{"id":25166,"date":"2023-04-13T11:55:10","date_gmt":"2023-04-13T09:55:10","guid":{"rendered":"https:\/\/stage-fp.webenv.pl\/blog\/?p=25166"},"modified":"2023-04-13T11:55:11","modified_gmt":"2023-04-13T09:55:11","slug":"usa-significant-shifts-in-cybersecurity-policy-ahead","status":"publish","type":"post","link":"https:\/\/www.future-processing.com\/blog\/usa-significant-shifts-in-cybersecurity-policy-ahead\/","title":{"rendered":"USA: significant shifts in cybersecurity policy ahead"},"content":{"rendered":"\n<p>The <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2023\/03\/National-Cybersecurity-Strategy-2023.pdf\" rel=\"noopener\">National Cybersecurity Strategy<\/a> replaces the old document issued by the Trump administration 5 years ago and <strong>aims to protect both national security and public safety as well as economic prosperity.<\/strong><\/p>\n\n\n    <div class=\"b-image js-lightbox\">\n        <figure class=\"b-image__figure\">\n            <a\n                href=\"USA-cybersecurity-shift-5-pillars-future-processing.jpg\"\n                class=\"js-lightbox__trigger\"\n                aria-haspopup=\"dialog\"\n                data-elementor-open-lightbox=\"no\"\n            >\n                <img fetchpriority=\"high\" decoding=\"async\" width=\"960\" height=\"1040\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing.jpg\" class=\"attachment-full size-full\" alt=\"USA cybersecurity shift 5 pillars future processing\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing.jpg 960w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing-277x300.jpg 277w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing-945x1024.jpg 945w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing-768x832.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing-369x400.jpg 369w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/>            <\/a>\n                    <\/figure>\n        <div\n    class=\"js-lightbox__dialog o-lightbox\"\n    role=\"dialog\"\n    aria-modal=\"true\"\n    aria-hidden=\"true\"\n    tabindex=\"-1\"\n>\n    <div class=\"o-lightbox__dialog\">\n        <div class=\"o-lightbox__content js-lightbox__content\" role=\"document\">\n            <button\n                class=\"o-button o-button--xs o-button--dark o-button--icon-right o-button--tertiary o-lightbox__close js-lightbox__close m-gradient-brand\"\n            >\n                Close picture                <svg class='o-icon o-icon--16 o-icon--timescircle '>\n            <use xlink:href='#icon-16_times-circle'><\/use>\n          <\/svg>            <\/button>\n                                            <figure class=\"o-lightbox__image is-active\">\n                    <img fetchpriority=\"high\" decoding=\"async\" width=\"960\" height=\"1040\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing.jpg\" class=\"attachment-full size-full\" alt=\"USA cybersecurity shift 5 pillars future processing\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing.jpg 960w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing-277x300.jpg 277w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing-945x1024.jpg 945w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing-768x832.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/USA-cybersecurity-shift-5-pillars-future-processing-369x400.jpg 369w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/>                                    <\/figure>\n                    <\/div>\n    <\/div>\n<\/div>\n    <\/div>\n\n\n\n<p>What we want to focus on today is point no. 3 &#8211; <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">place responsibility for cybersecurity on tech companies,<\/mark><\/strong> which pertains to all software companies operating in the American market.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Software companies to be responsible for security<\/h2>\n\n\n\n<p>What the new cybersecurity strategy emphasizes is <strong>the need for the private sector to take far greater responsibility for the software that they create<\/strong> \u2014 in order to assure that their <strong>systems are well-protected against cyber criminals. <\/strong>More responsibility will be demanded from larger and better-resourced organizations in particular \u2014 incorporating minimum security standards into their products will be a must.<\/p>\n\n\n\n<p>This is <strong>a matter of both private and public security, <\/strong>since hackers are often backed by China, Russia or North Korea, and not letting them get into any critical networks is absolutely essential in terms of both politics and economics.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>The most significant shift over decades<\/h2>\n\n\n\n<p>As of yet, the <em>modus operandi <\/em>has been quite different from what it is going to look like soon: right now, if there are any flaws or weaknesses within a security system, <strong>the client (whether this is a private person or business entity) currently assumes all of the risks.