BEST OF THE WEB

White House unveils new National Cybersecurity Strategy for the U.S.

To address the growing threat of cyberattacks, the White House has released a new National Cybersecurity Strategy. The strategy outlines how the government of the United States will work to protect its networks, data, and critical infrastructure from cyberattacks.

Priorities include rebalancing responsibility for cyberspace defense by shifting the burden of cybersecurity away from individuals, small businesses, and local governments and onto organizations that are most capable and best-positioned to reduce risks for all of us. realigning incentives to favor long-term investments by striking a careful balance between defending against immediate threats and strategically planning for and investing in a resilient future.

It proposes to defend critical infrastructure by expanding the use of minimum cybersecurity requirements in critical sectors to ensure national security and public safety, as well as harmonizing regulations to reduce compliance burdens; enabling public-private collaboration at the speed and scale required to defend critical infrastructure and essential services; and defending and modernizing Federal networks, as well as updating Federal incident response policy.

It will also Disrupt and Dismantle Threat Actors by strategically employing all tools of national power to disrupt adversaries; engaging the private sector in disruption activities through scalable mechanisms; and addressing the ransomware threat through a comprehensive Federal approach and in tandem with our international partners.

In addition, there is a plan to form market forces to drive protection and resilience by trying to promote privacy and data security; shifting liability for software products and services to promote secure development practices; and ensuring that federal grant programs encourage investments in secure and resilient new infrastructure. It will invest in a resilient future and form international alliances to achieve shared objectives.

The sources for this piece include an article in BleepingComputer.

IT World Canada Staff
IT World Canada Staffhttp://www.itworldcanada.com/
The online resource for Canadian Information Technology professionals.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

ITW in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

More Best of The Web