SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
A Summary
Obama
Administration
• Even this president, who cared deeply about
cybersecurity and pushed his administration
to act, faced difficult problems in changing
things.
• The Obama administration made significant
progress but suffered from two conceptual
problems in its cybersecurity efforts.
• The first was a belief that the private sector
would spontaneously generate the solutions
needed for cybersecurity and minimize the
need for government action.
• The second was a misunderstanding of how
the federal government works. The point
that many observers miss is that there is no
such thing as the “government.” It is not a
single entity, but a conglomerate of Cabinet
departments and agencies, with different
missions, authorities, workforces, and
leadership.
Obama Record
• The 2015 Xi-Obama Summit agreement
on commercial cyber espionage seems to
have reduced Chinese commercial spying,
but its political and military espionage is
unabated, as a broader range of actors
have acquired and use cyber espionage
tools against the United States.
• The 2013 leaks by Edward Snowden also
changed the cybersecurity landscape. The
legitimacy of U.S. leadership in
cyberspace was damaged by Snowden,
and a lack of a dynamic American
response accelerated demands for
increased sovereignty and security at the
expense of U.S. companies and the multi-
stakeholder governance model.
Key Principles
• Two principles should guide cybersecurity:
creating consequences for foreign actors and
incentivizing domestic actors to provide
better cybersecurity.
• The creation of consequences for cyber crime,
espionage, and cyber attack and making these
consequences clear to malicious actors is the
most effective ways to reduce cyber risk
(especially if done in partnerships with
likeminded nations).
• Since risk cannot be completely eliminated,
better cybersecurity also requires holding key
critical infrastructures to high standards while
incentivizing basic improvements in the
general population of online actors.
• These tasks will require some additional
resources, but resources are not the major
obstacle to better cybersecurity; the major
obstacle has been and remains confusion
over the role of government and a lack of
will.
International
Strategy
• The next president needs to address two
major questions on the direction of
international cybersecurity: Is it time to
consider a more formal approach to
building security and stability in
cyberspace? And to what extent should an
expanded or even continued efforts to
build focus on agreement among
likeminded states.
• There has been some progress on getting
agreement on norms and confidence-
building measures, but this approach may
be of declining utility. The United States
needs a new strategy for better
coordination among likeminded nations,
for engaging “swing states” like Brazil and
India on cybersecurity issues, and a more
persuasive narrative for a global audience.
Budapest Convention on
Cybercrime
• The U.S. position is that the Budapest Convention on
Cybercrime provides a sufficient legal framework for
prosecuting cyber crime, and if nations would adopt the treaty,
we would all be better off.
• Russia refuses to sign because Moscow benefits from cyber
crime, and China, India, and Brazil refuse to sign because they
were not involved in the original negotiations and see the
convention as a fait accompli being forced upon them.
• We need to break the stalemate on the Budapest Convention.
• First, penalize in some way those countries that refuse to
cooperate with law enforcement.
• Second, find a new negotiating vehicle that preserves the
benefits of the convention but gives Brazil, India, and perhaps
China a new negotiation that provides them with the
opportunity to take their concerns into account.
Data Security
• The next administration should include
data protection as part of cybersecurity,
starting with the principle for federal
programs that “data belongs to the user.”
• It can build on existing efforts, including
the proposal for a Consumer Data Privacy
Framework and Federal Trade Commission
(FTC) efforts to enforce existing privacy
policies.
• One improvement would be for the
president to request the FTC to consolidate
and strengthen its activities by establishing
a Division of Data Protection, to provide
expert advice on data protection and
security.
• Another would be passage of national data
breach legislation.
• Increased transparency over data
breaches.
Private Sector
Response
• While cyber defense measures are
important, it is time to raise the cost to the
attacker through proportionate responses.
• Actions to impede the monetization of
stolen data and credentials.
• Accelerate the move to multifactor
authentication, using existing authorities to
reduce anonymity and improve attribution.
• Find better ways to counter and disrupt
botnets, a growing risk as more IOT devices
are connected to the Internet.
• Improve cyber hygiene by creating
standards much like generally accepted
accounting principles (GAAP) that would
let companies and agencies measure
performance.
Government
Roles
• Define and Focus the DHS Cyber
Mission.
• lead the national cyber defense to
protect critical infrastructure and
federal agencies, to mitigate the effect
of cyber attacks, and to ensure public
awareness of serious cyber threats.
• Make Cybersecurity an
Independent, Operational
Component at DHS.
• Use GAO to Provide Independent
Congressional Review of Federal
Agency Cybersecurity

Más contenido relacionado

La actualidad más candente

US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
barbeejl
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
andrewdyoung
 

La actualidad más candente (20)

Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital Diplomacy
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber Norms
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
hackivism
hackivismhackivism
hackivism
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in Taiwan
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
Marriage of Cyber Security with Emergency Management - Congress
Marriage of Cyber Security with Emergency Management  - CongressMarriage of Cyber Security with Emergency Management  - Congress
Marriage of Cyber Security with Emergency Management - Congress
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 

Destacado

Destacado (7)

CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Reputation Management in the Social Commerce Era
Reputation Management in the Social Commerce EraReputation Management in the Social Commerce Era
Reputation Management in the Social Commerce Era
 
10th Circuit's Amazon Tax Decision
10th Circuit's Amazon Tax Decision10th Circuit's Amazon Tax Decision
10th Circuit's Amazon Tax Decision
 
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyRand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
 
Social Media and Reputation Management for Small Firms
Social Media and Reputation Management for Small FirmsSocial Media and Reputation Management for Small Firms
Social Media and Reputation Management for Small Firms
 
