The New US President Must Win the Cyber War On Terror

The trenches of modern warfare are now being tunneled in Cyberspace, and the next US president and Congress must dig in and give comfort to the American public that they will commit to winning the cyber war on terror.

America’s Cold War has become a Code War. The recent announcement by Yahoo that state-sponsored hackers raided 500 million customer accounts is just the latest in a year of increasingly aggressive state-led Cyberattacks against American consumers, government and economic interests.

In 2016 alone the Russian intelligence services have hacked the servers of the Democratic National Committee and release the personal emails and phone numbers of members of Congress and congressional staff. We have knowledge that foreign hackers breached voter registration systems in my home state of Illinois and in Arizona in a possible attempt to influence the November elections. And we know that a Russian hacker is behind high-profile attacks on American social networking companies LinkedIn and Tumblr.

These incidents, like the 2015 North Korea hack on Sony, have come to light because they are cyber battles in a greater cyber war that we did not win. And they aren’t rare occurrences. State-sponsored hackers are regularly attempting to take down international banking services and US government websites and wiping the computer servers of multibillion-dollar American companies.

The US is now in the midst of World War 3.0 and cannot afford to fight this as a silent war in the shadows. Just as America prioritized personnel recruitment in its spy agencies and defense modernization in the military during the Cold War, they are being asked to do the same today for the Code War.

Congress must be actively engaged in promoting initiatives, legislation and funding streams that help our national security apparatus and international partners deal with Cyber threats. Considering the stakes of the next four years, it is important that the next American president must be prepared to be the first Cyber Wartime president.

Americans think the best computer minds and innovators must be brought into government. The future of democratic elections, the electric grid and economic infrastructure depend on it, and US national security now hinges on the ability to recruit more Mark Zuckerbergs than Jason Bournes.

The Hill:

 

« The Science of Threat Intelligence
Virtual Reality - The Next Wave »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

SureVine

SureVine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

Cybertron

Cybertron

Cybertron services include real-time monitoring and incident response and a cyber range for competency development.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

CyberCareers.gov

CyberCareers.gov

CyberCareers.gov is a platform for Cybersecurity Job Seekers, Federal Hiring Managers and Supervisors, Current Federal Cybersecurity Employees, Students and Universities.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Quantum Security Solutions (QSec)

Quantum Security Solutions (QSec)

QSec is an innovative information security consultancy based in Ghana. We can provide your organisation with information security products and services that assure against information risk.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Central Intelligence Agency (CIA)

Central Intelligence Agency (CIA)

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.