPORT/OPPOSITION: SEE ABOVE **** END ****