The US Has A New Global Cyber Security Strategy

President Biden is introducing  a new international strategy with the aim to build global cyber security cooperation, following years of stepped up threats from China, Russia and cyber criminals. 

The State Department’s international cyber security strategy is the first articulated US global cyber strategy in over a decade. The strategy will be formally unveiled by Secretary of State Antony Blinken at the RSA Conference in San Francisco. 

If successful, it could elevate the US’s role globally in countering cyber threats and creating global consensus on Artificial Intelligence (AI), and position the US against China in setting cyber security norms.

Blinken will outline the new international strategy's four main areas of focus:-

  • Promoting a secure digital ecosystem globally.
  • Upholding “rights-respecting” digital technology approaches with allied nations.
  • Building coalitions to counter malicious cyberattacks.
  • Enhancing the cybersecurity resiliency of partner nations.

This final commitment includes a major focus on the State Department’s newly created Cyberspace and Digital Connectivity fund. 

The most recent round of federal appropriations signed into law by President Joe Biden gave the fund $50 million, intended to help allied nations enhance their cybersecurity. Before the fund’s creation, the US gave one-time grants for this purpose to countries including Albania and Costa Rica following separate cyberattacks on government services in those nations.

The new strategy will only carry forward these efforts. Nathaniel Fick, the State Department’s ambassador-at-large for cyberspace and digital policy, has said that the funds are limited. “In an overall 5 to 6 percent declining budgetary environment, we’re seeing a net new $50 million foreign assistance fund,” Fick said. “Now, it’s incumbent upon us, me, our team to prove that it’s worth the investment.”

The national cyber strategy was accompanied by an implementation plan, outlining steps to put the strategy into force. 

Fick also noted that there will also be an implementation plan for the State Department’s strategy, and that “we will have a really concerted effort over the next six months to get as many of these ideas and initiatives baked into our diplomacy as we can.”

Image:  peterschreiber.media 

The White House   |   CISA   |   Politico   |    Democratic Underground   |     

You Might Also Read: 

US Strategy Will Allow Hacking Criminal & Foreign Networks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« British Military Personnel Data Hacked
The Global Corporate Digital Security Landscape »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Biscom

Biscom

Biscom offers solutions for secure file transfer, synchronization, file translation, and mobile devices, designed to deliver mission-critical reliability, streamline workflows and reduce costs.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

Redbud

Redbud

Redbud is a specialist search and recruitment firm for Information Security professionals.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

Cofrac

Cofrac

Cofrac is the national accreditation body for France. The directory of members provides details of organisations offering certification services for ISO 27001.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

Coretelligent

Coretelligent

Coretelligent is a leading providers of Managed and Co-Managed IT, cybersecurity and private cloud services.

Price Forbes

Price Forbes

Building on more than 100 years of specialist insurance broking, Price Forbes partner with clients around the world who are looking to understand and balance today’s risk and plan for the future.

Cyber Intell Solution (CIS)

Cyber Intell Solution (CIS)

Cyber Intell Solution provide expert consulting, specialized products, and tailored operational services to governmental and corporate industry worldwide.