US National Cyber Defense Policy

The US Senate will vote on its version of the 2021 defense authorisation bill in the near future. US Joint Cyber Planning has proposed an amendment to the 2021 defense policy bill which aims to help government and private actors to respond quickly to cyber attacks mounted from Russia, China and elsewhere. 

The spending  package authorises $740 billion for the military and it allocates an extra $15 million to the Cybersecurity and Infrastructure Security Agency (CISA) which for tye first timewill be required to report on risks posed by the use of technology from Huawei, whose 5G networking products are widely used around the world and which is increasingly regarded in the US as a security threat

Right now, US companies are largely on their own for cyber security defense. even in responding to big incidents and there is little coordination between the government and the private sector. For exmaple, the US government may have known as early as 2015 about Russians’ presence on servers belonging to the Democratic National Committee, however, it wasn’t until July 2018, nearly two years after the release of information stolen from the DNC, that the NSA announced the formation of a group to counter aggressive Russian cyber activities.

There’s a lot of room for improvement in coordinating public and private cyber responses.

Ex-Democrat party Presidential candidate Senator Bernie Sanders wants to find out what is going on inside the Pentagon.and has tabled an amendment that woud require the Pentagon comptroller to issue guidance that would incentivise different agencies and services for audit achievements.

These recommendation arise from the Cyberspace Solarium Commission  report on legidative proposals and is expected to have broad bipartisan support in Congress.

Reuters:       DefenseOne:       Federal News Network:    Solarium Commission:        JDSupra

You Might Also Read:

US Cyber Command Is A Tool Of Foreign Policy:

 

« Use Machine Learning To Predict What Is Most Likely To Be Exploited.
Home Working Cyber Security Toolkit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

NSFOCUS Information Technology

NSFOCUS Information Technology

NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider.

Military Cyber Professionals Association (MCPA)

Military Cyber Professionals Association (MCPA)

MCPA are a team of Soldiers, Sailors, Airmen, Marines, Veterans and others interested in the development of the American military cyber profession.

Regulus Cyber

Regulus Cyber

Regulus enables drones, robots and autonomous vehicles to operate safely, without malicious or accidental interference to the operation of their mission.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

evolutionQ

evolutionQ

evolutionQ delivers quantum-risk management strategies and robust cybersecurity tools designed to be safe in an era with quantum computing technologies.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.