The rise of the People’s Republic China as a peer competitor vying for superpower status has emerged as an important challenge for the United States. To confront this competition, policy and decision makers must preserve and extend U.S. global interests to deter China if necessary and work in the international system in which the United States plays a vital role.
As a result of recent federal legislative and administrative activity, government agencies are expected to launch significant modernizations of their cybersecurity systems, get offensive with hackers and take a more strategic approach to risk. Combined, these policy directives promise to transform our government into a robust digital society, gaining greater resiliency to cyber threats by leveraging opportunities while reinforcing standards and procedures.
Here’s a breakdown of the key components of the four policies:
Operating in a relatively new operations domain, cyber fighters are coping with a wide range of challenges, including lack of training and still-to-be-defined policies, doctrines and authorities.
The Internet isn't any safer now than in 1982 when it began as a four-node network connecting a handful of U.S. Defense Department academics to exchange digital files. This revelation comes despite efforts over the years to patch holes and conceive mighty notions that safe Internet usage is achievable. In his viewpoint article, "Cybersecurity Policy and Strategy Need a Dose of Reality" by Contributing Editor Col. Alan D.