Cybersecurity

Latest
Our Work
Cyberattacks have increasingly affected both public and private entities. Those attacks underscore the need for coordinated action. The U.S. Chamber believes public-private partnership is critical to robust cybersecurity. Together, we must work proactively to make sure key cyber systems are always ready to handle increasing and evolving threats. When government works with the business community, we can enhance security, drive international collaboration, and hold malicious cybercriminals accountable when they violate domestic and international laws.
Events
- EnergyCritical Minerals SummitWednesday, April 0909:00 AM EDT - 12:00 PM EDT1615 H Street, NW, Washington, DC 20062Learn More
- Intellectual PropertyGlobal IP SummitWednesday, April 0911:00 AM EDT - 04:00 PM EDTVirtualLearn More
- Intellectual Property2025 World IP Day Celebration and IP Index LaunchTuesday, April 1501:00 PM EDT - 04:30 PM EDTVirtualLearn More
Latest Content
Here are some ways government leaders are protecting the United States from cyberattacks that could steal intellectual property and personal data.
This Hill letter was sent to the Members of the Senate Committee on Commerce, Science, and Transportation, on the Nomination of Bill Nelson to be Administrator of the National Aeronautics and Space Administration (NASA).
The U.S. Chamber of Commerce (Chamber) is submitting this letter in response to the U.S. Department of Commerce’s (Department) request for comments regarding risks in the semiconductor manufacturing and advanced packaging supply chain. The Chamber welcomes this review as part of the Biden Administration’s Executive Order 14017 on America’s Supply Chains (EO), and we appreciate the Administration’s efforts to engage closely with the private sector as it identifies policy recommendations and priorities.
The U.S. Chamber of Commerce welcomes the opportunity to provide comments on the European Commission’s consultation of the revision of the Directive (EU) 2016/1148 concerning measures for a common, high-level of security of network and information systems across the Union aimed at fulfilling the Commission’s requirements to review the functioning of the NIS Directive periodically. Our comments are attached.
Here are the lessons businesses can learn from North Korean-backed malicious cyberattacks and turn them into tactical risk mitigation measures.
The U.S. Chamber of Commerce (Chamber) is submitting this letter in response to the U.S. Department of Commerce’s (Department) request for comment on the interim final rule (IFR or Rule) to implement provisions of Executive Order 13873 (EO), Securing the Information and Communications Technology and Services (ICTS) Supply Chain. Appendix