www.cybersecuritydive.com
Open in
urlscan Pro
2606:4700::6812:d05
Public Scan
Submitted URL: https://em.mend.io/NDM5LURGRi03MDQAAAGNDWyD5M2mu5LlJ1eXdp6eRLgqZCyEPkN7uGizGyENidGB9zt0WDUmnbI72Em4ofRxWZRFir8=
Effective URL: https://www.cybersecuritydive.com/news/national-cybersecurity-strategy-implementation-plan/686887/?mkt_tok=NDM5LURGRi03MDQAAAGNDWy...
Submission: On July 19 via api from US — Scanned from DE
Effective URL: https://www.cybersecuritydive.com/news/national-cybersecurity-strategy-implementation-plan/686887/?mkt_tok=NDM5LURGRi03MDQAAAGNDWy...
Submission: On July 19 via api from US — Scanned from DE
Form analysis
8 forms found in the DOMName: signup-inter-form — POST /signup/
<form id="signup-inter-form" class="form-basic" name="signup-inter-form" action="/signup/" method="POST">
<input type="hidden" name="signup_box_location" value="interstitial">
<input type="hidden" name="signup_initial_url_path" value="/">
<h1> Don’t miss tomorrow’s Cybersecurity industry news </h1>
<p class="interstitial-text"> Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox. </p>
<p class="form-error__message" id="interstitial-error"></p>
<div id="form-interstitial">
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_cff2de_email">
<div id="newsletter-list-section">
</div>
<div id="interstitial-consent-container">
<input name="user_consent" value="1" id="id_user_consent" type="checkbox">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</div>
</div>
<input id="signup-inter-submit" class="email_submit submit button" type="submit" data-role="none" value="Subscribe today">
</form>
GET /search/
<form action="/search/" method="GET" data-ajax="false">
<label for="search-desktop">
<span class="screen-reader-text search">Search</span>
</label>
<input id="search-desktop" type="search" name="q" placeholder="Search" data-role="none">
<button type="submit" value="" data-role="none" class="analytics t-search-navigation-drawer">
<img src="/static/img/menu_icons/search.svg?320116291121" alt="search" height="16" width="16" loading="lazy">
</button>
<img class="close" src="/static/img/menu_icons/close.svg?273117231121" width="16" height="16" alt="close search" loading="lazy">
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST" target="_blank">
<label for="id_a34150_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_a34150_email">
</label>
<input type="hidden" name="signup_box_location" value="inline">
<input type="hidden" name="signup_initial_url_path" value="/news/national-cybersecurity-strategy-implementation-plan/686887/">
<input type="hidden" name="js_enabled" value="1" id="id_a34150_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-inline" value="1" class="checkbox">
<label for="id_user_consent-inline">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
<label for="id_f8542e_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_f8542e_email">
</label>
<input type="hidden" name="signup_box_location" value="elevated_footer">
<input type="hidden" name="signup_initial_url_path" value="/news/national-cybersecurity-strategy-implementation-plan/686887/">
<input type="hidden" name="js_enabled" value="1" id="id_f8542e_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-elevated_footer" value="1" class="checkbox">
<label for="id_user_consent-elevated_footer">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
<label for="id_29bdce_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_29bdce_email">
</label>
<input type="hidden" name="signup_box_location" value="sidebar">
<input type="hidden" name="signup_initial_url_path" value="/news/national-cybersecurity-strategy-implementation-plan/686887/">
<input type="hidden" name="js_enabled" value="1" id="id_29bdce_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-sidebar" value="1" class="checkbox">
<label for="id_user_consent-sidebar">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
<label for="id_6cea2_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_6cea2_email">
</label>
<input type="hidden" name="signup_box_location" value="elevated_footer">
<input type="hidden" name="signup_initial_url_path" value="/news/national-cybersecurity-strategy-implementation-plan/686887/">
<input type="hidden" name="js_enabled" value="1" id="id_6cea2_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-elevated_footer" value="1" class="checkbox">
<label for="id_user_consent-elevated_footer">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
GET /search/
<form action="/search/" method="GET" data-ajax="false">
<label for="search-mobile">
<span class="screen-reader-text">Search</span>
<input id="search-mobile" type="search" name="q" placeholder="Search" data-role="none">
</label>
<button type="submit" value="" data-role="none" class="analytics t-search-navigation-mobile">
<img src="/static/img/menu_icons/search.svg?320116291121" width="15" height="15" alt="search">
</button>
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
