{"id":9119,"date":"2023-11-03T06:00:47","date_gmt":"2023-11-03T13:00:47","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=9119"},"modified":"2024-02-06T10:25:29","modified_gmt":"2024-02-06T18:25:29","slug":"quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/","title":{"rendered":"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed"},"content":{"rendered":"<p><i style=\"font-size:14px;\">Disclaimer: This blog offers general information and should not be considered legal advice. Consult your own legal counsel for specific advice.<\/i><\/p>\n<p>As Cybersecurity Awareness Month comes to a close, the conversation around cyber law persists. The global landscape of cyber regulations continues to grow rapidly as governments around the world acknowledge the need for robust cybersecurity measures to protect national security, public safety, and individual privacy. Recent key regulations include:<\/p>\n<ul>\n<li>Starting December 2023, the <b>U.S. SEC Cybersecurity Disclosure Rules<\/b> mandate public companies to report material cybersecurity incidents within four business days via 8-K filings. These rules also require disclosure of cybersecurity risk management processes in 10-K and other periodic reports.<\/li>\n<li>The <b>EU NIS2 Directive<\/b> compels all EU member states to implement laws by October 18, 2024 to protect essential and important organizations from cyber threats and achieve a high level of common security across the EU.<\/li>\n<\/ul>\n<p>This blog contains a comprehensive list of over 30 recent global cyber regulations and guidelines, including effective date and the applicable entities and sectors. More regulations are expected from state regulators, government agencies and industry bodies in the coming months.<\/p>\n<h3>Why Do All Organizations Need to Know These Rules?<\/h3>\n<p>Even if an organization isn&#8217;t a government agency, a public company, or in a regulated industry, it may still be affected by these rules due to \u201csupply chain flow-down.\u201d A company not categorized as a \u201ccritical infrastructure\u201d under the regulations can impact a critical infrastructure customer&#8217;s compliance with its reporting obligations in case of a cyber breach. Similarly, manufacturers of IoT device components or data analytics providers can also find themselves subject to these regulations through their customer relationships.<\/p>\n<p>If an organization has a customer (or a customer of a customer) that is a government agency, a critical infrastructure or in the regulated industry, these rules would apply to some extent.<\/p>\n<h3>Be Informed, Not Overwhelmed<\/h3>\n<p>We summarized the general themes of these cyber rules below to help an organization stay ahead of the curve:<\/p>\n<p><u>Theme #1: Prescriptive Must-Haves<\/u><\/p>\n<p>Rather than leaving it to organizations to adopt best practices, many regulators now specify a list of must-haves. For example:<\/p>\n<ul>\n<li>The <b>U.S. FTC Safeguards Rule<\/b>, effective June 2023, specified 9 elements of a \u201creasonable information security program\u201d for all covered financial institutions.<\/li>\n<li>The <b>New York Attorney General<\/b>, in April 2023, highlighted findings from recent investigations and offered guidance in 9 specified areas.<\/li>\n<li><b>EU NIS2<\/b>, similarly, highlighted 10 minimum standards for its 27 member states to implement in their national laws by October 18, 2023.<\/li>\n<\/ul>\n<p><u>Theme #2: Enforcement \u201cteeth\u201d<\/u><\/p>\n<p>To address inconsistent supervision and enforcement across different governments and agencies, NIS2 Directive requires each member state to mandate a penalty up to 2% of global annual revenue or EUR 10 million. NIS2 further provides a minimum list of supervisory means, including \u201cregular and targeted audits, on-site and off-site checks, request of information, and access to documents or evidence.\u201d<\/p>\n<p>Penalties for non-compliance include not only sanctions for the organization, but also civil and criminal liabilities against supervising executives. The recent <a href=\"https:\/\/www.sec.gov\/news\/press-release\/2023-227\" target=\"_blank\" rel=\"noopener\">SEC charge against Solarwinds\u2019 CISO<\/a>, the <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2023\/01\/ftc-finalizes-order-online-alcohol-marketplace-security-failures-exposed-personal-data-25-million\" target=\"_blank\" rel=\"noopener\">FTC order against the former Drizly CEO<\/a> and the <a href=\"https:\/\/www.justice.gov\/usao-ndca\/pr\/former-chief-security-officer-uber-sentenced-three-years-probation-covering-data\" target=\"_blank\" rel=\"noopener\">DOJ\u2019s criminal conviction against the former Uber Chief Security Officer<\/a> served as fresh reminders of personal accountability.  <\/p>\n<p><u>Theme #3: Faster and Broader Incident Reporting<\/u><\/p>\n<p>Many countries already have laws that require reporting of personal data breaches. Recent rules expand such requirements beyond personal data to business data, such as access credentials, material business information and IoT devices.<\/p>\n<p>Another new development is the faster and multi-stage reporting. Under the NIS2 Directive, affected companies have 24 hours to submit an early warning to competent national authority. The early warning should be followed by an incident notification within the 72 hours of becoming aware of the incident and a final report no later than one month later. The U.S. Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), similarly, requires a critical infrastructure to report to CISA covered cyber incidents within 72 hours of reasonable belief that the incident occurred. If the incident involves a ransom payment, the reporting time would be shortened to 24 hours.<\/p>\n<p><u>Theme #4: Unified Certification, Attestation, etc.<\/u><\/p>\n<p>The regulations aim to promote a unified certification approach to ensure consistent and standardized security measures across the critical infrastructure supply chain.<\/p>\n<p>One effort in this regard is the U.S. Department of Defense (DoD)\u2019s CMMC 2.0 update. CMMC means the Cybersecurity Maturity Model Certification (CMMC 2.0) that applies to sensitive unclassified information shared by the DoD with its contractors and subcontractors. NIS2 Directive, similarly, recommends its member states to require essential and important entities to procure products and services certified under European cybersecurity certification schemes adopted pursuant to Article 49 of Regulation (EU) 2019\/881.<\/p>\n<p>For more details around these recent developments, check out the recording of our Webinar \u201cQuick Guide to Global Cyber Laws: Be Informed; Not Overwhelmed\u201d <a href=\"https:\/\/www.infoblox.com\/resources\/webinars\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<hr\/>\n<p>In our next blog, we will provide detailed recommendations around the strategies for complying with these cyber regulations. For now, consider these best practices:<\/p>\n<ul>\n<li>Know your regulators and rules<\/li>\n<li>Document InfoSec policies and practices consistent with the rules<\/li>\n<li>Know where your data is<\/li>\n<li>Practice cybersecurity hygiene<\/li>\n<li>Elevate cybersecurity discussions to the Board of Directors and the C-Suite<\/li>\n<li>Evaluate government certification and assessment requirements<\/li>\n<\/ul>\n<hr\/>\n<h3>List of Recent Global Cyber Regulations and Guidelines<\/h3>\n<p><u>United States<\/u><\/p>\n<table class=\"legal-table\">\n<thead>\n<tr>\n<th><\/th>\n<th><b>Name<\/b><\/th>\n<th><b>Issue\/ Effective Date<\/b><\/th>\n<th><b>Applicable Entities\/Sectors<\/b><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Executive Order<\/td>\n<td><a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\">Executive Order 14028 on Improving the Nation\u2019s Cybersecurity<\/a><\/td>\n<td>May 2021<\/td>\n<td>All<\/td>\n<\/tr>\n<tr>\n<td>Federal Law<\/td>\n<td><a href=\"https:\/\/www.cisa.gov\/topics\/cyber-threats-and-advisories\/information-sharing\/cyber-incident-reporting-critical-infrastructure-act-2022-circia\">Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA)<\/a><\/td>\n<td>March 2022; rules expected by March 2024<\/td>\n<td><a href=\"https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2013\/02\/12\/presidential-policy-directive-critical-infrastructure-security-and-resil\">Critical infrastructure (16 sectors)<\/a><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"10\">Federal Rules\u00a0<\/td>\n<td><a href=\"https:\/\/www.sec.gov\/files\/33-11216-fact-sheet.pdf\">Security Exchange Commission (SEC) Requirement<\/a><\/td>\n<td>July 2023, effective Dec 2023 (June 2024 for smaller reporting