The New US President Must Win the Cyber War On Terror

The trenches of modern warfare are now being tunneled in Cyberspace, and the next US president and Congress must dig in and give comfort to the American public that they will commit to winning the cyber war on terror.

America’s Cold War has become a Code War. The recent announcement by Yahoo that state-sponsored hackers raided 500 million customer accounts is just the latest in a year of increasingly aggressive state-led Cyberattacks against American consumers, government and economic interests.

In 2016 alone the Russian intelligence services have hacked the servers of the Democratic National Committee and release the personal emails and phone numbers of members of Congress and congressional staff. We have knowledge that foreign hackers breached voter registration systems in my home state of Illinois and in Arizona in a possible attempt to influence the November elections. And we know that a Russian hacker is behind high-profile attacks on American social networking companies LinkedIn and Tumblr.

These incidents, like the 2015 North Korea hack on Sony, have come to light because they are cyber battles in a greater cyber war that we did not win. And they aren’t rare occurrences. State-sponsored hackers are regularly attempting to take down international banking services and US government websites and wiping the computer servers of multibillion-dollar American companies.

The US is now in the midst of World War 3.0 and cannot afford to fight this as a silent war in the shadows. Just as America prioritized personnel recruitment in its spy agencies and defense modernization in the military during the Cold War, they are being asked to do the same today for the Code War.

Congress must be actively engaged in promoting initiatives, legislation and funding streams that help our national security apparatus and international partners deal with Cyber threats. Considering the stakes of the next four years, it is important that the next American president must be prepared to be the first Cyber Wartime president.

Americans think the best computer minds and innovators must be brought into government. The future of democratic elections, the electric grid and economic infrastructure depend on it, and US national security now hinges on the ability to recruit more Mark Zuckerbergs than Jason Bournes.

The Hill:

 

« The Science of Threat Intelligence
Virtual Reality - The Next Wave »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

EIT Digital

EIT Digital

EIT Digital is a leading digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. Areas of focus include digital infrastructure and cyber security.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

NLnet Labs

NLnet Labs

NLnet Labs is a not-for-profit foundation with a long heritage in research and development, Internet architecture and governance, as well as security in the area of DNS and inter-domain routing.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

GajShield

GajShield

GajShield Infotech provides Data Security Firewall solutions to Corporate’s and Government agencies.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Kontra

Kontra

Kontra application security training is an interactive and intuitive learning experience that engages developers.