LEGISLATIVE AND EXECUTIVE BRANCHES WORK TOWARD CYBERSECURITY COMPROMISE | Secondary Sources | Westlaw

LEGISLATIVE AND EXECUTIVE BRANCHES WORK TOWARD CYBERSECURITY COMPROMISE | Secondary Sources | Westlaw

View on Westlaw or start a FREE TRIAL today, LEGISLATIVE AND EXECUTIVE BRANCHES WORK TOWARD CYBERSECURITY COMPROMISE, Secondary Sources
Skip Page Header

LEGISLATIVE AND EXECUTIVE BRANCHES WORK TOWARD CYBERSECURITY COMPROMISE

32 No. 24 WJCOMPI 1By Mark L. Krotoski, Esq., and Brock Dahl, Esq., Morgan, Lewis & Bockius Westlaw Journal Computer and Internet (Approx. 7 pages)

LEGISLATIVE AND EXECUTIVE BRANCHES WORK TOWARD CYBERSECURITY COMPROMISE

32 No. 24 WJCOMPI 1By Mark L. Krotoski, Esq., and Brock Dahl, Esq., Morgan, Lewis & Bockius Westlaw Journal Computer and Internet (Approx. 7 pages)

32 No. 24 Westlaw Journal Computer and Internet 1
Westlaw Journal Computer and Internet
*1 May 7, 2015
Commentary
By Mark L. Krotoski, Esq., and Brock Dahl, Esq., Morgan, Lewis & Bockiusaa1
Copyright © 2015 Thomson Reuters .

LEGISLATIVE AND EXECUTIVE BRANCHES WORK TOWARD CYBERSECURITY COMPROMISE

Morgan, Lewis & Bockius attorneys Mark L. Krotoski and Brock Dahl analyze an executive order, which President Barack Obama signed in February, promoting private-sector cybersecurity information sharing.
Amid increasing concerns about data security and...
End of Document© 2024 Thomson Reuters. No claim to original U.S. Government Works.