Cybersecurity After Information Sharing
Increasing the sharing of cyber threat intelligence has been the main focus of the US Government’s strategy to enhance the cyber posture of the United States. With the passage of the 2015 Cybersecurity Act, what are the next steps that Congress and the incoming administration should take to successfully implement the legislation and to shore up the US cybersecurity posture?
Among other issues, the panelists will discuss:
- How can the administration and Congress work together to shape the implementation of the 2015 Cybersecurity Act?
- How can the primary programs that deliver cybersecurity to the Federal civilian government and critical infrastructure be shaped to improve the overall cybersecurity posture?
- What are the steps the U.S. government and private actors can take, beyond information sharing, to counter the threats?
- How does a modern, centralized cloud-based architecture foreseen in CNAP for the federal government and agencies provide essential long-term cost saving and security improvements?
Photo credit: Patrick McDermott/Getty Images