Episode Details
Back to Episodes
America Just Changed the Rules of Cyber War
Description
If you're waiting for the executive orders to act, you're already behind.
The U.S. has just released a new national cyber strategy.
The core message is clear: stop waiting to be hit, and start making it costly to try.
In this episode of Threat Talks, Caitlin Clarke, Senior Director of Cybersecurity Services at Venable and former Special Assistant to the President for Cybersecurity & Emerging Technology, join Lieuwe Jan Koning, Co-founder & CTO at ON2IT Cybersecurity to break down what the strategy actually says, and what it means for your organization.
The direction is clear. The details are still coming.
But the clock is already running.
This episode helps you stay ahead with three clear pillars of the strategy:
- Pillar 1: Shaping adversary behavior – making it harder, costly and risky to target US and allied interests.
- Pillar 2: Regulatory simplification – deregulation, or simply harmonizing cyber incident reporting requirements
- Pillar 4: Securing critical infrastructure – your stack may already contain foreign technology that can be labelled as ‘adversarial’
Spoiler alert: if you haven't started your Zero Trust and post-quantum cryptography roadmaps yet, the new strategy has a message for you too.
Timestamps
00:00 – America's New Cyber Strategy: First Impressions
01:28 – What the US National Cyber Strategy Is Really Saying
02:52 – Pillar 1: Shaping Adversary Behavior and Cyber Deterrence
10:28 – Pillar 4: Securing Critical Infrastructure and Adversary Technology
18:07 – Pillar 2: Harmonizing Cyber Incident Reporting Requirements
22:17 – What CISOs Should Do Now: Supply Chain, Zero Trust and Post-Quantum Cryptography
27:11 – Wrap up
Key Topics Covered
- What the US national cyber strategy means for security leaders
- How cyber deterrence is shifting beyond pure defense
- Why supply chain risk is now a board-level issue
- What regulatory simplification means for cyber incident reporting requirements
- Where Zero Trust and post-quantum cryptography fit in
Resources
- Threat Talks – Vendor Audit episode with Lokke Moerel: https://www.youtube.com/watch?v=hyKOxJUa4Go
- Threat Talks – Vendor dependency episode with Bart Groothuis: https://www.youtube.com/watch?v=Vj5Z7RYMACY
- Office of National Cyber Director website: https://www.whitehouse.gov/oncd/
- Threat Talks: https://threat-talks.com/
- ON2IT (Zero Trust as a Service): https://on2it.net/
- AMS-IX: https://www.ams-ix.net/ams
Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.
🔔 Follow and Support our channel! 🔔
► YOUTUBE: / @threattalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUE...
► APPLE: https://podcasts.apple.com/us/podcast...
👕 Receive your Threat Talks T-shirt
https://threat-talks.com/
🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX