The Biden-Harris administration has released a new US national cybersecurity strategy that aims to shift the burden of cybersecurity defense from individuals, small businesses, and local governments to software vendors and service providers.
The strategy recognizes the importance of collaboration between public and private sectors and international allies and partners to secure the country against cyber threats.
In this article, we will discuss the key objectives and proposals of the new strategy, including its focus on making state-backed and financially motivated malicious activity unprofitable and ineffective.
The White House has emphasized the need to rebalance the responsibility for cybersecurity defense by shifting the burden away from individuals, small businesses, and local governments and onto the organizations that are best-positioned to reduce risks for all.
This approach involves deeper operational and strategic collaboration with software, hardware, and managed service providers capable of reshaping the cyber landscape in favor of greater security and resilience.
All service providers are expected to make reasonable attempts to secure the use of their infrastructure against abuse or criminal behavior, making it more difficult for adversaries to abuse US.-based infrastructure while safeguarding individual privacy.
The new US national cybersecurity strategy has several objectives, including the defense of critical infrastructure, the disruption of malicious threat actors targeting US interests, strategic investments to establish a more secure digital ecosystem, and the development of international partnerships to achieve shared goals.
The White House underlines the importance of taking a more aggressive stance towards state-backed and financially motivated malicious activity, making it unprofitable and ineffective. The strategy also highlights ransomware as a major threat, and the administration strongly discourages the payment of ransoms.
According to the Biden-Harris administration, China and Russia are the most active and aggressive states behind malicious activity targeting US critical infrastructure and assets.
China has expanded cyber operations beyond intellectual property theft to become the most advanced strategic competitor, while Russia remains a persistent cyber threat as it refines its cyber espionage, attack, influence, and disinformation capabilities. The new strategy focuses on disrupting these foreign threat actors and targeting ransomware gangs operating from safe havens in countries like Russia, North Korea, and Iran.
The Office of National Cyber Director (ONCD) and the Office of Management and Budget (OMB) will coordinate the efforts to implement the new cybersecurity strategy, under the oversight of the National Security Council (NSC).
They will make annual reports to the President and the US Congress to highlight the strategy’s effectiveness and provide federal agencies with yearly guidance on cybersecurity budget priorities to achieve its goals.
The White House’s new US national cybersecurity strategy focuses on shared responsibility for cybersecurity defense and deeper collaboration between public and private sectors and international allies and partners.
The strategy has several objectives, including the defense of critical infrastructure, the disruption of malicious threat actors targeting US interests, strategic investments to establish a more secure digital ecosystem, and the development of international partnerships to achieve shared goals.
With the ONCD and OMB coordinating efforts to implement the strategy and the NSC providing oversight, the White House aims to make the country more resilient against cyber threats.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter. You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…