US National Cyber Defense Policy

The US Senate will vote on its version of the 2021 defense authorisation bill in the near future. US Joint Cyber Planning has proposed an amendment to the 2021 defense policy bill which aims to help government and private actors to respond quickly to cyber attacks mounted from Russia, China and elsewhere. 

The spending  package authorises $740 billion for the military and it allocates an extra $15 million to the Cybersecurity and Infrastructure Security Agency (CISA) which for tye first timewill be required to report on risks posed by the use of technology from Huawei, whose 5G networking products are widely used around the world and which is increasingly regarded in the US as a security threat

Right now, US companies are largely on their own for cyber security defense. even in responding to big incidents and there is little coordination between the government and the private sector. For exmaple, the US government may have known as early as 2015 about Russians’ presence on servers belonging to the Democratic National Committee, however, it wasn’t until July 2018, nearly two years after the release of information stolen from the DNC, that the NSA announced the formation of a group to counter aggressive Russian cyber activities.

There’s a lot of room for improvement in coordinating public and private cyber responses.

Ex-Democrat party Presidential candidate Senator Bernie Sanders wants to find out what is going on inside the Pentagon.and has tabled an amendment that woud require the Pentagon comptroller to issue guidance that would incentivise different agencies and services for audit achievements.

These recommendation arise from the Cyberspace Solarium Commission  report on legidative proposals and is expected to have broad bipartisan support in Congress.

Reuters:       DefenseOne:       Federal News Network:    Solarium Commission:        JDSupra

You Might Also Read:

US Cyber Command Is A Tool Of Foreign Policy:

 

« Use Machine Learning To Predict What Is Most Likely To Be Exploited.
Home Working Cyber Security Toolkit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IronScales

IronScales

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

Xscale Accelerator

Xscale Accelerator

Xscale's vision is to create world-class startups out of India by transforming sales and providing access to global markets.

Datastream Cyber Insurance

Datastream Cyber Insurance

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.

CloudGuard

CloudGuard

CloudGuard is an AI-driven XDR platform that helps organisations to proactively detect and automatically remediate threats in real-time.

Relatech

Relatech

Relatech is a Digital Enabler Solution Knowledge (D.E.S.K.) Company that offers digital services and solutions dedicated to the digital transformation of businesses.

Hiya

Hiya

Hiya's mission is to secure voice with trust, identity and intelligence. We're protecting people from spam and fraud calls, and helping carriers secure their networks for all.