Ethical Issues of Playing in the Social Media Sandbox
Ethical Issues of Playing in the Social Media SandboxEthical Issues of Playing in the Social Media Sandbox
Ethical Issues of Playing in the Social Media Sandbox
 
Social Media Marketing Do’s and Don’ts and Managing Your Online Reputation
Social Media Marketing Do’s and Don’ts and Managing Your Online ReputationSocial Media Marketing Do’s and Don’ts and Managing Your Online Reputation
Social Media Marketing Do’s and Don’ts and Managing Your Online Reputation
 

Similar a Cyber Security Agenda for 45th President

Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
Dominic Karunesudas
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurity
Paul Ferrillo
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
rrepko
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
briancrawford30935
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
Louise Collins
 
Module 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxModule 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docx
gilpinleeanna
 

Similar a Cyber Security Agenda for 45th President (20)

CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
SUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULESSUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULES
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurity
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
Cyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperCyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaper
 
Ac breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_webAc breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_web
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
Cybersecurity & data privacy whistleblower incentives and protections
Cybersecurity & data privacy whistleblower incentives and protectionsCybersecurity & data privacy whistleblower incentives and protections
Cybersecurity & data privacy whistleblower incentives and protections
 
Module 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxModule 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docx
 
Cyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal GapCyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal Gap
 
BT Cloud Security Whitepaper
BT Cloud Security WhitepaperBT Cloud Security Whitepaper
BT Cloud Security Whitepaper
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 

Más de Internet Law Center

Más de Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 

Último

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 

Cyber Security Agenda for 45th President

  • 2. Obama Administration • Even this president, who cared deeply about cybersecurity and pushed his administration to act, faced difficult problems in changing things. • The Obama administration made significant progress but suffered from two conceptual problems in its cybersecurity efforts. • The first was a belief that the private sector would spontaneously generate the solutions needed for cybersecurity and minimize the need for government action. • The second was a misunderstanding of how the federal government works. The point that many observers miss is that there is no such thing as the “government.” It is not a single entity, but a conglomerate of Cabinet departments and agencies, with different missions, authorities, workforces, and leadership.
  • 3. Obama Record • The 2015 Xi-Obama Summit agreement on commercial cyber espionage seems to have reduced Chinese commercial spying, but its political and military espionage is unabated, as a broader range of actors have acquired and use cyber espionage tools against the United States. • The 2013 leaks by Edward Snowden also changed the cybersecurity landscape. The legitimacy of U.S. leadership in cyberspace was damaged by Snowden, and a lack of a dynamic American response accelerated demands for increased sovereignty and security at the expense of U.S. companies and the multi- stakeholder governance model.
  • 4. Key Principles • Two principles should guide cybersecurity: creating consequences for foreign actors and incentivizing domestic actors to provide better cybersecurity. • The creation of consequences for cyber crime, espionage, and cyber attack and making these consequences clear to malicious actors is the most effective ways to reduce cyber risk (especially if done in partnerships with likeminded nations). • Since risk cannot be completely eliminated, better cybersecurity also requires holding key critical infrastructures to high standards while incentivizing basic improvements in the general population of online actors. • These tasks will require some additional resources, but resources are not the major obstacle to better cybersecurity; the major obstacle has been and remains confusion over the role of government and a lack of will.
  • 5. International Strategy • The next president needs to address two major questions on the direction of international cybersecurity: Is it time to consider a more formal approach to building security and stability in cyberspace? And to what extent should an expanded or even continued efforts to build focus on agreement among likeminded states. • There has been some progress on getting agreement on norms and confidence- building measures, but this approach may be of declining utility. The United States needs a new strategy for better coordination among likeminded nations, for engaging “swing states” like Brazil and India on cybersecurity issues, and a more persuasive narrative for a global audience.
  • 6. Budapest Convention on Cybercrime • The U.S. position is that the Budapest Convention on Cybercrime provides a sufficient legal framework for prosecuting cyber crime, and if nations would adopt the treaty, we would all be better off. • Russia refuses to sign because Moscow benefits from cyber crime, and China, India, and Brazil refuse to sign because they were not involved in the original negotiations and see the convention as a fait accompli being forced upon them. • We need to break the stalemate on the Budapest Convention. • First, penalize in some way those countries that refuse to cooperate with law enforcement. • Second, find a new negotiating vehicle that preserves the benefits of the convention but gives Brazil, India, and perhaps China a new negotiation that provides them with the opportunity to take their concerns into account.
  • 7. Data Security • The next administration should include data protection as part of cybersecurity, starting with the principle for federal programs that “data belongs to the user.” • It can build on existing efforts, including the proposal for a Consumer Data Privacy Framework and Federal Trade Commission (FTC) efforts to enforce existing privacy policies. • One improvement would be for the president to request the FTC to consolidate and strengthen its activities by establishing a Division of Data Protection, to provide expert advice on data protection and security. • Another would be passage of national data breach legislation. • Increased transparency over data breaches.
  • 8. Private Sector Response • While cyber defense measures are important, it is time to raise the cost to the attacker through proportionate responses. • Actions to impede the monetization of stolen data and credentials. • Accelerate the move to multifactor authentication, using existing authorities to reduce anonymity and improve attribution. • Find better ways to counter and disrupt botnets, a growing risk as more IOT devices are connected to the Internet. • Improve cyber hygiene by creating standards much like generally accepted accounting principles (GAAP) that would let companies and agencies measure performance.
  • 9. Government Roles • Define and Focus the DHS Cyber Mission. • lead the national cyber defense to protect critical infrastructure and federal agencies, to mitigate the effect of cyber attacks, and to ensure public awareness of serious cyber threats. • Make Cybersecurity an Independent, Operational Component at DHS. • Use GAO to Provide Independent Congressional Review of Federal Agency Cybersecurity