Episode Details

Back to Episodes
America Just Changed the Rules of Cyber War

America Just Changed the Rules of Cyber War

Published 1 week ago
Description

If you're waiting for the executive orders to act, you're already behind. 

 

The U.S. has just released a new national cyber strategy.

The core message is clear: stop waiting to be hit, and start making it costly to try.

 

In this episode of Threat Talks, Caitlin Clarke, Senior Director of Cybersecurity Services at Venable and former Special Assistant to the President for Cybersecurity & Emerging Technology, join Lieuwe Jan Koning, Co-founder & CTO at ON2IT Cybersecurity to break down what the strategy actually says, and what it means for your organization.

 

The direction is clear. The details are still coming. 

But the clock is already running.

 

This episode helps you stay ahead with three clear pillars of the strategy:

  • Pillar 1: Shaping adversary behavior – making it harder, costly and risky to target US and allied interests. 
  • Pillar 2: Regulatory simplification – deregulation, or simply harmonizing cyber incident reporting requirements
  • Pillar 4: Securing critical infrastructure – your stack may already contain foreign technology that can be labelled as ‘adversarial’ 

 

Spoiler alert: if you haven't started your Zero Trust and post-quantum cryptography roadmaps yet, the new strategy has a message for you too.

 

Timestamps

00:00 – America's New Cyber Strategy: First Impressions 

01:28 – What the US National Cyber Strategy Is Really Saying 

02:52 – Pillar 1: Shaping Adversary Behavior and Cyber Deterrence 

10:28 – Pillar 4: Securing Critical Infrastructure and Adversary Technology 

18:07 – Pillar 2: Harmonizing Cyber Incident Reporting Requirements 

22:17 – What CISOs Should Do Now: Supply Chain, Zero Trust and Post-Quantum Cryptography 

27:11 – Wrap up

 

Key Topics Covered

  • What the US national cyber strategy means for security leaders 
  • How cyber deterrence is shifting beyond pure defense 
  • Why supply chain risk is now a board-level issue 
  • What regulatory simplification means for cyber incident reporting requirements 
  • Where Zero Trust and post-quantum cryptography fit in

 

Resources

Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

 

🔔 Follow and Support our channel! 🔔


► YOUTUBE:    / @threattalks  

► SPOTIFY: https://open.spotify.com/show/1SXUyUE...

► APPLE: https://podcasts.apple.com/us/podcast...

 

👕 Receive your Threat Talks T-shirt

https://threat-talks.com/

 

🗺️ Explore the Hack's Route in Detail 🗺️

https://threat-talks.com

 

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Listen Now

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us