SlideShare a Scribd company logo
By Sandy Suhling
US Policy Timeline
 Department of Homeland Security established 2003
 National Cyber Security Division created 2003 (Bayuk
et al., 2012)
 National Strategy to Secure Cyberspace 2003
 Comprehensive National Cybersecurity Initiative 2008
(Office of Inspector General, 2010)
 Cyberspace Policy Review 2009
 International strategy for Cyberspace 2011
 PPD 23 2013
Discussion of how power relationships in the US government
have affected our cyber security policy
Circuits of Power: Episodic power
 Creation of DHS and its evolution (Dhillon, 2013)
 Effects on episodic power
 Cyber security not considered urgent
 Problem with Cyber Security leadership
 Executive Order 2013
Circuits of Power: Social Integration
 September 11th Terrorist attacks (Dhillon, 2013)
 Creation of Department of Homeland Security
 Homeland Security Act 2020
 Competition among DHS missions
 Desire to appear patriotic and loyal
Circuits of Power: System Integration
 Cyber Security Enhancement Act of 2002 (Dhillon, 2013)
 Resistance: privacy protection for citizens
 Stop Online Piracy Act of 2012
US Cyber Security Efficacy
 Lack of strong leadership
 Competition with other missions
 Threat not seen as visibly
 Keep coming up with strategies
 Need support of private sector
 Backing with resources
Possibilities for improvement
 Need for clear leadership
 Support from administration and private sector
 Regulations for government agencies and contractors
holding sensitive and classified information (OIG, 2012)
 Information security training program for government
employees relevant to varying roles, make available to
private sector
 Regulate government use of firewalls and physical server
security, recommendations for private sector
 Improved information sharing and cyber threats (Fischer et
al., 2013)
 Focus on private-public partnerships, incentives for private
sector adoption of cybersecurity measures
References
 Bayuk, J.L., Healey, J., Rohmeyer, P., Sachs, M. H., Schmidt, J.,
and Weiss, J. (2012). Cyber security policy guidebook. Hoboken,
NJ: John Wiley & Sons. Retrieved from
http://site.ebrary.com.proxy.library.vcu.edu/lib
/vacommonwealth/docDetail.action?docID=10630610
 Dhillon, G. (2013). Interprise cyber security: Principles and
practice. Washington, DC: Paradigm Books.
 Fischer, E.A., Liu, E.C., Rollins, J., and Theohary, C.A. (2013).
The 2013 cybersecurity executive order: Overview and
considerations for Congress. Congressional Research Service.
Retrieved from https://www.fas.org/sgp/crs/misc/R42984.pdf
 Office of Inspector General. (2010). DHS needs to improve the
security posture of its cybersecurity program systems.
Department of Homeland Security. Retrieved from
http://permanent.access.gpo.gov/gpo11236/OIG_10-
111_Aug10.pdf

More Related Content

What's hot

CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
HB Litigation Conferences
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck Brooks
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
katieingersoll
 
интернет
интернетинтернет
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
WilmerHale
 
SUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULESSUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULES
Gajendra Singh Thakur
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
Booz Allen Hamilton
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
Sarah Granger
 
Hybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logicHybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logic
Shakas Technologies
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
MIT Startup Exchange
 
Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
Caribbean Open Data Conference & Code Sprint
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
IJECEIAES
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
smita mitra
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityFOTIOS ZYGOULIS
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
john.niemela
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
Hector Dominguez
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerceAbegail Roberts
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez
 
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
MYO AUNG Myanmar
 

What's hot (20)

CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
интернет
интернетинтернет
интернет
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
SUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULESSUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULES
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
Hybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logicHybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logic
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
 
Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparency
 
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
 

Viewers also liked

National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Group Q
Group QGroup Q
Group Q
Arun Jacob
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)
Pankaj Bhambhani
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Investorideas.com
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Santosh Khadsare
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
Directorate of Information Security | Ditjen Aptika
 
PUBLIC POLICY: AN INTRODUCTION
PUBLIC POLICY: AN INTRODUCTIONPUBLIC POLICY: AN INTRODUCTION
PUBLIC POLICY: AN INTRODUCTION
Tanzania Public Service College
 

Viewers also liked (10)

