Breaking

New US National Cybersecurity Strategy Aims to Reduce CyberRisks

The Biden-Harris administration has released a new US national cybersecurity strategy that aims to shift the burden of cybersecurity defense from individuals, small businesses, and local governments to software vendors and service providers.

The strategy recognizes the importance of collaboration between public and private sectors and international allies and partners to secure the country against cyber threats.

In this article, we will discuss the key objectives and proposals of the new strategy, including its focus on making state-backed and financially motivated malicious activity unprofitable and ineffective.

US National Cybersecurity Strategy proposes Shared Cyber Responsibility

The White House has emphasized the need to rebalance the responsibility for cybersecurity defense by shifting the burden away from individuals, small businesses, and local governments and onto the organizations that are best-positioned to reduce risks for all.

This approach involves deeper operational and strategic collaboration with software, hardware, and managed service providers capable of reshaping the cyber landscape in favor of greater security and resilience.

All service providers are expected to make reasonable attempts to secure the use of their infrastructure against abuse or criminal behavior, making it more difficult for adversaries to abuse US.-based infrastructure while safeguarding individual privacy.

US National Cybersecurity Strategy: Key Objectives

The new US national cybersecurity strategy has several objectives, including the defense of critical infrastructure, the disruption of malicious threat actors targeting US interests, strategic investments to establish a more secure digital ecosystem, and the development of international partnerships to achieve shared goals.

The White House underlines the importance of taking a more aggressive stance towards state-backed and financially motivated malicious activity, making it unprofitable and ineffective. The strategy also highlights ransomware as a major threat, and the administration strongly discourages the payment of ransoms.

Foreign Threat Actors

According to the Biden-Harris administration, China and Russia are the most active and aggressive states behind malicious activity targeting US critical infrastructure and assets.

China has expanded cyber operations beyond intellectual property theft to become the most advanced strategic competitor, while Russia remains a persistent cyber threat as it refines its cyber espionage, attack, influence, and disinformation capabilities. The new strategy focuses on disrupting these foreign threat actors and targeting ransomware gangs operating from safe havens in countries like Russia, North Korea, and Iran.

Implementation and Oversight

The Office of National Cyber Director (ONCD) and the Office of Management and Budget (OMB) will coordinate the efforts to implement the new cybersecurity strategy, under the oversight of the National Security Council (NSC).

They will make annual reports to the President and the US Congress to highlight the strategy’s effectiveness and provide federal agencies with yearly guidance on cybersecurity budget priorities to achieve its goals.

The White House’s new US national cybersecurity strategy focuses on shared responsibility for cybersecurity defense and deeper collaboration between public and private sectors and international allies and partners.

The strategy has several objectives, including the defense of critical infrastructure, the disruption of malicious threat actors targeting US interests, strategic investments to establish a more secure digital ecosystem, and the development of international partnerships to achieve shared goals.

With the ONCD and OMB coordinating efforts to implement the strategy and the NSC providing oversight, the White House aims to make the country more resilient against cyber threats.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter. You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago