SlideShare a Scribd company logo
II
115TH CONGRESS
1ST SESSION
S. 536
To promote transparency in the oversight of cybersecurity risks at publicly
traded companies.
IN THE SENATE OF THE UNITED STATES
MARCH 7, 2017
Mr. REED (for himself, Ms. COLLINS, and Mr. WARNER) introduced the fol-
lowing bill; which was read twice and referred to the Committee on Bank-
ing, Housing, and Urban Affairs
A BILL
To promote transparency in the oversight of cybersecurity
risks at publicly traded companies.
Be it enacted by the Senate and House of Representa-1
tives of the United States of America in Congress assembled,2
SECTION 1. SHORT TITLE.3
This Act may be cited as the ‘‘Cybersecurity Disclo-4
sure Act of 2017’’.5
SEC. 2. CYBERSECURITY TRANSPARENCY.6
(a) DEFINITIONS.—In this section—7
(1) the term ‘‘Commission’’ means the Securi-8
ties and Exchange Commission;9
(2) the term ‘‘cybersecurity threat’’—10
VerDate Sep 11 2014 03:47 Mar 10, 2017 Jkt 069200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:BILLSS536.IS S536
lotteronDSK5VPTVN1PRODwithBILLS
2
•S 536 IS
(A) means an action, not protected by the1
First Amendment to the Constitution of the2
United States, on or through an information3
system that may result in an unauthorized ef-4
fort to adversely impact the security, avail-5
ability, confidentiality, or integrity of an infor-6
mation system or information that is stored on,7
processed by, or transiting an information sys-8
tem; and9
(B) does not include any action that solely10
involves a violation of a consumer term of serv-11
ice or a consumer licensing agreement;12
(3) the term ‘‘information system’’—13
(A) has the meaning given the term in sec-14
tion 3502 of title 44, United States Code; and15
(B) includes industrial control systems,16
such as supervisory control and data acquisition17
systems, distributed control systems, and pro-18
grammable logic controllers;19
(4) the term ‘‘issuer’’ has the meaning given20
the term in section 3 of the Securities Exchange Act21
of 1934 (15 U.S.C. 78c);22
(5) the term ‘‘NIST’’ means the National Insti-23
tute of Standards and Technology; and24
VerDate Sep 11 2014 03:47 Mar 10, 2017 Jkt 069200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:BILLSS536.IS S536
lotteronDSK5VPTVN1PRODwithBILLS
3
•S 536 IS
(6) the term ‘‘reporting company’’ means any1
company that is an issuer—2
(A) the securities of which are registered3
under section 12 of the Securities Exchange4
Act of 1934 (15 U.S.C. 78l); or5
(B) that is required to file reports under6
section 15(d) of such Act (15 U.S.C. 78o(d)).7
(b) REQUIREMENT TO ISSUE RULES.—Not later8
than 360 days after the date of enactment of this Act,9
the Commission shall issue final rules to require each re-10
porting company, in the annual report submitted under11
section 13 or section 15(d) of the Securities Exchange Act12
of 1934 (15 U.S.C. 78m and 78o(d)) or the annual proxy13
statement submitted under section 14(a) of such Act (1514
U.S.C. 78n(a))—15
(1) to disclose whether any member of the gov-16
erning body, such as the board of directors or gen-17
eral partner, of the reporting company has expertise18
or experience in cybersecurity and in such detail as19
necessary to fully describe the nature of the exper-20
tise or experience; and21
(2) if no member of the governing body of the22
reporting company has expertise or experience in cy-23
bersecurity, to describe what other cybersecurity24
steps taken by the reporting company were taken25
VerDate Sep 11 2014 03:47 Mar 10, 2017 Jkt 069200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6201 E:BILLSS536.IS S536
lotteronDSK5VPTVN1PRODwithBILLS
4
•S 536 IS
into account by such persons responsible for identi-1
fying and evaluating nominees for any member of2
the governing body, such as a nominating com-3
mittee.4
(c) CYBERSECURITY EXPERTISE OR EXPERIENCE.—5
For purposes of subsection (b), the Commission, in con-6
sultation with NIST, shall define what constitutes exper-7
tise or experience in cybersecurity, such as professional8
qualifications to administer information security program9
functions or experience detecting, preventing, mitigating,10
or addressing cybersecurity threats, using commonly de-11
fined roles, specialities, knowledge, skills, and abilities,12
such as those provided in NIST Special Publication 800–13
181 entitled ‘‘NICE Cybersecurity Workforce Frame-14
work’’, or any successor thereto.15
Æ
VerDate Sep 11 2014 03:47 Mar 10, 2017 Jkt 069200 PO 00000 Frm 00004 Fmt 6652 Sfmt 6301 E:BILLSS536.IS S536
lotteronDSK5VPTVN1PRODwithBILLS

More Related Content

Similar to SEC to consult with NIST to define what constitutes #cybersecurity "expertise or experience."

Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...
Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...
Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...
xstokes825
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
Internet Law Center
 
DRAFT of NEW White House Cybersecurity Executive Order leaked
DRAFT of NEW White House Cybersecurity Executive Order leakedDRAFT of NEW White House Cybersecurity Executive Order leaked
DRAFT of NEW White House Cybersecurity Executive Order leaked
David Sweigert
 
micron technollogy 10KFY2007
micron technollogy 10KFY2007micron technollogy 10KFY2007
micron technollogy 10KFY2007finance36
 
micron technollogy 2000_10k
micron technollogy 2000_10kmicron technollogy 2000_10k
micron technollogy 2000_10kfinance36
 
Insider dealing in company law
Insider dealing in company lawInsider dealing in company law
Insider dealing in company lawArjun Ariaratnam
 
Wilssc 006 xml
Wilssc 006 xmlWilssc 006 xml
Wilssc 006 xml
Andrey Apuhtin
 
Space act of 2015
Space act of 2015 Space act of 2015
Space act of 2015
Dmitry Tseitlin
 
Federal Trade Commission empowers Payment Card Industry
Federal Trade Commission empowers Payment Card IndustryFederal Trade Commission empowers Payment Card Industry
Federal Trade Commission empowers Payment Card Industry
David Sweigert
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
FORM 10−K
FORM 10−KFORM 10−K
FORM 10−KVideoguy
 
DFARS & CMMC Overview
DFARS & CMMC Overview DFARS & CMMC Overview
DFARS & CMMC Overview
Ignyte Assurance Platform
 
micron technollogy 2003_10-K
micron technollogy 2003_10-Kmicron technollogy 2003_10-K
micron technollogy 2003_10-Kfinance36
 
dish network annual reports 2000
dish network annual reports 2000dish network annual reports 2000
dish network annual reports 2000finance24
 
plains all american pipeline Table of Contents and Forward Looking Statement...
plains all american pipeline  Table of Contents and Forward Looking Statement...plains all american pipeline  Table of Contents and Forward Looking Statement...
plains all american pipeline Table of Contents and Forward Looking Statement...finance13
 
dish network annual reports 2002
dish network annual reports 2002dish network annual reports 2002
dish network annual reports 2002finance24
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
micron technollogy 1999_10k
micron technollogy 1999_10kmicron technollogy 1999_10k
micron technollogy 1999_10kfinance36
 
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
A Clear Path to NIST & CMMC Compliance_ISSA.pptxA Clear Path to NIST & CMMC Compliance_ISSA.pptx
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
Jack Nichelson
 
Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...padler01
 

Similar to SEC to consult with NIST to define what constitutes #cybersecurity "expertise or experience." (20)

Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...
Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...
Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
DRAFT of NEW White House Cybersecurity Executive Order leaked
DRAFT of NEW White House Cybersecurity Executive Order leakedDRAFT of NEW White House Cybersecurity Executive Order leaked
DRAFT of NEW White House Cybersecurity Executive Order leaked
 
micron technollogy 10KFY2007
micron technollogy 10KFY2007micron technollogy 10KFY2007
micron technollogy 10KFY2007
 
micron technollogy 2000_10k
micron technollogy 2000_10kmicron technollogy 2000_10k
micron technollogy 2000_10k
 
Insider dealing in company law
Insider dealing in company lawInsider dealing in company law
Insider dealing in company law
 
Wilssc 006 xml
Wilssc 006 xmlWilssc 006 xml
Wilssc 006 xml
 
Space act of 2015
Space act of 2015 Space act of 2015
Space act of 2015
 
Federal Trade Commission empowers Payment Card Industry
Federal Trade Commission empowers Payment Card IndustryFederal Trade Commission empowers Payment Card Industry
Federal Trade Commission empowers Payment Card Industry
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
FORM 10−K
FORM 10−KFORM 10−K
FORM 10−K
 
DFARS & CMMC Overview
DFARS & CMMC Overview DFARS & CMMC Overview
DFARS & CMMC Overview
 
micron technollogy 2003_10-K
micron technollogy 2003_10-Kmicron technollogy 2003_10-K
micron technollogy 2003_10-K
 
dish network annual reports 2000
dish network annual reports 2000dish network annual reports 2000
dish network annual reports 2000
 
plains all american pipeline Table of Contents and Forward Looking Statement...
plains all american pipeline  Table of Contents and Forward Looking Statement...plains all american pipeline  Table of Contents and Forward Looking Statement...
plains all american pipeline Table of Contents and Forward Looking Statement...
 
dish network annual reports 2002
dish network annual reports 2002dish network annual reports 2002
dish network annual reports 2002
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
 
micron technollogy 1999_10k
micron technollogy 1999_10kmicron technollogy 1999_10k
micron technollogy 1999_10k
 
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
A Clear Path to NIST & CMMC Compliance_ISSA.pptxA Clear Path to NIST & CMMC Compliance_ISSA.pptx
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
 
Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
David Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
David Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
David Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
David Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
David Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
David Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
David Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
David Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
David Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
David Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
David Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
David Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
David Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 

Recently uploaded (20)

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 

SEC to consult with NIST to define what constitutes #cybersecurity "expertise or experience."