National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Group Q
Group QGroup Q
Group Q
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
PUBLIC POLICY: AN INTRODUCTION
PUBLIC POLICY: AN INTRODUCTIONPUBLIC POLICY: AN INTRODUCTION
PUBLIC POLICY: AN INTRODUCTION
 

Similar to US Cyber Security Policy

WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
Denys A. Flores, PhD
 
Running head CYBER SECURITY .docx
Running head CYBER SECURITY                                  .docxRunning head CYBER SECURITY                                  .docx
Running head CYBER SECURITY .docx
susanschei
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
hartrobert670
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
Deris Stiawan
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
Deris Stiawan
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
randyburney60861
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
ijsptm
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safely
Alexander Decker
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docxLarry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
smile790243
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for Cyberwarfare
Aurin Sheikh
 
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docxWeeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
loganta
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
LaVerne Kemp
 
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDiCJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
VinaOconner450
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasion
iosrjce
 
E017242431
E017242431E017242431
E017242431
IOSR Journals
 

Similar to US Cyber Security Policy (20)

WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
 
Running head CYBER SECURITY .docx
Running head CYBER SECURITY                                  .docxRunning head CYBER SECURITY                                  .docx
Running head CYBER SECURITY .docx
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
 
softwss
softwsssoftwss
softwss
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safely
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docxLarry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
Larry KeaslerAs part of the nation’s 16 Critical Infrastructure .docx
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for Cyberwarfare
 
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docxWeeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
 
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDiCJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasion
 
E017242431
E017242431E017242431
E017242431
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

US Cyber Security Policy

  • 2. US Policy Timeline  Department of Homeland Security established 2003  National Cyber Security Division created 2003 (Bayuk et al., 2012)  National Strategy to Secure Cyberspace 2003  Comprehensive National Cybersecurity Initiative 2008 (Office of Inspector General, 2010)  Cyberspace Policy Review 2009  International strategy for Cyberspace 2011  PPD 23 2013
  • 3. Discussion of how power relationships in the US government have affected our cyber security policy
  • 4. Circuits of Power: Episodic power  Creation of DHS and its evolution (Dhillon, 2013)  Effects on episodic power  Cyber security not considered urgent  Problem with Cyber Security leadership  Executive Order 2013
  • 5. Circuits of Power: Social Integration  September 11th Terrorist attacks (Dhillon, 2013)  Creation of Department of Homeland Security  Homeland Security Act 2020  Competition among DHS missions  Desire to appear patriotic and loyal
  • 6. Circuits of Power: System Integration  Cyber Security Enhancement Act of 2002 (Dhillon, 2013)  Resistance: privacy protection for citizens  Stop Online Piracy Act of 2012
  • 7. US Cyber Security Efficacy  Lack of strong leadership  Competition with other missions  Threat not seen as visibly  Keep coming up with strategies  Need support of private sector  Backing with resources
  • 8. Possibilities for improvement  Need for clear leadership  Support from administration and private sector  Regulations for government agencies and contractors holding sensitive and classified information (OIG, 2012)  Information security training program for government employees relevant to varying roles, make available to private sector  Regulate government use of firewalls and physical server security, recommendations for private sector  Improved information sharing and cyber threats (Fischer et al., 2013)  Focus on private-public partnerships, incentives for private sector adoption of cybersecurity measures
  • 9. References  Bayuk, J.L., Healey, J., Rohmeyer, P., Sachs, M. H., Schmidt, J., and Weiss, J. (2012). Cyber security policy guidebook. Hoboken, NJ: John Wiley & Sons. Retrieved from http://site.ebrary.com.proxy.library.vcu.edu/lib /vacommonwealth/docDetail.action?docID=10630610  Dhillon, G. (2013). Interprise cyber security: Principles and practice. Washington, DC: Paradigm Books.  Fischer, E.A., Liu, E.C., Rollins, J., and Theohary, C.A. (2013). The 2013 cybersecurity executive order: Overview and considerations for Congress. Congressional Research Service. Retrieved from https://www.fas.org/sgp/crs/misc/R42984.pdf  Office of Inspector General. (2010). DHS needs to improve the security posture of its cybersecurity program systems. Department of Homeland Security. Retrieved from http://permanent.access.gpo.gov/gpo11236/OIG_10- 111_Aug10.pdf