<\/strong><\/p>\n\n\n\n<p>They are responsible for not updating the software solutions that they use, and the creators cannot be punished for the mistakes that they made. In short, if you were unlucky and lost something \u2014 that\u2019s too bad,<em> c\u2019est la vie<\/em> \u2014 it\u2019s your own fault though, so do better next time.<\/p>\n\n\n\n<p>Now <strong>the U.S. government has decided to take a step back and ask why the system needed to be updated in the first place<\/strong> and what actually happened to make the software so vulnerable. Maybe the minimum required standards weren\u2019t met\u2026? Maybe the makers of the software unnecessarily jeopardized their clients\u2019 safety due to carelessness or oversight?<\/p>\n\n\n\n<p><strong>The responsibility for software security is therefore to be transferred to those who actually created the software, <\/strong>and not to those who use it. In other words, the most vulnerable party will be better protected, and the most powerful \u2014 finally liable for their actions (or lack of actions, to be more precise).\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>The end of the &#8216;optional&#8217; era, without any real obligations<\/h2>\n\n\n\n<p>For years, companies have been told that they can voluntarily report hacking attempts and intrusions, but <strong>it hasn\u2019t been required of them.<\/strong> Also, they have been allowed to simply patch their systems in order to fix detected vulnerabilities. However, as Anne Neuberger, the deputy national security adviser for cyber and emerging technologies, has <a href=\"https:\/\/www.nytimes.com\/2023\/03\/02\/us\/politics\/biden-cybersecurity-strategy.html\" rel=\"noopener\">said<\/a>: <\/p>\n\n\n<div class=\"b-quotation\">\n    <div class=\"o-quote o-quote--left\">\n        <svg class=\"o-quote__icon\">\n            <use xlink:href=\"#quotation-mark\"><\/use>\n        <\/svg>\n        <div\n            class=\"o-quote__text o-quote__text--italic f-paragraph\"\n        >\n            <div>\n                The fundamental recognition in the strategy is that a voluntary approach to securing [critical infrastructure and networks] is inadequate.            <\/div>\n        <\/div>\n        <div class=\"o-quote__author\">\n                                        <div class=\"o-quote__author-info\">\n                    <div class=\"o-quote__author-name\">\n                        <div>\n                            Anne Neuberger                        <\/div>\n                    <\/div>\n                    <div\n                        class=\"o-quote__author-position\"\n                    >\n                        <div>\n                            the deputy national security adviser for cyber and emerging technologies                        <\/div>\n                    <\/div>\n                <\/div>\n                    <\/div>\n    <\/div>\n<\/div>\n\n\n\n<p><strong>This shift in attitude is quite significant, <\/strong>and also necessary in order to make the entire ecosystem both easier to defend and much more resilient against any cyber threats. And this is also consistent with the political narrative of <a href=\"https:\/\/berthub.eu\/articles\/posts\/eu-cra-secure-coding-solution\/\" rel=\"noopener\">the EU<\/a> and <a href=\"https:\/\/www.itnews.com.au\/news\/gov-flags-possible-tech-sector-liability-for-cyber-security-592391?mod=djemCybersecruityPro&amp;tpl=cy\" rel=\"noopener\">Australia<\/a> \u2014 the western world seems to be pretty unanimous in their efforts to ensure digital safety. But this comes as no surprise, since these days, <strong>this translates directly into national and international security, and from the lowest to the highest levels.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Possible consequences<\/h2>\n\n\n\n<p>Of course, one of the most important aspects of this shift is <strong>the penalties that could be imposed on the companies that don\u2019t comply.<\/strong> As far as we know, <strong>the disciplinary mechanisms from GDPR or NIS2<\/strong> are going to be put in place, meaning that organizations will have to pay high fines for not meeting the minimum standards of security and endangering their clients. Should they be worried? Not at all \u2014 as long as they take a good approach and follow proper security measures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>How to prepare<\/h2>\n\n\n\n<p><strong>If you\u2019re a software development company, you should be interested in complying with the newest regulations, <\/strong>whether you operate in the American market or not. As we\u2019ve mentioned above \u2014 soon it is going to look more or less the same in the EU and the UK, as well as in Australia. <strong>There\u2019s no escaping the changes<\/strong> that are about to happen, but you can prepare your business and avoid any major disruptions.<\/p>\n\n\n\n<p>Here\u2019s what you can do:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>1. <strong>Hire a cybersecurity expert or experts.