New US National Cyber Director

Christopher Inglis (pictured), the US’s first-ever National Cyber Director, is building out his office with an inaugural strategic intent statement. 

One of the early efforts of the new National Cyber Director is to tackle how to strengthen the critical infrastructure of the United States. 

The key to approaching that overwhelming task is to drive coordination across the federal government and the critical sectors, and to identify the crucial elements that connect each component, versus trying to protect all sectors at once, which is not quite possible, explained Inglis.

In particular, Inglis says he wants the government to take a tougher, more proactive approach to those who threaten America’s networks: degrade their capabilities and demonstrate how they would suffer should they attack.

The office plans to focus on both national and federal cyber security, assessing and reviewing budgets, supply chain security, planning and incident response, workforce development and working with Congress and the private sector.

Inglis said that technology is supposed to ease our lives, to enable self-betterment, to bring us closer to our loved ones and to our ambitions.  "Digital connectivity is not some occasionally destructive force of nature to be dispassionately tracked and mitigated, but a transformational tool to be wielded in furtherance of our highest ambitions... Recent history has forced us to predominantly consider cyber security in negative terms, which hackers must be stopped, vulnerabilities patched, and activities condemned, sanctioned, or disrupted. It is easy to forget that cyberspace was originally built to enrich our lives."

Malicious activity in cyberspace has become irresistibly attractive to geopolitical competitors and criminals alike. It enables a level of anonymity, of global reach, and of efficiency of scale that equips countries with asymmetric capabilities that challenge conventional conceptions of defense and deterrence.

Criminals and extremists similarly have the capabilities to threaten unprecedented levels of disruption and coercion. 

Inglis outlined how his office will coordinate the various agencies and entities tasked with defending against and  responding to cyber attacks. He and his staff will shape and coordinate budgets, ensure that federal cybersecurity operators are at least as good as their private counterparts, watch for emerging vulnerabilities in digital supply chains, and more.

Another major task for Inglis will be ensuring the federal government takes a consistent approach to helping critical infrastructure operators.

Inglis is still setting up his new office, which lacks permanent funding and is instead drawing from a White House contingency budget. He said he’s spoken to “dozens” of potential staffers and that many of them are in the process of joining his team, which Congress envisioned eventually growing to 75 people. “If we were to say that there are 16 critical infrastructures ... and if we were then to further imply that everything inside of every one of those 16 critical infrastructures should be defended with equal fealties, we find ourselves pretty quickly exhausted,” the director concluded. 

The Whitehouse:   DefenseOne:     AFCEA:      Politico:       Cyberscoop:   Meritalk:   

You Might Also Read: 

US Cyber Security Chiefs Support Mandatory Incident Reporting:

 

« British Manufacturing Severely Affected By Cyber Attacks
REvil Ransomware Gang Leader Identified »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

KZ-CERT

KZ-CERT

KZ-CERT is the national Computer Emergency Response Team for Kazakhstan.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

Cybero

Cybero

Cybero offers professional corporate cybersecurity training tailored to your business requirements.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

National Accreditation Authority Hungary (NAH)

National Accreditation Authority Hungary (NAH)

NAH is the national accreditation body for Hungary. The directory of members provides details of organisations offering certification services for ISO 27001.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

Data#3 Limited (DTL)

Data#3 Limited (DTL)

Data#3 Limited (DTL) is a leading Australian IT services and solutions provider.

RKVST

RKVST

RKVST is a powerful tool that builds trust in multi-party processes when it’s critical to have high assurance in data for confident decisions.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.

COGITANDA Dataprotect

COGITANDA Dataprotect

COGITANDA are a group of companies focused on dealing with cyber risks, managing them and insuring them.