TechWonk Blog
TechWonk Blog
Go Back
To learn more about ITI's work and position on Cybersecurity, please visit
http://www.itic.org/policy/cybersecurity
http://www.itic.org/policy/cybersecurity
-
Last week, we welcomed Virginia Governor Terry McAuliffe to the ITI/ITAPS 2016 Cybersecurity Forum to deliver keynote remarks to our convening of experts gathered to discuss the future of cybersecurity policy within federal and state governments. As the newly appointed chair of the National Governor’s Association (NGA), Gov. McAuliffe, spoke about the need of states to address the growing cybersecurity [...]
-
This week, ITI’s attention turns to Chile and Argentina, where we are leading a delegation of member companies for a week of engagement with these two important markets. The growth of technology and innovation, especially in Latin America, is exemplified in these two countries, which have taken different but promising paths to promote the information and communications technology (ICT) industry. Chile [...]
-
After several months of patient work, ITI saw important results in the forward-leaning cybersecurity principles document issued at the G7 Leaders Summit held in Japan last week. The principles document closely follows a more comprehensive statement developed at the G7 ICT ministerial April 29-30 in Takamatsu, which ITI supported through various discussions, events, and written statements, including [...]
-
Today, House Judiciary Committee lawmakers will get their first opportunity to delve into the complex issues presented by what’s become known as “the Apple case.” As these policymakers examine the implications of encryption technology, we hope they will keep the following five points in mind. First, the women and men who work for U.S. technology companies abhor crime and terrorism. They work each day [...]
-
An unexpected break from the norm happened in Washington last year – despite all predictions to the contrary, Congress and the President actually got to work and produced several bipartisan wins for the technology sector and our economy in general. We give credit where credit is due, and we applaud Congress and the President for working together to advance these policies in 2015 that affect the growth [...]
-
It is safe to say Internet of Things (IoT) fascination has gripped Washington’s attention. Over the past year, there have been no fewer than six congressional hearings and the launch of the Congressional Caucus on Internet of Things (IoT). It seems there is a large IoT forum taking place somewhere in the nation’s capital on an almost weekly basis. We welcome policymakers’ interest in IoT, and look [...]
-
As both producers and users of cybersecurity products and services, ITI’s members are highly motivated to protect user information and are at the forefront of innovation in the security space. At the same time, ITI has consistently opposed technology-specific mandates—including, but not limited to, spectrum use flexibility, universal service fund availability, FAA in-flight device regulation, automotive [...]
-
As President Obama prepares to welcome Chinese President Xi to the White House this month, cybersecurity concerns should be a priority topic of discussion. For the benefit of both countries, however, the dialogue should be aimed at reducing, not escalating bilateral cyber tensions. Not only are the U.S. and Chinese economies closely intertwined - as recent market events have proven – but a closed China [...]
-
This week the House of Representatives will consider two cybersecurity threat information sharing bills on the floor: the Protecting Cyber Networks Act (H.R. 1560), and the National Cybersecurity Protection Advancement Act (H.R. 1731). We commend the House for its action in this area, and ITI will consider scoring votes in support of both bills in our 114th Congressional Voting Guide. As the leading [...]
-
When we surf the Internet, conduct e-commerce, or send emails and texts, we often don’t think about the tremendous work or resources going on behind the scenes to protect the networks and information we routinely use to connect and accomplish our daily tasks. Those networks are constantly besieged by increasingly sophisticated cyber criminals, and voluntary cybersecurity threat information sharing [...]
- ...