companies)<\/td>\n<td>Public reporting companies<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/dodcio.defense.gov\/CMMC\/about\/\">CMMC Model 2.0 certification<\/a><\/td>\n<td>Rule-making in progress<\/td>\n<td>Depart. of Defense contractors and subcontractors<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.federalregister.gov\/documents\/2023\/10\/03\/2023-21328\/federal-acquisition-regulation-cyber-threat-and-incident-reporting-and-information-sharing\">Proposed FAR Cyber Threat and Incident Reporting and Information Sharing Rule<\/a><\/td>\n<td>Comment period ends on Dec 4, 2023<\/td>\n<td>Parties subject to FAR (Federal Acquisition Regulations) and subcontractors<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.federalregister.gov\/documents\/2023\/10\/03\/2023-21327\/federal-acquisition-regulation-standardizing-cybersecurity-requirements-for-unclassified-federal\">Proposed FAR Rule Standardizing Cybersecurity Requirements for Unclassified Federal Information Systems<\/a><\/td>\n<td>Comment period ends on Dec 4, 2023<\/td>\n<td>Parties subject to FAR and subcontractors<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.cisa.gov\/secure-software-attestation-form\">Proposed Common Form for Self-Attestation By Software Producers<\/a><\/td>\n<td>Expected 2024<\/td>\n<td>Parties subject to FAR and subcontractors<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.fedramp.gov\/blog\/2023-01-11-announces-passing-fedramp-auth-act\/\">FedRAMP Authorization Act<\/a><\/td>\n<td>January 2023<\/td>\n<td>Government contractors with SaaS products<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.tsa.gov\/sd-and-ea\">TSA Directives<\/a><\/td>\n<td>Mar, May &amp; July 2023<\/td>\n<td>Transportation, pipelines<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.ftc.gov\/business-guidance\/resources\/ftc-safeguards-rule-what-your-business-needs-know\">FTC Safeguards Rule of Gramm-Leach-Bliley Act<\/a><\/td>\n<td>June 2023<\/td>\n<td>Financial services<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.dfs.ny.gov\/system\/files\/documents\/2023\/03\/23NYCRR500_0.pdf\">23 NYCRR Part 500: NY State Cybersecurity Requirements For Financial Services Companies<\/a><\/td>\n<td>Expected 2024<\/td>\n<td>Financial services<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.fda.gov\/medical-devices\/digital-health-center-excellence\/cybersecurity-medical-devices-frequently-asked-questions-faqs\">Federal Food, Drug, and Cosmetic Act (FD&amp;C Act) section 524B<\/a><\/td>\n<td>March 2023\u00a0<\/td>\n<td>Medical devices<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><a href=\"https:\/\/www.regulations.gov\/document\/FTC-2023-0037-0001\">FTC Health Breach Notification Rule<\/a><\/td>\n<td>Rule-making in progress (comment period ended Aug 8, 2023)<\/td>\n<td>Vendors of personal health records (\u201cPHRs\u201d) and related entities not covered by HIPAA<\/td>\n<\/tr>\n<tr>\n<td>Guidance<\/td>\n<td><a href=\"https:\/\/ag.ny.gov\/sites\/default\/files\/publications\/ProtectingConsumersPersonalData.pdf\">NY Attorney General Guide<\/a><\/td>\n<td>April 2023<\/td>\n<td>NY companies<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\">Industry Standards<\/td>\n<td><a href=\"https:\/\/csrc.nist.gov\/pubs\/cswp\/29\/the-nist-cybersecurity-framework-20\/ipd\">NIST Cybersecurity Framework 2.0<\/a><\/td>\n<td>Comment period ends on Nov 4 2023<\/td>\n<td>All<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/docs-prv.pcisecuritystandards.org\/PCI%20DSS\/Supporting%20Document\/PCI_DSS-QRG-v4_0.pdf\">PCI DSS v.4.0<\/a><\/td>\n<td>August 2022<\/td>\n<td>Payment processing<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.iso.org\/standard\/27001\">ISO\/IEC 27001 standards<\/a><\/td>\n<td>October 2022<\/td>\n<td>All<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.cisecurity.org\/controls\">CIS\u2019s Critical Security Controls v8<\/a><\/td>\n<td>May 2021<\/td>\n<td>All<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><u>Other Countries<\/u><\/p>\n<table class=\"legal-table\">\n<thead>\n<tr>\n<th><\/th>\n<th><b>Name<\/b><\/th>\n<th><b>Issue\/ Effective Date<\/b><\/th>\n<th><b>Applicable Entities\/Sectors<\/b><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td rowspan=\"4\">EU Directives<\/td>\n<td><a href=\"https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\/oj\">EU Network and