Pat Clawson, from Blancco Technology Group, talks about hacking regulation and legislation with CSO in a series of topical discussions with industry leaders and experts.\n\nHacked Opinions is an ongoing series of Q&As with industry leaders and experts on a number of topics that impact the security community. The first set of discussions focused on disclosure and how pending regulation could impact it. This week CSO is posting the final submissions for the second set of discussions examining security research, security legislation, and the difficult decision of taking researchers to court.\n\nCSO encourages everyone to take part in the Hacked Opinions series. If you have thoughts or suggestions for the third series of Hacked Opinions topics, or want to be included as a participant, feel free to email Steve Ragan directly.\n\nWhat do you think is the biggest misconception lawmakers have when it comes to cybersecurity?\n\nPat Clawson, CEO, Blancco Technology Group (PC): I think lawmakers have good intentions for the most part when it comes to cybersecurity.\n\nThe General Data Protection Regulation coming out of Europe is a good example. It\u2019s focused on protecting citizens\u2019 data privacy and it creates greater accountability among businesses and advertisers who are actively collected, tracking, storing and sharing customer data.\n\nBut in some instances, lawmakers get it wrong. That has to do a lot with the fact that they\u2019re not the ones in the trenches inside businesses and they don\u2019t necessarily understand the ins and outs of data management, security practices and the varying types and causes of security threats. In an attempt to show they\u2019re taking cyber security seriously, they draft bills and acts like the Cybersecurity Information Sharing Act, which passed [last month].\n\nThe bill spells out that any broadly defined \u201ccybersecurity threat\u201d information gathered can be shared \u201cnotwithstanding any other provision of law.\u201d That\u2019s a pretty vague statement and makes it possible for the government to conduct intrusive surveillance practices under the guise of security protections. To tighten the grip on data security doesn\u2019t automatically require spying. There are better ways to bring about change.\n\nWhat advice would you give to lawmakers considering legislation that would impact security research or development?\n\nPC: I would tell lawmakers to not draft up legislation in a vacuum. I would recommend bringing in folks from different sides of the data security coin. Invite experts from data security software\/hardware vendors, technologists and engineers, data scientists, research organizations and analysts into the same room as the legislators.\n\nEach of these groups are working in some way or another with data and know first-hand how and where data is being created, managed, collected, stored and shared inside and outside organizations. By making them a part of the legislation discussion, lawmakers can avoid being seen as the \u2018bad guys\u2019, but most importantly, they can actually create the kind of change that needs to happen in cybersecurity.\n\nIf you could add one line to existing or pending legislation, with a focus on research, hacking, or other related security topic, what would it be?\n\nPC: I don\u2019t think it\u2019s as simple as adding one line to existing or pending legislation \u2013 that won\u2019t solve anything. The goal should be to understand the cyber attack landscape for a nation as a whole.\n\nUnlike Russia and China, where all critical infrastructure is state owned, we\u2019re living in a capitalist society and a large portion of critical infrastructure is held by corporations, not by the government. China and Russia, for example, have the ability to understand attacks across all critical infrastructure. But we do not. This is a long-term risk.\n\nNow, given what you've said, why is this one line so important to you?\n\nPC: In the long run, we need to be able to correlate attack data as a whole nation in order to understand the threats posed to us by other nations. When we have the data, we can do something about it.\n\nDo you think a company should resort to legal threats or intimidation to prevent a researcher from giving a talk or publishing their work? Why, or why not?\n\nPC: I definitely don\u2019t feel companies should threaten a researcher who might have found a security flaw in their organization. Most often, those who resort to threats and intimidation do so out of fear and insecurity. Any company that does that is just hurting themselves and highlighting their own inability to learn from mistakes.\n\nRather than try to quiet them, why not invite them for a one-on-one discussion? At least then the company can actually get to the bottom of why the security breach occurred, where the gaps are in their internal systems and even ask the researcher to give suggestions on how to prevent it from happening in the future.\n\nWhat types of data (attack data, threat intelligence, etc.) should organizations be sharing with the government? What should the government be sharing with the rest of us?\n\nPC: I would say organizations should be sharing attack data with the government. This would be information related to the types of attacks that have occurred in the past, the causes and sources of the attacks if they\u2019ve been investigated and when they have occurred. I\u2019d also say both organizations and the government should share their own respective threat intelligence with one another. It can\u2019t be a one-way street.\n\nAs far as what the government should be sharing with the general public, that can be tricky. The public definitely has a right to know if and when there are severe threat warnings to nation states as that impacts their own safety. I think this is where the government needs to do more than just tell people a risk is there. They need to then offer up useful tips and advice on how to protect their own data from being compromised in future attacks.