Trump Signs Cybersecurity Order

President Trump has signed an executive order on cybersecurity that aims to bolster the cyber-security of federal networks and the critical infrastructure of the US.

The cyber-security order has long been anticipated as Trump balked on signing a cybersecurity order mere days into his presidency.

The order has three major components: protecting federal networks, cyber-security of critical infrastructure and promoting cyber-security workforce development.

As expected by experts, it continues an approach espoused by the Obama administration that leans on public-private partnerships. Effective immediately, each agency has been ordered to adopt the National Institute of Standards and Technology's framework of cybersecurity standards, which was released in 2014, followed by a draft update in January. The voluntary framework was created as a "set of industry standards and best practices to help organisations manage cyber-security risks." If a successor document is published, then agencies must abide by that.
Trump's order pushes for a higher degree of centralisation and will hold department heads accountable for managing cybersecurity risk management and modernisation for IT and data as part of an "executive branch enterprise.

Speaking about the cyber order during the White House press briefing, Tom Bossert, Trump's homeland security adviser, referred to the data breach at the Office of Personnel Management in 2014, in which it is estimated that hackers stole records for up to 21.5 million people.

Bossert said agency will not only have a responsibility to protect their own networks, but will also have a responsibility to identify risks and share that information with the White House.

"That executive order among other things is going to keep his promise that he has made to the American people to keep America safe, including in cyber-space," Bossert said.
Bossert noted that the US has seen an uptick of attack not only from the country's enemies, but also allies. "Sitting by and doing nothing is no longer an option," he said.
Asked if the Russian hacking interference in the US election was the impetus for the order, Bossert asserted that it was not.
"No, it was not a Russian-motivated issue," he said. "It was a United States of America-motivated issue."

Washinton Examiner:

You Might Also Read: 

Trump Administration's Policy On Cybersecurity:

US Defense Intelligence Agency Upgrades Cybersecurity:

Deterrence & Cyber Attacks On The US Electoral System:

 

« Cyber Crime Drives Up The Cost Of Insurance
What We Know About The WannaCry Cyberattack So Far »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

IT Security House

IT Security House

IT Security House is a leading European supplier of Cyber Security Intelligence and eCrime services.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Infosec (T) Ltd

Infosec (T) Ltd

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

THEC-Incubator

THEC-Incubator

THEC-Incubator program is designed for international and ambitious tech startups in the Netherlands. Areas of focus include Blockchain and Cyber Security.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.