US National Cyber Defense Policy

The US Senate will vote on its version of the 2021 defense authorisation bill in the near future. US Joint Cyber Planning has proposed an amendment to the 2021 defense policy bill which aims to help government and private actors to respond quickly to cyber attacks mounted from Russia, China and elsewhere. 

The spending  package authorises $740 billion for the military and it allocates an extra $15 million to the Cybersecurity and Infrastructure Security Agency (CISA) which for tye first timewill be required to report on risks posed by the use of technology from Huawei, whose 5G networking products are widely used around the world and which is increasingly regarded in the US as a security threat

Right now, US companies are largely on their own for cyber security defense. even in responding to big incidents and there is little coordination between the government and the private sector. For exmaple, the US government may have known as early as 2015 about Russians’ presence on servers belonging to the Democratic National Committee, however, it wasn’t until July 2018, nearly two years after the release of information stolen from the DNC, that the NSA announced the formation of a group to counter aggressive Russian cyber activities.

There’s a lot of room for improvement in coordinating public and private cyber responses.

Ex-Democrat party Presidential candidate Senator Bernie Sanders wants to find out what is going on inside the Pentagon.and has tabled an amendment that woud require the Pentagon comptroller to issue guidance that would incentivise different agencies and services for audit achievements.

These recommendation arise from the Cyberspace Solarium Commission  report on legidative proposals and is expected to have broad bipartisan support in Congress.

Reuters:       DefenseOne:       Federal News Network:    Solarium Commission:        JDSupra

You Might Also Read:

US Cyber Command Is A Tool Of Foreign Policy:

 

« Use Machine Learning To Predict What Is Most Likely To Be Exploited.
Home Working Cyber Security Toolkit »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infinigate UK

Infinigate UK

Infinigate is a value-added distributor of IT security solutions to protect and defend IT networks, servers, devices, data, applications, as well as the cloud.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Brighterion

Brighterion

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

MazeBolt Technologies

MazeBolt Technologies

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

Readynez

Readynez

Readynez is the digital skills concierge service that helps you ensure your workforce has the tech skills and resources needed to stay ahead of the digital curve.

Hexagon

Hexagon

Hexagon is a global leader in digital reality solutions. We are putting data to work to boost efficiency, productivity, quality and safety.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

Securitybricks

Securitybricks

Securitybricks specialize in cloud security and compliance. Our mission is to automate regulatory compliance backed by human validation.