US National Cyber Security Strategy Moves On

The US Bureau of Cyberspace and Digital Policy, part of the State Department foreign policy establishment, is developing a new strategy for international cooperation against cyber threats. Development of the strategy comes as technologies such as AI and Machine Learning (ML) become more prevalent across the world and countries compete for technological and regulatory leadership.

At a Cyber Security Summit held earlier this month, the ambassador responsible for Cyberspace & Digital Policy, Nathaniel Fick, announced that “We will definitely have a draft circulating inside of government this fall... We hope to have the product out in the world, obviously, as quickly as possible.”

When asked about the approach the US must take to lead in AI technology, Fisk said the State Department does not “intend for our approach to AI to be as laissez-faire as our approach was on some earlier generations of technology, the stakes are too high.” He also made it clear that the United States is remaining committed to helping lead the way in technology innovation through important global partnerships. “The bottom line is, the US has to show up and we have to engage more or less everywhere.”

The State Department's strategy will build on the National Cybersecurity Strategy released by the White House in May. That document notably held up “international partnerships” as one of its five principles, or “pillars.” 

Sub-themes called for the US to build coalitions to counter cyber threats, strengthen friendly countries’ capabilities for cyber defense, and defend complex, globe-spanning supply chains for technology. “The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace and advance policies that protect the integrity and security of the infrastructure of the Internet, serve US interests, promote competitiveness, and uphold democratic values." 

Fick also emphasised the importance of public-private partnerships as a necessity to advance the cyber security agenda of the US government. “I am a big proponent of finding ways to cross-pollinate between these worlds … as people think about the arc of their career, give a little time to public service.”

The new strategy will address the national security challenges, economic opportunities, and values considerations presented by cyberspace, digital technologies, and digital policy and promotes standards and norms that are fair, transparent, and support US values. 

What’s coming out won’t stray from those foundations, but it will build on it. “It is by definition a somewhat derivative document. .. but at the same time, we do think there is some conceptual new ground to break." Fick said.

US State Dept:   Billington Cyber Summit:   White House:   Breaking Defense:    Silicon:   Meritalk:

You Might Also Read: 

US Strategy Will Allow Hacking Criminal & Foreign Networks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Quadruple Extortion  Ransomware
Update: The 2023 Malware League Table »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

Stormshield

Stormshield

Stormshield is a European leader in digital infrastructure security. We offer smart, connected solutions in order to anticipate attacks and protect digital infrastructures.

Foresite

Foresite

Foresite is a global service provider, delivering a range of managed security and consulting solutions.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

Total Cyber-Sec

Total Cyber-Sec

Total Cyber-Sec is a company specialized in providing Professional Information Security and Cybersecurity Services.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training, and collaboration efforts between private and public sector stakeholders.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

Applaudo

Applaudo

Applaudo specializes in helping the world’s most admired brands optimize their IT solutions, reduce delivery costs, and accelerate their digital transformation.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.

KIT365

KIT365

KIT365 aim to protect organisations against cyber security attacks, by mitigating the risk to their systems and information, and protecting their data and reputation.