Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Cyber Laws & Regulations

Massachusetts Governor Issues Executive Order To Strengthen State’s Cyber Defenses – Security

admin by admin
Dec 22, 2022
in Cyber Laws & Regulations
0 0
A A
0
FacebookTwitterLinkedIn

22 December 2022


Foley Hoag LLP



To print this article, all you need is to be registered or login on Mondaq.com.

Governor Charlie Baker recently took steps to
strengthen cybersecurity in Massachusetts by signing an executive order on December 14, 2022
creating an advisory panel to improve the state’s cyber
defense. The new state task force will assess existing resources,
develop contingency plans, and identify strategies for preventing
future cyberattacks. The goal of the task force is to ensure that
the Bay State is at the forefront of the ever-evolving
cybersecurity landscape. With cyber threats becoming increasingly
sophisticated, it’s crucial for the state to stay ahead of the
curve. The panel will study existing protocols, assess the
state’s current level of preparedness, and recommend ways to
improve security measures.

The executive order will also create a
Cybersecurity Incident Response Team (MA-CIRT), which will consist
of state leaders from the public and private sectors, including
representatives from the Governor’s Office, the Massachusetts
State Police, the Department of Telecommunications and Cable, the
Commonwealth Fusion Center, the Department of Security, the
Massachusetts Emergency Management Agency. MA-CIRT will be led by
the Secretary of the Executive Office of Technology Services and
Security (a position currently held by Curt Wood).

Additionally, the Executive Order:

  • Requires MA-CIRT to review cybersecurity threat information and
    vulnerabilities to make informed recommendations and establish
    appropriate policies to manage the risk of cyber incidents for
    executive department agencies and all other state agencies served
    by EOTSS.

  • Requires MA-CIRT to develop and maintain an up-to-date Cyber
    Incident Response Plan, which will guide the actions of the
    Commonwealth’s key public safety and information security and
    technology teams, state agency resources, and security
    professionals in responding to and minimizing the impact of
    significant cybersecurity threats to Commonwealth systems. The Plan
    is required to be submitted annually to the Governor for review and
    approval.

  • Empowers the EOTSS Secretary to serve as MA-CIRT lead, with the
    approval of the Governor, to direct MA-CIRT in response to a
    significant cyber incident.

  • Requires the routine exchange of information related to
    cybersecurity threats and reported incidents between the
    Commonwealth Fusion Center and the Commonwealth Security Operations
    Center.

  • Requires EOTSS and MA-CIRT to consult with the Massachusetts
    Cyber Center and assist the Center with efforts to foster
    cybersecurity resiliency through communications, collaboration, and
    outreach to state agencies, municipalities, educational
    institutions and industry partners.

  • Requires executive department agencies to comply with protocols
    and procedures established by MA-CIRT and all related policies,
    standards and Administrative Directives issued by EOTSS.

  • Requires Commonwealth executive department agencies and other
    state agencies served by EOTSS to identify and report significant
    cybersecurity incidents and coordinate efforts to mitigate and
    prevent further damage from cyber incidents.

  • Requires all executive department personnel to annually
    complete the EOTSS approved security awareness training program
    administered by the Human Resources Division.

  • And strongly encourages other governmental entities throughout
    the Commonwealth not served by EOTSS to report cybersecurity
    threats or incidents to the Commonwealth Security Operations
    Center.

To view Foley Hoag’s Security, Privacy and The Law
Blog please click
here

The content of this article is intended to provide a general
guide to the subject matter. Specialist advice should be sought
about your specific circumstances.

POPULAR ARTICLES ON: Technology from United States

Amazon To Roll Out “AI Nutrition Cards”

Foley & Lardner

Hidden discrimination of AI systems continues to be a concern for the world. Various privacy laws, like the GDPR, already provide a right to not be subject to automated decision-making…

OCC Announces Examination Priorities For 2023

Phelps Dunbar

Earlier this month the Office of the Comptroller of the Currency released its Supervision Operating Plan for 2023, setting out its risk-based examination priorities for national banks.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Hub Security Announced the Fulfillment of All Conditions Precedent for the Upcoming $1.28 Billion Merger Transaction
Cyber Laws & Regulations

HUB Cyber Security – Updates on Nasdaq Listing and Pipe Investor Change

Why are Company Ransomware Payments Dropping Dramatically? | Kohrman Jackson & Krantz LLP
Cyber Laws & Regulations

Why are Company Ransomware Payments Dropping Dramatically? | Kohrman Jackson & Krantz LLP

EIOPA Supervisory Statement On The Management Of Non-affirmative Cyber Exposures – Insurance Laws and Products
Cyber Laws & Regulations

Ethics & Compliance: Let’s Talk About Cybersecurity – Security

UK Cyber-Crime Agencies Probing Suspected Royal Mail Attack (1)
Cyber Laws & Regulations

Bankman-Fried Wins Texas Ruling as States Go After Lost Funds

Meeting the AI moment: advancing the future through responsible AI
Cyber Laws & Regulations

Meeting the AI moment: advancing the future through responsible AI

NHRC Chief Seeks Stringent Law To Deal With Unlawful Internet Behaviour, Cybercrime
Cyber Laws & Regulations

NHRC Chief Seeks Stringent Law To Deal With Unlawful Internet Behaviour, Cybercrime

Why are Pennsylvania cyber charter schools allowed to have large fund balances?
Cyber Laws & Regulations

Why are Pennsylvania cyber charter schools allowed to have large fund balances?

Gain Control of Business Data to Reduce Costs, Increase Productivity, Inform Decisions, and Improve Security
Cyber Laws & Regulations

Gain Control of Business Data to Reduce Costs, Increase Productivity, Inform Decisions, and Improve Security

SEC suit ‘charts a perilous new course,’ hacked law firm says
Cyber Laws & Regulations

SEC suit ‘charts a perilous new course,’ hacked law firm says

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Understanding the Implications & Guarding Privacy- Axios Security Group

Understanding the Implications & Guarding Privacy- Axios Security Group

Hackers Actively Using Pupy RAT to Attack Linux Systems

Hackers Actively Using Pupy RAT to Attack Linux Systems

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.