Information Security Directive (NIS2)<\/a><\/td>\n<td>18 October 2024<\/td>\n<td>Essential and Important Entities<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022R2554\">EU Digital Operational Resilience Act (DORA)<\/a><\/td>\n<td>18 October 2024<\/td>\n<td>Financial services<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022L2557\">Critical Entities Resilience Directive (CER)<\/a><\/td>\n<td>18 October 2024<\/td>\n<td>Critical infrastructure (energy, transport, banking, financial market infrastructures, health, drinking water, wastewater, digital infrastructure, public administration, space and food)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A52022PC0454\">Cyber Resilience Act (CRA)<\/a>(proposed)<\/td>\n<td>15 September 2022<\/td>\n<td>Financial services<\/td>\n<\/tr>\n<tr>\n<td>UK Guidance<\/td>\n<td><a href=\"https:\/\/www.ofcom.org.uk\/__data\/assets\/pdf_file\/0019\/262090\/Ofcom-Network-and-Information-Systems-Guidance.pdf\">Ofcom Guidance for the digital infrastructure subsector: revised NIS Guidance<\/a><\/td>\n<td>May 2023<\/td>\n<td>Digital infrastructure subsectors (TLD Name Registry, DNS Resolver Service, DNS Authoritative Hosting Service, IXP)<\/td>\n<\/tr>\n<tr>\n<td>Canada<\/td>\n<td><a href=\"https:\/\/www.justice.gc.ca\/eng\/csj-sjc\/pl\/charter-charte\/c26_1.html\">Critical Cyber Systems Protection Act (CCSPA)(proposed)<\/a><\/td>\n<td>December 2022<\/td>\n<td>Designated Operators of critical cyber systems to vital services &amp; systems<\/td>\n<\/tr>\n<tr>\n<td>Australia<\/td>\n<td><a href=\"https:\/\/www.legislation.gov.au\/Details\/C2022A00033\">The Security Legislation Amendment (Critical Infrastructure Protection) Act 2022 (SLACIP Act)<\/a><\/td>\n<td>April 2022<\/td>\n<td>Critical Infrastructure (communications, financial services \/ markets, data storage or processing, defense industry, higher education\/research, energy, food &amp; grocery, health care &amp; medical, space technology, transport, and water and sewerage.<\/td>\n<\/tr>\n<tr>\n<td>Singapore<\/td>\n<td><a href=\"https:\/\/sso.agc.gov.sg\/Acts-Supp\/24-2023\/Published\/20230807?DocDate=20230807\">Online Criminal Harms Bill (proposed)<\/a><\/td>\n<td>August 2023<\/td>\n<td>All<\/td>\n<\/tr>\n<tr>\n<td>India<\/td>\n<td><a href=\"https:\/\/www.cert-in.org.in\/PDF\/CERT-In_Directions_70B_28.04.2022.pdf\">MeitY directions No. 20(3)\/2022-CERT-In<\/a><\/td>\n<td>April 2022<\/td>\n<td>All<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<style>\n.legal-table {\n\/*table-layout:fixed; *\/\n}\n.legal-table td {\n font-size:14px;\n}\n@media (max-width: 900px) {\n.legal-table td {\n font-size:9px !important;\n word-break:keep-all;\n}\n}\ntd:last-child, th:last-child {\n    padding-right: 10px;\n}\n<\/style>\n","protected":false},"excerpt":{"rendered":"<p>Disclaimer: This blog offers general information and should not be considered legal advice. Consult your own legal counsel for specific advice. As Cybersecurity Awareness Month comes to a close, the conversation around cyber law persists. The global landscape of cyber regulations continues to grow rapidly as governments around the world acknowledge the need for robust [&hellip;]<\/p>\n","protected":false},"author":388,"featured_media":8291,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[931,932,933,934,935,775,936,356,937,938,135,576,939,30],"class_list":{"0":"post-9119","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-recent-cyber-regulations","9":"tag-new-cyber-law","10":"tag-comprehensive-list-of-global-cyber-regulations","11":"tag-cyber-regulation-trends-and-developments","12":"tag-need-to-know-about-cyber-regulations","13":"tag-nis2","14":"tag-dora","15":"tag-cmmc","16":"tag-sec-cybersecurity-disclosure-requirements","17":"tag-ftc-safeguard-rules","18":"tag-incident-response","19":"tag-compliance","20":"tag-governance","21":"tag-dns","22":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed | Infoblox<\/title>\n<meta name=\"description\" content=\"We present a comprehensive list of over 30 recent global cyber regulations and guidelines. More regulations are expected from state regulators, government agencies and industry bodies in the coming months. Awareness of the general themes, trends and enforcement associated with these regulations is critical to your organization - read this blog to learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed | Infoblox\" \/>\n<meta property=\"og:description\" content=\"We present a comprehensive list of over 30 recent global cyber regulations and guidelines. More regulations are expected from state regulators, government agencies and industry bodies in the coming months. Awareness of the general themes, trends and enforcement associated with these regulations is critical to your organization - read this blog to learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-03T13:00:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-06T18:25:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wei Chen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"We present a comprehensive list of over 30 recent global cyber regulations and guidelines. More regulations are expected from state regulators, government agencies and industry bodies in the coming months. Awareness of the general themes, trends and enforcement associated with these regulations is critical to your organization - read this blog to learn more.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wei Chen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/\"},\"author\":{\"name\":\"Wei Chen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/7f913b9c4bbf07f5deeae30279031392\"},\"headline\":\"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed\",\"datePublished\":\"2023-11-03T13:00:47+00:00\",\"dateModified\":\"2024-02-06T18:25:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/\"},\"wordCount\":1285,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-security-thumbnail.jpg\",\"keywords\":[\"Recent Cyber Regulations\",\"new cyber law\",\"comprehensive list of global cyber regulations\",\"Cyber regulation trends and developments\",\"need to know about cyber regulations\",\"NIS2\",\"DORA\",\"CMMC\",\"SEC Cybersecurity Disclosure Requirements\",\"FTC Safeguard rules\",\"incident response\",\"compliance\",\"Governance\",\"DNS\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/\",\"name\":\"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-security-thumbnail.jpg\",\"datePublished\":\"2023-11-03T13:00:47+00:00\",\"dateModified\":\"2024-02-06T18:25:29+00:00\",\"description\":\"We present a comprehensive list of over 30 recent global cyber regulations and guidelines. More regulations are expected from state regulators, government agencies and industry bodies in the coming months. Awareness of the general themes, trends and enforcement associated with these regulations is critical to your organization - read this blog to learn more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-security-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-security-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/7f913b9c4bbf07f5deeae30279031392\",\"name\":\"Wei Chen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_388_1698771899-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_388_1698771899-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_388_1698771899-96x96.jpg\",\"caption\":\"Wei Chen\"},\"description\":\"Wei is responsible for Infoblox\u2019s legal functions and compliance and governance programs. Wei is a seasoned legal executive with over 20 years of experience scaling operations, strengthening compliance, building strong teams and championing innovations. Prior to joining Infoblox in 2022, Wei served as senior vice president and associate general counsel of Strategic Transactions at Salesforce. She also previously served as assistant general counsel at Sun Microsystems, Inc. and was a corporate associate at Cooley LLP and Skadden.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/wei-chen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed | Infoblox","description":"We present a comprehensive list of over 30 recent global cyber regulations and guidelines. More regulations are expected from state regulators, government agencies and industry bodies in the coming months. Awareness of the general themes, trends and enforcement associated with these regulations is critical to your organization - read this blog to learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/","og_locale":"en_US","og_type":"article","og_title":"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed | Infoblox","og_description":"We present a comprehensive list of over 30 recent global cyber regulations and guidelines. More regulations are expected from state regulators, government agencies and industry bodies in the coming months. Awareness of the general themes, trends and enforcement associated with these regulations is critical to your organization - read this blog to learn more.