<label for="id_dd0bab_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_dd0bab_email">
</label>
<input type="hidden" name="signup_box_location" value="integrated_menu">
<input type="hidden" name="signup_initial_url_path" value="/news/national-cybersecurity-strategy-implementation-plan/686887/">
<input type="hidden" name="js_enabled" value="1" id="id_dd0bab_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-integrated_menu" value="1" class="checkbox">
<label for="id_user_consent-integrated_menu">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
Text Content
Skip to main content CONTINUE TO SITE ➞ DON’T MISS TOMORROW’S CYBERSECURITY INDUSTRY NEWS Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox. By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. * Deep Dive * Library * Press Releases * Topics Menu * Search * Sign up Search * Strategy * Breaches * Vulnerability * Cyberattacks * Threats * Leadership & Careers * Policy & Regulation An article from WHITE HOUSE SHARES THE 69 INITIATIVES SLATED TO SHORE UP NATIONAL CYBERSECURITY “If the strategy represents the president’s vision for the future, then this implementation plan is the roadmap to get there,” Acting National Cyber Director Kemba Walden said. Published July 13, 2023 Matt Kapko Reporter * * * * * Kemba Walden, acting national cyber director, rolls out the National Cybersecurity Strategy at a forum by the Center for Strategic and International Studies. Permission granted by Office of the National Cyber Director The Biden administration released its implementation plan for the national cybersecurity strategy Thursday, delegating cyber initiatives to a smattering of government agencies. The plan, which is designed to guide the government’s completion of the national cybersecurity strategy, comes four months after the policy blueprint was unveiled. “If the strategy represents the president’s vision for the future, then this implementation plan is the roadmap to get there,” Kemba Walden, acting national cyber director, said Wednesday during a press briefing. “Fundamentally, we are publishing this plan because we will only achieve our goals with a whole of society approach,” Walden said. Access now➔ Trendline HOW CISOS ARE SECURING THE CLOUD The ubiquity of the cloud has left security gaps for organizations, leaving them to navigate a complex vendor landscape and defend their technology supply chain Access now➔ Trendline HOW CISOS ARE SECURING THE CLOUD The ubiquity of the cloud has left security gaps for organizations, leaving them to navigate a complex vendor landscape and defend their technology supply chain The White House hopes the implementation plan will help organizations and individuals understand where they can collaborate with the federal government to achieve the national cybersecurity strategy goals, Walden said. The 57-page document divides the five pillars and 27 objectives of the national cybersecurity plan into a broader series of initiatives. While the implementation plan calls for the majority of initiatives to be completed before the end of fiscal year 2024, 11 are slated to be done in FY23, which closes at the end of September. More than half of the 69 initiatives are slated for completion in the U.S. government’s FY24. Another 20 are scheduled for FY25 and two in FY26. A core tenet of the national cybersecurity strategy calls for the technology sector to assume greater responsibility for security on software, hardware and platforms. Buoying that is an effort to scale public-private collaboration to drive the development and adoption of secure-by-design and secure-by-default technology, which is slated for completion next year. Cyber authorities have consistently encouraged technology vendors to build products in a way that prevents the need for customers to constantly perform monitoring, routine updates and damage control on their systems to mitigate cyber intrusions. Meaningful change requires technology manufacturers and vendors to revamp design and development programs, and place a much greater priority on security. A single responsible agency will lead each of the 69 initiatives, with 18 different agencies leading at least one initiative. The initiatives also designate contributing agencies and a timeline for completion. The implementation plan will be updated annually and initiatives will be added to meet evolving demands and removed after completion. Access now➔ Trendline HOW CISOS ARE SECURING THE CLOUD The ubiquity of the cloud has left security gaps for organizations, leaving them to navigate a complex vendor landscape and defend their technology supply chain Keep up with the story. Subscribe to the Cybersecurity Dive free daily newsletter Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter. “The implementation plan does not capture all of the cybersecurity activities in the federal government nor does it intend to do,” Walden said. “What it does do is capture key initiatives that we must get done in the near term on the path to achieving the president’s vision.” * post * share * tweet * print * email Filed Under: Strategy, Policy & Regulation CYBERSECURITY DIVE NEWS DELIVERED TO YOUR INBOX Get the free daily newsletter read by industry experts Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter. EDITORS’ PICKS * Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images CISA REVISES CYBERSECURITY PERFORMANCE GOALS After months of feedback from stakeholders, the agency made changes to better align with the NIST framework and update language on MFA. By David Jones • March 22, 2023 * WhataWin via Getty Images WHAT WE KNOW ABOUT THE MOVEIT VULNERABILITIES AND COMPROMISES Active exploits already resulted in a follow-on attack that’s impacted multiple organizations. Threat hunters are on guard and anticipate more victims. By Matt Kapko • Updated June 12, 2023 Access now➔ Trendline HOW CISOS ARE SECURING THE CLOUD The ubiquity of the cloud has left security gaps for organizations, leaving them to navigate a complex vendor landscape and defend their technology supply chain GET THE FREE NEWSLETTER Subscribe to Cybersecurity Dive for top news, trends & analysis Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter. MOST POPULAR 1. Deep Dive MOVEit mass exploit timeline: How the file-transfer service attacks entangled victims 2. White House unveils consumer labeling program to strengthen IoT security 3. UKG agrees to pay up to $6M in lawsuit tied to 2021 breach 4. Microsoft offers free security logs amid backlash from State Department hack LIBRARY RESOURCES * Trendline How CISOs are securing the cloud Supported by BDO * Webinar - on demand How Organizations Balance Security & Software Development Custom content for Snyk * Webinar - on demand The Top Cybersecurity Risks Keeping Financial Leaders Up at Night Custom content for RSM US LLP View all COMPANY ANNOUNCEMENTS * DigiCert Enhances DigiCert® DNS Trust Manager Speeds with New Point of Presence in Atlanta From DigiCert * GraVoc Expands Information Security Practice With Acquisition of Security Management Partners … From GraVoc * Nudge Security helps organizations embrace generative AI while mitigating risk From Nudge Security * Introducing Agentless AWS Vulnerability Scanning with New Runecast SaaS From Runecast Solutions Ltd. View all | Post a press release CYBERSECURITY DIVE NEWS DELIVERED TO YOUR INBOX Get the free daily newsletter read by industry experts Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter. COMPANY ANNOUNCEMENTS View all | Post a press release DigiCert Enhances DigiCert® DNS Trust Manager Speeds with New Point of Presence in Atlanta From DigiCert June 28, 2023 GraVoc Expands Information Security Practice With Acquisition of Security Management Partners … From GraVoc July 07, 2023 Nudge Security helps organizations embrace generative AI while mitigating risk From Nudge Security July 18, 2023 Introducing Agentless AWS Vulnerability Scanning with New Runecast SaaS From Runecast Solutions Ltd. July 18, 2023 Editors’ picks * Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images CISA REVISES CYBERSECURITY PERFORMANCE GOALS After months of feedback from stakeholders, the agency made changes to better align with the NIST framework and update language on MFA. By David Jones • March 22, 2023 * WhataWin via Getty Images WHAT WE KNOW ABOUT THE MOVEIT VULNERABILITIES AND COMPROMISES Active exploits already resulted in a follow-on attack that’s impacted multiple organizations. Threat hunters are on guard and anticipate more victims. By Matt Kapko • Updated June 12, 2023 Latest in Strategy * Microsoft offers free security logs amid backlash from State Department hack By David Jones * GoTo, parent company to LastPass, names new CISO By Matt Kapko * White House shares the 69 initiatives slated to shore up national cybersecurity By Matt Kapko * Cybersecurity funding drops sharply in Q2 By David Jones -------------------------------------------------------------------------------- * * * * EXPLORE * About * Editorial Team * Contact Us * Newsletter * Article Reprints * Press Releases * What We’re Reading REACH OUR AUDIENCE * Advertising * Post a press release RELATED PUBLICATIONS * CIO Dive -------------------------------------------------------------------------------- image/svg+xml Industry Dive is an Informa business © 2023 Industry Dive. All rights reserved. | View our other publications | Privacy policy | Terms of use | Take down policy. Cookie Preferences / Do Not Sell Search * Home * Topics * Strategy * Breaches * Vulnerability * Cyberattacks * Threats * Leadership & Careers * Policy & Regulation * Deep Dive * Library * Press Releases GET CYBERSECURITY DIVE IN YOUR INBOX The free newsletter covering the top industry headlines Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter.