• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

How Will President Trump Deal With Cyber Security?

Now that the presidential election is over, how will President Elect Donald Trump deal with cybersecurity.

November 13, 2016 Keith Lowry and Chris Pogue 1 Comment

The litany of security vulnerabilities this testing will reveal need to be addressed, and quickly. There can be no “risk acceptances” here—these vulnerabilities pose a real threat to the security of our country and the government needs to treat them as such.

Finally, the military analogy holds for ongoing testing and training exercises. Government security teams need to “train the way we fight” and continually hone their defensive skills. Offensive security advances (the bad guys) have long outpaced defensive countermeasures. Unless we start doing things differently, this will be the case for years to come. There’s no better time than now to change the game.

Educate, Educate, Educate

Government education programs must place a greater emphasis on computer science, engineering, and cybersecurity. Education is central in acknowledging, confronting, and reducing the threat that cybercrime poses to the government and, but virtue of that, to the rest of the country. The new administration should take seriously the measures provided by the Federal Cybersecurity Workforce Strategy and its dedication to education.

Recognize the Threat Isn’t Only External

Foreign nation states, shadowy hackers, and cyberterrorists aren’t the only ones trying to steal or destroy our data. Insider threats are just as likely to be guilty of wrongdoing as these external malefactors.

A thorough defense-in-depth program needs to account for all potential bad actors; insider threats require a different type of approach to detect and counter.

Embrace the Five Eyes

Information threats span the globe. We need to build greater cooperation with the other “Five Eyes” countries— Australia, Canada, New Zealand, and the United Kingdom—and expand programs in cybersecurity collaboration to include training, education, and testing. A multinational taskforce could more fully take advantage of the resources each nation brings to the table.

It’s Time to Act, Sooner Than Later

The security and technology landscape is not standing still for anyone, even the President of the United States. We recognize the President-elect has many issues that are equally pressing and important to tackle. However, we can’t stress enough just how important it is for Mr. Trump to show cybersecurity leadership at this time. It wasn’t a major plank in any of the election platforms, but it needs to be a key area of focus in this next administration before an attack happens that cripples the nation.

That power is there but so is the power to take a positive stance against it. That’s our greatest wish—Mr. Trump, please take this issue seriously. The fate of our nation truly depends on it.

Keith Lowry is Senior Vice President of Nuix. Chris Pogue is Chief Information Security Officer at Nuix.

This article was first published at Nuix.

Pages: Page 1 Page 2

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Corporate, Cyber Security, Policy

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Comments

  1. Download imessage says

    November 24, 2016 at 5:09 am

    Really great news!!! this information is well worth looking everyone. Good tips. I will be sharing this with all of my friends! Thank you for sharing valuable information.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.