  • 1. II 115TH CONGRESS 1ST SESSION S. 536 To promote transparency in the oversight of cybersecurity risks at publicly traded companies. IN THE SENATE OF THE UNITED STATES MARCH 7, 2017 Mr. REED (for himself, Ms. COLLINS, and Mr. WARNER) introduced the fol- lowing bill; which was read twice and referred to the Committee on Bank- ing, Housing, and Urban Affairs A BILL To promote transparency in the oversight of cybersecurity risks at publicly traded companies. Be it enacted by the Senate and House of Representa-1 tives of the United States of America in Congress assembled,2 SECTION 1. SHORT TITLE.3 This Act may be cited as the ‘‘Cybersecurity Disclo-4 sure Act of 2017’’.5 SEC. 2. CYBERSECURITY TRANSPARENCY.6 (a) DEFINITIONS.—In this section—7 (1) the term ‘‘Commission’’ means the Securi-8 ties and Exchange Commission;9 (2) the term ‘‘cybersecurity threat’’—10 VerDate Sep 11 2014 03:47 Mar 10, 2017 Jkt 069200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:BILLSS536.IS S536 lotteronDSK5VPTVN1PRODwithBILLS
  • 2. 2 •S 536 IS (A) means an action, not protected by the1 First Amendment to the Constitution of the2 United States, on or through an information3 system that may result in an unauthorized ef-4 fort to adversely impact the security, avail-5 ability, confidentiality, or integrity of an infor-6 mation system or information that is stored on,7 processed by, or transiting an information sys-8 tem; and9 (B) does not include any action that solely10 involves a violation of a consumer term of serv-11 ice or a consumer licensing agreement;12 (3) the term ‘‘information system’’—13 (A) has the meaning given the term in sec-14 tion 3502 of title 44, United States Code; and15 (B) includes industrial control systems,16 such as supervisory control and data acquisition17 systems, distributed control systems, and pro-18 grammable logic controllers;19 (4) the term ‘‘issuer’’ has the meaning given20 the term in section 3 of the Securities Exchange Act21 of 1934 (15 U.S.C. 78c);22 (5) the term ‘‘NIST’’ means the National Insti-23 tute of Standards and Technology; and24 VerDate Sep 11 2014 03:47 Mar 10, 2017 Jkt 069200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:BILLSS536.IS S536 lotteronDSK5VPTVN1PRODwithBILLS
  • 3. 3 •S 536 IS (6) the term ‘‘reporting company’’ means any1 company that is an issuer—2 (A) the securities of which are registered3 under section 12 of the Securities Exchange4 Act of 1934 (15 U.S.C. 78l); or5 (B) that is required to file reports under6 section 15(d) of such Act (15 U.S.C. 78o(d)).7 (b) REQUIREMENT TO ISSUE RULES.—Not later8 than 360 days after the date of enactment of this Act,9 the Commission shall issue final rules to require each re-10 porting company, in the annual report submitted under11 section 13 or section 15(d) of the Securities Exchange Act12 of 1934 (15 U.S.C. 78m and 78o(d)) or the annual proxy13 statement submitted under section 14(a) of such Act (1514 U.S.C. 78n(a))—15 (1) to disclose whether any member of the gov-16 erning body, such as the board of directors or gen-17 eral partner, of the reporting company has expertise18 or experience in cybersecurity and in such detail as19 necessary to fully describe the nature of the exper-20 tise or experience; and21 (2) if no member of the governing body of the22 reporting company has expertise or experience in cy-23 bersecurity, to describe what other cybersecurity24 steps taken by the reporting company were taken25 VerDate Sep 11 2014 03:47 Mar 10, 2017 Jkt 069200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6201 E:BILLSS536.IS S536 lotteronDSK5VPTVN1PRODwithBILLS
  • 4. 4 •S 536 IS into account by such persons responsible for identi-1 fying and evaluating nominees for any member of2 the governing body, such as a nominating com-3 mittee.4 (c) CYBERSECURITY EXPERTISE OR EXPERIENCE.—5 For purposes of subsection (b), the Commission, in con-6 sultation with NIST, shall define what constitutes exper-7 tise or experience in cybersecurity, such as professional8 qualifications to administer information security program9 functions or experience detecting, preventing, mitigating,10 or addressing cybersecurity threats, using commonly de-11 fined roles, specialities, knowledge, skills, and abilities,12 such as those provided in NIST Special Publication 800–13 181 entitled ‘‘NICE Cybersecurity Workforce Frame-14 work’’, or any successor thereto.15 Æ VerDate Sep 11 2014 03:47 Mar 10, 2017 Jkt 069200 PO 00000 Frm 00004 Fmt 6652 Sfmt 6301 E:BILLSS536.IS S536 lotteronDSK5VPTVN1PRODwithBILLS