US National Cyber Defense Policy

The US Senate will vote on its version of the 2021 defense authorisation bill in the near future. US Joint Cyber Planning has proposed an amendment to the 2021 defense policy bill which aims to help government and private actors to respond quickly to cyber attacks mounted from Russia, China and elsewhere. 

The spending  package authorises $740 billion for the military and it allocates an extra $15 million to the Cybersecurity and Infrastructure Security Agency (CISA) which for tye first timewill be required to report on risks posed by the use of technology from Huawei, whose 5G networking products are widely used around the world and which is increasingly regarded in the US as a security threat

Right now, US companies are largely on their own for cyber security defense. even in responding to big incidents and there is little coordination between the government and the private sector. For exmaple, the US government may have known as early as 2015 about Russians’ presence on servers belonging to the Democratic National Committee, however, it wasn’t until July 2018, nearly two years after the release of information stolen from the DNC, that the NSA announced the formation of a group to counter aggressive Russian cyber activities.

There’s a lot of room for improvement in coordinating public and private cyber responses.

Ex-Democrat party Presidential candidate Senator Bernie Sanders wants to find out what is going on inside the Pentagon.and has tabled an amendment that woud require the Pentagon comptroller to issue guidance that would incentivise different agencies and services for audit achievements.

These recommendation arise from the Cyberspace Solarium Commission  report on legidative proposals and is expected to have broad bipartisan support in Congress.

Reuters:       DefenseOne:       Federal News Network:    Solarium Commission:        JDSupra

You Might Also Read:

US Cyber Command Is A Tool Of Foreign Policy:

 

« Use Machine Learning To Predict What Is Most Likely To Be Exploited.
Home Working Cyber Security Toolkit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

HoxHunt

HoxHunt

HoxHunt is an automated cyber training program that transforms the way your employees react and respond to the growing amount of phishing emails.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

Hub71

Hub71

Hub71 is a world-class tech ecosystem opening doors to global opportunities from an optimal business environment for entrepreneurial-minded innovators.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

Boecore

Boecore

Boecore is an aerospace and defense engineering company that specializes in software solutions, systems engineering, cybersecurity, enterprise networks, and mission operations.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.