Trump Signs Cybersecurity Order

President Trump has signed an executive order on cybersecurity that aims to bolster the cyber-security of federal networks and the critical infrastructure of the US.

The cyber-security order has long been anticipated as Trump balked on signing a cybersecurity order mere days into his presidency.

The order has three major components: protecting federal networks, cyber-security of critical infrastructure and promoting cyber-security workforce development.

As expected by experts, it continues an approach espoused by the Obama administration that leans on public-private partnerships. Effective immediately, each agency has been ordered to adopt the National Institute of Standards and Technology's framework of cybersecurity standards, which was released in 2014, followed by a draft update in January. The voluntary framework was created as a "set of industry standards and best practices to help organisations manage cyber-security risks." If a successor document is published, then agencies must abide by that.
Trump's order pushes for a higher degree of centralisation and will hold department heads accountable for managing cybersecurity risk management and modernisation for IT and data as part of an "executive branch enterprise.

Speaking about the cyber order during the White House press briefing, Tom Bossert, Trump's homeland security adviser, referred to the data breach at the Office of Personnel Management in 2014, in which it is estimated that hackers stole records for up to 21.5 million people.

Bossert said agency will not only have a responsibility to protect their own networks, but will also have a responsibility to identify risks and share that information with the White House.

"That executive order among other things is going to keep his promise that he has made to the American people to keep America safe, including in cyber-space," Bossert said.
Bossert noted that the US has seen an uptick of attack not only from the country's enemies, but also allies. "Sitting by and doing nothing is no longer an option," he said.
Asked if the Russian hacking interference in the US election was the impetus for the order, Bossert asserted that it was not.
"No, it was not a Russian-motivated issue," he said. "It was a United States of America-motivated issue."

Washinton Examiner:

You Might Also Read: 

Trump Administration's Policy On Cybersecurity:

US Defense Intelligence Agency Upgrades Cybersecurity:

Deterrence & Cyber Attacks On The US Electoral System:

 

« Cyber Crime Drives Up The Cost Of Insurance
What We Know About The WannaCry Cyberattack So Far »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MobileIron

MobileIron

MobileIron provides EMM capabilities to IT organizations that need to secure mobile devices, applications and content.

Maryman & Associates

Maryman & Associates

Maryman & Associates are specialists in computer forensic investigations, incident response and e-discovery services.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

ADVA Optical Networking

ADVA Optical Networking

ADVA is a company founded on innovation and focused on helping our customers succeed. Our technology forms the building blocks of a shared digital future and empowers networks across the globe.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.

Mode

Mode

Mode is an out-of-band communication and crisis collaboration platform. One platform to manage your cyber crisis response. Stay connected when it's needed most.