Trump Signs Cybersecurity Order

President Trump has signed an executive order on cybersecurity that aims to bolster the cyber-security of federal networks and the critical infrastructure of the US.

The cyber-security order has long been anticipated as Trump balked on signing a cybersecurity order mere days into his presidency.

The order has three major components: protecting federal networks, cyber-security of critical infrastructure and promoting cyber-security workforce development.

As expected by experts, it continues an approach espoused by the Obama administration that leans on public-private partnerships. Effective immediately, each agency has been ordered to adopt the National Institute of Standards and Technology's framework of cybersecurity standards, which was released in 2014, followed by a draft update in January. The voluntary framework was created as a "set of industry standards and best practices to help organisations manage cyber-security risks." If a successor document is published, then agencies must abide by that.
Trump's order pushes for a higher degree of centralisation and will hold department heads accountable for managing cybersecurity risk management and modernisation for IT and data as part of an "executive branch enterprise.

Speaking about the cyber order during the White House press briefing, Tom Bossert, Trump's homeland security adviser, referred to the data breach at the Office of Personnel Management in 2014, in which it is estimated that hackers stole records for up to 21.5 million people.

Bossert said agency will not only have a responsibility to protect their own networks, but will also have a responsibility to identify risks and share that information with the White House.

"That executive order among other things is going to keep his promise that he has made to the American people to keep America safe, including in cyber-space," Bossert said.
Bossert noted that the US has seen an uptick of attack not only from the country's enemies, but also allies. "Sitting by and doing nothing is no longer an option," he said.
Asked if the Russian hacking interference in the US election was the impetus for the order, Bossert asserted that it was not.
"No, it was not a Russian-motivated issue," he said. "It was a United States of America-motivated issue."

Washinton Examiner:

You Might Also Read: 

Trump Administration's Policy On Cybersecurity:

US Defense Intelligence Agency Upgrades Cybersecurity:

Deterrence & Cyber Attacks On The US Electoral System:

 

« Cyber Crime Drives Up The Cost Of Insurance
What We Know About The WannaCry Cyberattack So Far »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Business Hive Vilnius (BHV)

Business Hive Vilnius (BHV)

BHV is one of the oldest startup incubator and technology hubs in the Baltics, primarily focused on hardware, security, blockchain, AI, fintech and enterprise software.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

ZENDATA

ZENDATA

ZENDATA are an innovative provider of intelligent, tailored cybersecurity solutions to global companies and public sector institutions.