New National Cyber Strategy Message: Deterrence Through U.S. Strength

The best defense is a good offense. That well-known sports saying is true not only in football but also in cybersecurity.

And according to the National Cyber Strategy of the United States of America, just released by the Trump administration on Sept. 20, 2018, the need to deter adversaries through cybersecurity strength is paramount.   

In pronouncing the “First fully articulated cyber strategy for the United States since 2003,” the White House press release also highlighted actions that President Trump has taken so far on cybersecurity.  

The briefing statements on the cyberstrategy began with this quote from Trump describing the reason the strategy is needed: We must protect the American people, the homeland, and our great American way of life.”

“The Administration recognizes that the United States is engaged in a continuous competition against strategic adversaries, rogue states, and terrorist and criminal networks. Russia, China, Iran, and North Korea all use cyberspace as a means to challenge the United States, its allies, and partners, often with a recklessness they would never consider in other domains. These adversaries use cyber tools to undermine our economy and democracy, steal our intellectual property, and sow discord in our democratic processes. …”

The new strategy includes four main pillars of priority:

  • Pillar I: Protect the American People, the Homeland, and the American Way of Life by securing federal networks and information, securing critical infrastructure, combating cybercrime and improving incident reporting.
  • Pillar II: Promote American Prosperity by fostering a vibrant and resilient digital economy, fostering and protecting U.S. ingenuity and developing a superior U.S. workforce.
  • Pillar III: Preserve Peace through Strength by enhancing cyber stability through norms of responsible state behavior and attributing and deterring unacceptable behaviors in cyberspace.
  • Pillar IV: Advance American Influence by promoting an open, interoperable, (Read more...)

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: