The US Has A New Global Cyber Security Strategy

President Biden is introducing  a new international strategy with the aim to build global cyber security cooperation, following years of stepped up threats from China, Russia and cyber criminals. 

The State Department’s international cyber security strategy is the first articulated US global cyber strategy in over a decade. The strategy will be formally unveiled by Secretary of State Antony Blinken at the RSA Conference in San Francisco. 

If successful, it could elevate the US’s role globally in countering cyber threats and creating global consensus on Artificial Intelligence (AI), and position the US against China in setting cyber security norms.

Blinken will outline the new international strategy's four main areas of focus:-

  • Promoting a secure digital ecosystem globally.
  • Upholding “rights-respecting” digital technology approaches with allied nations.
  • Building coalitions to counter malicious cyberattacks.
  • Enhancing the cybersecurity resiliency of partner nations.

This final commitment includes a major focus on the State Department’s newly created Cyberspace and Digital Connectivity fund. 

The most recent round of federal appropriations signed into law by President Joe Biden gave the fund $50 million, intended to help allied nations enhance their cybersecurity. Before the fund’s creation, the US gave one-time grants for this purpose to countries including Albania and Costa Rica following separate cyberattacks on government services in those nations.

The new strategy will only carry forward these efforts. Nathaniel Fick, the State Department’s ambassador-at-large for cyberspace and digital policy, has said that the funds are limited. “In an overall 5 to 6 percent declining budgetary environment, we’re seeing a net new $50 million foreign assistance fund,” Fick said. “Now, it’s incumbent upon us, me, our team to prove that it’s worth the investment.”

The national cyber strategy was accompanied by an implementation plan, outlining steps to put the strategy into force. 

Fick also noted that there will also be an implementation plan for the State Department’s strategy, and that “we will have a really concerted effort over the next six months to get as many of these ideas and initiatives baked into our diplomacy as we can.”

Image:  peterschreiber.media 

The White House   |   CISA   |   Politico   |    Democratic Underground   |     

You Might Also Read: 

US Strategy Will Allow Hacking Criminal & Foreign Networks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« British Military Personnel Data Hacked
The Global Corporate Digital Security Landscape »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

CodeOne

CodeOne

CodeOne provides solutions for website and web app security.

Total Cyber-Sec

Total Cyber-Sec

Total Cyber-Sec is a company specialized in providing Professional Information Security and Cybersecurity Services.

SevenShift

SevenShift

SevenShift is a security consulting firm with a wealth of experience in the worlds of Cybersecurity and Internet of Things (IoT).

Stage2Data

Stage2Data

Stage2Data is one of Canada’s most trusted cloud solution providers offering hosted Backup and Disaster Recovery Services.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

3wSecurity

3wSecurity

3wSecurity provides visibility to your company’s internet facing systems throughout the security life cycle, allowing for a more thorough approach to vulnerability management.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

CryptoNext Security

CryptoNext Security

CryptoNext provides optimal end-to-end post-quantum cybersecurity remediation tools and solutions for IT/OT infrastructures & applications.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.

ClearSale (CLSA3)

ClearSale (CLSA3)

Clearsale’s innovative fraud solutions combine advanced technology with a passionate team of seasoned experts that understand every client’s unique needs.

XY Cyber

XY Cyber

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions.

DeepTempo

DeepTempo

At DeepTempo, we build AI models and related software that protect enterprises and service providers from sophisticated cyber threats.