The New US President Must Win the Cyber War On Terror

The trenches of modern warfare are now being tunneled in Cyberspace, and the next US president and Congress must dig in and give comfort to the American public that they will commit to winning the cyber war on terror.

America’s Cold War has become a Code War. The recent announcement by Yahoo that state-sponsored hackers raided 500 million customer accounts is just the latest in a year of increasingly aggressive state-led Cyberattacks against American consumers, government and economic interests.

In 2016 alone the Russian intelligence services have hacked the servers of the Democratic National Committee and release the personal emails and phone numbers of members of Congress and congressional staff. We have knowledge that foreign hackers breached voter registration systems in my home state of Illinois and in Arizona in a possible attempt to influence the November elections. And we know that a Russian hacker is behind high-profile attacks on American social networking companies LinkedIn and Tumblr.

These incidents, like the 2015 North Korea hack on Sony, have come to light because they are cyber battles in a greater cyber war that we did not win. And they aren’t rare occurrences. State-sponsored hackers are regularly attempting to take down international banking services and US government websites and wiping the computer servers of multibillion-dollar American companies.

The US is now in the midst of World War 3.0 and cannot afford to fight this as a silent war in the shadows. Just as America prioritized personnel recruitment in its spy agencies and defense modernization in the military during the Cold War, they are being asked to do the same today for the Code War.

Congress must be actively engaged in promoting initiatives, legislation and funding streams that help our national security apparatus and international partners deal with Cyber threats. Considering the stakes of the next four years, it is important that the next American president must be prepared to be the first Cyber Wartime president.

Americans think the best computer minds and innovators must be brought into government. The future of democratic elections, the electric grid and economic infrastructure depend on it, and US national security now hinges on the ability to recruit more Mark Zuckerbergs than Jason Bournes.

The Hill:

 

« The Science of Threat Intelligence
Virtual Reality - The Next Wave »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

Be Cyber Aware At Sea

Be Cyber Aware At Sea

Be Cyber Aware At Sea is a global maritime and offshore industry initiative to raise awareness and educate crew members and the offshore workforce.

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.

Sonar

Sonar

AI generated or written by humans, Sonar’s Clean Code Solutions cover your code quality needs, improving code reliability, maintainability, and security.

Bedrock Security

Bedrock Security

Bedrock Security is at the forefront of revolutionizing data security in the cloud and GenAI era.