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/","og_site_name":"Infoblox Blog","article_published_time":"2023-11-03T13:00:47+00:00","article_modified_time":"2024-02-06T18:25:29+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","type":"image\/jpeg"}],"author":"Wei Chen","twitter_card":"summary_large_image","twitter_title":"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed | Infoblox","twitter_description":"We present a comprehensive list of over 30 recent global cyber regulations and guidelines. More regulations are expected from state regulators, government agencies and industry bodies in the coming months. Awareness of the general themes, trends and enforcement associated with these regulations is critical to your organization - read this blog to learn more.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","twitter_misc":{"Written by":"Wei Chen","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/"},"author":{"name":"Wei Chen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/7f913b9c4bbf07f5deeae30279031392"},"headline":"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed","datePublished":"2023-11-03T13:00:47+00:00","dateModified":"2024-02-06T18:25:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/"},"wordCount":1285,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","keywords":["Recent Cyber Regulations","new cyber law","comprehensive list of global cyber regulations","Cyber regulation trends and developments","need to know about cyber regulations","NIS2","DORA","CMMC","SEC Cybersecurity Disclosure Requirements","FTC Safeguard rules","incident response","compliance","Governance","DNS"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/","url":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/","name":"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","datePublished":"2023-11-03T13:00:47+00:00","dateModified":"2024-02-06T18:25:29+00:00","description":"We present a comprehensive list of over 30 recent global cyber regulations and guidelines. More regulations are expected from state regulators, government agencies and industry bodies in the coming months. Awareness of the general themes, trends and enforcement associated with these regulations is critical to your organization - read this blog to learn more.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/quick-guide-to-global-cyber-laws-be-informed-not-overwhelmed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Quick Guide to Global Cyber Laws: Be Informed, Not Overwhelmed"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/7f913b9c4bbf07f5deeae30279031392","name":"Wei Chen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_388_1698771899-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_388_1698771899-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_388_1698771899-96x96.jpg","caption":"Wei Chen"},"description":"Wei is responsible for Infoblox\u2019s legal functions and compliance and governance programs. Wei is a seasoned legal executive with over 20 years of experience scaling operations, strengthening compliance, building strong teams and championing innovations. Prior to joining Infoblox in 2022, Wei served as senior vice president and associate general counsel of Strategic Transactions at Salesforce. She also previously served as assistant general counsel at Sun Microsystems, Inc. and was a corporate associate at Cooley LLP and Skadden.","url":"https:\/\/www.infoblox.com\/blog\/author\/wei-chen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/388"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=9119"}],"version-history":[{"count":17,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9119\/revisions"}],"predecessor-version":[{"id":9515,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9119\/revisions\/9515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/8291"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=9119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=9119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=9119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}