US National Cyber Security Strategy Moves On

The US Bureau of Cyberspace and Digital Policy, part of the State Department foreign policy establishment, is developing a new strategy for international cooperation against cyber threats. Development of the strategy comes as technologies such as AI and Machine Learning (ML) become more prevalent across the world and countries compete for technological and regulatory leadership.

At a Cyber Security Summit held earlier this month, the ambassador responsible for Cyberspace & Digital Policy, Nathaniel Fick, announced that “We will definitely have a draft circulating inside of government this fall... We hope to have the product out in the world, obviously, as quickly as possible.”

When asked about the approach the US must take to lead in AI technology, Fisk said the State Department does not “intend for our approach to AI to be as laissez-faire as our approach was on some earlier generations of technology, the stakes are too high.” He also made it clear that the United States is remaining committed to helping lead the way in technology innovation through important global partnerships. “The bottom line is, the US has to show up and we have to engage more or less everywhere.”

The State Department's strategy will build on the National Cybersecurity Strategy released by the White House in May. That document notably held up “international partnerships” as one of its five principles, or “pillars.” 

Sub-themes called for the US to build coalitions to counter cyber threats, strengthen friendly countries’ capabilities for cyber defense, and defend complex, globe-spanning supply chains for technology. “The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace and advance policies that protect the integrity and security of the infrastructure of the Internet, serve US interests, promote competitiveness, and uphold democratic values." 

Fick also emphasised the importance of public-private partnerships as a necessity to advance the cyber security agenda of the US government. “I am a big proponent of finding ways to cross-pollinate between these worlds … as people think about the arc of their career, give a little time to public service.”

The new strategy will address the national security challenges, economic opportunities, and values considerations presented by cyberspace, digital technologies, and digital policy and promotes standards and norms that are fair, transparent, and support US values. 

What’s coming out won’t stray from those foundations, but it will build on it. “It is by definition a somewhat derivative document. .. but at the same time, we do think there is some conceptual new ground to break." Fick said.

US State Dept:   Billington Cyber Summit:   White House:   Breaking Defense:    Silicon:   Meritalk:

You Might Also Read: 

US Strategy Will Allow Hacking Criminal & Foreign Networks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Quadruple Extortion  Ransomware
Update: The 2023 Malware League Table »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Waterfall Security Solutions

Waterfall Security Solutions

Waterfall Security is focused on protecting critical infrastructure and industrial control systems from remote online cyber attacks,

National Security Agency (NSA) - USA

National Security Agency (NSA) - USA

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

EYE Security

EYE Security

EYE provides enterprise-grade cyber security services and cyber insurance to SMEs in Europe, Cyber Incident Response and strategic advice in board rooms.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Bastion Networks

Bastion Networks

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions to protect from online threats.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.