From faceless enemies and rogue nations to countries that are actively considered adversaries, we are facing a rising tide of cybersecurity threats of epic proportions. This leaves our political systems, critical infrastructure and citizen data all vulnerable to a potential breach.

With the new Presidential administration, many believe that there could be some beneficial changes to our federal cybersecurity stance.

For example, when President Trump first announced his early intentions with his yet to be published cyber executive order, he called for federal agencies to take responsibility for internal cybersecurity and modernizing their organization’s technology. This call for a more consolidated approach to cybersecurity is expected to be further reinforced by additional support from industry.

Along these same lines, the Defense Department Science Board’s Task Force on Cyber Deterrence recently issued a report that called for a “whole of government” approach to deterring cyber threats. The report offers these three recommendations:

  1. Plan and conduct tailored deterrence campaigns to deal with a range of potential attacks rather than a one-size-fits-all.
  2. Create a cyber-resilient “thin line” of key U.S. strike systems that are increasingly vulnerable to exploitation.
  3. Enhance foundational capabilities both within DoD and the government to improve capabilities such as attribution – which is essential for deterrence to identify culprits, resilience and technology innovation.

The technology component of the third recommendation could be driven by industry members, which are continually on the forefront of cyber innovations.

While many in government and the private sector await President Trump’s cyber executive order, all signs point to an approach that aims to break down many of the cumbersome regulations, legislations and agency initiatives that have made a “whole of government” cyber approach difficult.

In the meantime, the private sector will continue to create the most cutting-edge innovations, since our cyber adversaries never sleep. And, neither should we.