<\/strong><\/h3>\n\n\n\n<p>You <strong>may decide to expand your internal team<\/strong> with some new members \u2014 responsible solely for cybersecurity. Keeping everything in-house may be a good idea for smaller companies with less complex infrastructure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>2. <strong>Cooperate with an experienced IT partner.<\/strong><\/h3>\n\n\n\n<p>If you\u2019re a medium-sized or larger organization \u2014 you <strong>may want to build your security strategy together with an experienced partner, <\/strong>in order to off-load your internal resources and operate even more effectively. For example, security management during software development (<a href=\"https:\/\/www.future-processing.com\/services\/cybersecurity\/security-development-lifecycle\/\">Security Development Lifecycle<\/a>) is one of our core services, meaning, <strong>we\u2019ve already been doing what everyone else will soon be forced to do for quite some time.<\/strong><\/p>\n\n\n\n<p>This means that cooperating with Future Processing would give you a more thorough competitive edge from the ground up, since you would benefit from all of the invaluable experience that others are just about to start gaining.<\/p>\n\n\n\n<p><br>No matter which route you choose to take, <strong>take it seriously, but also try not to panic.<\/strong> With a little bit of expert help (from internal or external sources), your business activities won\u2019t be disrupted, and you will be able to get through more challenging times with ease.<\/p>\n\n\n<div class=\"b-cta-banner m-gradient-light\">\n            <a href=\"https:\/\/www.future-processing.com\/services\/cybersecurity\/cybersecurity-consulting\/\" class=\"b-cta-banner__image-container\" data-elementclick=\"article-banner\" data-elementname=\"Not sure how to comply with new regulations?\">\n            <img decoding=\"async\" width=\"450\" height=\"450\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing.png\" class=\"attachment-full size-full\" alt=\"Cybersecurity_Consulting_Future_Processing\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing.png 450w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-300x300.png 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-150x150.png 150w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-400x400.png 400w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-24x24.png 24w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-48x48.png 48w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-96x96.png 96w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>        <\/a>\n    \n        <a href=\"https:\/\/www.future-processing.com\/services\/cybersecurity\/cybersecurity-consulting\/\" class=\"b-cta-banner__url b-cta-banner__text-container\" data-elementclick=\"article-banner\" data-elementname=\"Not sure how to comply with new regulations?\">\n                    <div class=\"b-cta-banner__text\">\n                                                    <h3 class=\"f-headline-extra-big b-cta-banner__header\">\n                        Not sure how to comply with new regulations?                    <\/h3>\n                \n                                    <div class=\"f-paragraph\">\n                        <p>Let&#8217;s prepare for the shifts in cybersecurity policy and build your security strategy together<\/p>\n                    <\/div>\n                \n                                    <div class=\"o-button o-button--primary o-button--s o-button--icon-right o-button--arrow\">\n                        <span>Let\u2019s talk<\/span>\n                        <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                    <\/div>\n                            <\/div>\n                <\/a>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Biden-Harris administration recently released the National Cybersecurity Strategy, which creates a new digital ecosystem in the U.S. that should be safe and secure for all Americans.<\/p>\n","protected":false},"author":182,"featured_media":25169,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2110],"tags":[],"coauthors":[2010],"class_list":["post-25166","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":{"reading-time":"5 min","show-toc-sublists":false,"image":null,"logo":null,"button1":{"button1_type":"","button":null},"button2":{"button2_type":"","button":null},"person":{"person_photo":null,"person_name":"","person_position":""}},"_links":{"self":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts\/25166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/users\/182"}],"replies":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/comments?post=25166"}],"version-history":[{"count":0,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts\/25166\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/media\/25169"}],"wp:attachment":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/media?parent=25166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/categories?post=25166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/tags?post=25166"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/coauthors?post=25166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}