• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

How Will President Trump Deal With Cyber Security?

Now that the presidential election is over, how will President Elect Donald Trump deal with cybersecurity.

November 13, 2016 Keith Lowry and Chris Pogue 1 Comment

It’s finally over! A long, contentious, and tumultuous Presidential election is finally behind us. While both candidates have, at some point, touched upon the concept of cybersecurity—Mrs. Clinton and the widely publicized email server on one hand, Mr. Trump and his calls for Russian hackers on the other—neither candidate laid out a comprehensive plan for cybersecurity under their administration.

Now that Mr. Trump is set to take the oath of office in January, we’re asking the President-elect to seriously consider our data’s security at the federal level.

Expanded Cabinet Influence

It’s well-documented that the battleground of the future will be digital as much as physical. President Obama even went so far as to call it the fifth domain of warfare. We can’t begin to fight in that arena unless someone who has real-world, practical expertise is advising the President about federal policy and emergency defensive measures. The White House announced it had created the position a Federal Chief Information Security Officer (CISO) on September 8, 2016. This was an action item from the Cybersecurity National Action Plan (CNAP) earlier in the year.

This is a great step in the right direction, one we hope will see continued momentum in the new administration. A Federal CISO, however, only addresses one component of the entire cybersecurity picture. Appointing a new cabinet position—a Secretary of Cybersecurity—whom the Federal CISO and other experts are accountable to would be a powerful statement. It would be an effective way to ensure that national cybersecurity policy is well informed and has a reasonable chance to succeed.

Standardize Data Breach Notification Requirements

Organizations in the United States must understand and adhere to up to 47 different state breach disclosure notification laws. That’s right, forty-seven. A federal standard would go a long way toward simplifying the process for organizations that happen to be compromised, yet no federal legislation is anywhere in sight. This feels like a relatively easy win for the new administration to champion.

Engage Private-sector Expertise

Government leadership is great, but policy decisions have a far-reaching effect on the private sector as well. These organizations have their own concerns and needs that don’t always align with government perceptions about security. For the big decisions and policy discussions, the government should engage security experts and leaders from the private sector to ensure that legislation benefits all the industries it affects directly.

The Commission on Enhancing National Cybersecurity and the Cybersecurity Strategy and Implementation Plan are a start but we have a long way to go. As part of this effort, the federal government should move national cybersecurity programs out of the intelligence world. Security clearances and other barriers to cooperation and collaboration make it difficult for intelligence agencies to communicate with private-sector experts. These artificial barriers do nothing but harm what should be a mutual partnership.

Take Your Own Medicine

The federal government faces persistent threats that pose strategic, economic, and security challenges to our nation every day. To address these threats the government must boldly reassess the way it approaches security and significantly invest in critical testing, staff, and tools. These threats demand that we continue to enhance the security of the federal digital infrastructure and improve the ability to detect and respond to incidents as they occur.

For starters, all government systems should be tested with the realism of military training exercises. This means abandoning token penetration tests and conducting some down-and-dirty “I don’t care who gets offended” tests that will shine a spotlight on any vulnerabilities the testing happens to find.

Pages: Page 1 Page 2

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Corporate, Cyber Security, Policy

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Comments

  1. Download imessage says

    November 24, 2016 at 5:09 am

    Really great news!!! this information is well worth looking everyone. Good tips. I will be sharing this with all of my friends! Thank you for sharing valuable information.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.