SlideShare a Scribd company logo
Cyberspace Security Policy Recommendations Marcus H. Sachs, P.E. National Security and Cyber Policy Verizon
Federal Cyber Security Policy Priorities Organized cyber attacks pose a significant risk to the national and economic security of the United States; however: Nearly all intrusions are preventable Coordinated actions by both the public and private sectors can successfully protect critical American assets Policy makers should focus on leveraging governmental resources to advance cyber security goals While also creating incentives for the private sector to do the same
The Federal Government Must Lead By Example Set the “gold standard” by managing ALL government systems in a secure manner that can be duplicated .mil, .gov, and beyond Use acquisition powers to improve everybody’s ability to secure cyberspace  Be an early adopter of new security tools Lowers the cost for the private sector Develop a career field for government cyberspace professionals, from initial entry all the way to SES Security is all about the people, not the technology  Look at cyberspace security through the lens of economics rather than just military offense/defense
Preserve the Public-Private Partnership in Cyberspace Limit legislation and Presidential authority to the government’s critical infrastructures only Only include private sector infrastructure if it directly supports the government Any legislation or regulation must address liability, confidentiality, cost, legal conflicts, and other legitimate private sector concerns Terminology must be consistent (i.e., the definition of “cyberspace”) Existing laws such as the ECPA or Patriot Act must be examined to improve the information sharing process

More Related Content

PPTX
Atlantic Council Proposed Solutions for Cyber Threats
PDF
What's Next in Cybersecurity Policy
PPTX
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
PPTX
CT3- STEVENS
PPTX
Government and Enterprise Collaboration in Cybersecurity
PPT
Ise enterprise architecture and common standards program
PPTX
Healthcare data and their protection in the philippines
PDF
Cyber & information security-aha2013
Atlantic Council Proposed Solutions for Cyber Threats
What's Next in Cybersecurity Policy
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CT3- STEVENS
Government and Enterprise Collaboration in Cybersecurity
Ise enterprise architecture and common standards program
Healthcare data and their protection in the philippines
Cyber & information security-aha2013

What's hot (10)

PDF
Infographic Protecting Patient Data
PDF
US-2015Congress-Brochure-WEB-1.pdf
PPTX
A4 digital privacy
PPTX
A4 presentation
PPT
Information Assurance And Security - Chapter 3 - Lesson 1
PPT
Leone ct#3 presentation 1
PPTX
Need for Improved Critical Industrial Infrastructure Protection
PDF
TLG Keep Your Head IN the Cloud Webinar (05-05-15)
Infographic Protecting Patient Data
US-2015Congress-Brochure-WEB-1.pdf
A4 digital privacy
A4 presentation
Information Assurance And Security - Chapter 3 - Lesson 1
Leone ct#3 presentation 1
Need for Improved Critical Industrial Infrastructure Protection
TLG Keep Your Head IN the Cloud Webinar (05-05-15)
Ad

Similar to Cyber Policy Recommendations For The Federal Government (20)

PDF
Securing Cyber Space- Eljay Robertson
DOCX
Title United States. The National Strategy for Homeland Security .docx
DOCX
Prof E Hewitt
PPTX
vinay pdfsjyfbjyv mvjkhvags gfbbdgfvbzfddddddddddddddfbdfg
PDF
Cyberdefense strategy - Boston Global Forum - 2017
PDF
Cyber Security Conference - Msps cybersecurity whitepaper
PDF
RAND_RR573
PDF
Institutional Cybersecurity from Military Perspective
PDF
Need for Improved Critical Industrial Infrastructure Protection
PPTX
PDF
Global Partnership Key to Cyber Security
PDF
Cybersecurity and its impact on your commercial real estate portfolio
 
PPTX
US Cyber Security Policy
PDF
A1 - Cibersegurança - Raising the Bar for Cybersecurity
DOCX
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
PDF
Policy Guide for Legislators
PDF
Forecast cybersecurity regulation v3
PDF
Addressing Policy Challenges of Disruptive Technologies
PPT
Cyber-Terrorism
PPT
6b3de471-b100-483c-9df1-fc6afb92fb5f-151219150001.ppt
Securing Cyber Space- Eljay Robertson
Title United States. The National Strategy for Homeland Security .docx
Prof E Hewitt
vinay pdfsjyfbjyv mvjkhvags gfbbdgfvbzfddddddddddddddfbdfg
Cyberdefense strategy - Boston Global Forum - 2017
Cyber Security Conference - Msps cybersecurity whitepaper
RAND_RR573
Institutional Cybersecurity from Military Perspective
Need for Improved Critical Industrial Infrastructure Protection
Global Partnership Key to Cyber Security
Cybersecurity and its impact on your commercial real estate portfolio
 
US Cyber Security Policy
A1 - Cibersegurança - Raising the Bar for Cybersecurity
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
Policy Guide for Legislators
Forecast cybersecurity regulation v3
Addressing Policy Challenges of Disruptive Technologies
Cyber-Terrorism
6b3de471-b100-483c-9df1-fc6afb92fb5f-151219150001.ppt
Ad

More from Christopher Dorobek (18)

PPTX
GSA CMMC implementation landscape - via AFFIRM
PPTX
ACT-IAC Partners #GovDevOps: PTO - agile - and DevOps
PPTX
2016.06 ACT-IAC Partners breakfast: GSA's 18F on DevOps delivery
PPTX
GSA Federal Acquisition Service: The Government Acquisition Marketplace
PPTX
ACT-IAC MOC 2014 Open, Flexible Government Workshop report
PPT
Improving cyber-security through acquisition
PPTX
John rucker keynote presentation 11-01-2011
PPTX
MOC 2010: CXO Mixer voting results
PDF
Gsa infrastructure as a service briefing, 4-21-2010
PPTX
March 2010: FedSources HUD CIO Jerry Williams
PPTX
10 Steps To Support Open Government
PPTX
Opm Closed 02.08
PPT
AFFIRM Network panel slides
PPT
080409 Churchill Club Slides
PPT
080409 Churchill Club Slides
PPT
Aug. 5, 2009 Federal CTO Chopra slides before the Churchill Club
PPT
June 2009 Veterans Affairs Program Management Accountability System
PPT
Federal CIO Council's industructions on New Virtual Community Created to Shap...
GSA CMMC implementation landscape - via AFFIRM
ACT-IAC Partners #GovDevOps: PTO - agile - and DevOps
2016.06 ACT-IAC Partners breakfast: GSA's 18F on DevOps delivery
GSA Federal Acquisition Service: The Government Acquisition Marketplace
ACT-IAC MOC 2014 Open, Flexible Government Workshop report
Improving cyber-security through acquisition
John rucker keynote presentation 11-01-2011
MOC 2010: CXO Mixer voting results
Gsa infrastructure as a service briefing, 4-21-2010
March 2010: FedSources HUD CIO Jerry Williams
10 Steps To Support Open Government
Opm Closed 02.08
AFFIRM Network panel slides
080409 Churchill Club Slides
080409 Churchill Club Slides
Aug. 5, 2009 Federal CTO Chopra slides before the Churchill Club
June 2009 Veterans Affairs Program Management Accountability System
Federal CIO Council's industructions on New Virtual Community Created to Shap...

Recently uploaded (20)

PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Chapter 5_Foreign Exchange Market in .pdf
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
WRN_Investor_Presentation_August 2025.pdf
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PPTX
Principles of Marketing, Industrial, Consumers,
PDF
IFRS Notes in your pocket for study all the time
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
Unit 1 Cost Accounting - Cost sheet
PPTX
5 Stages of group development guide.pptx
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Roadmap Map-digital Banking feature MB,IB,AB
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Chapter 5_Foreign Exchange Market in .pdf
Euro SEO Services 1st 3 General Updates.docx
Nidhal Samdaie CV - International Business Consultant
ICG2025_ICG 6th steering committee 30-8-24.pptx
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Ôn tập tiếng anh trong kinh doanh nâng cao
WRN_Investor_Presentation_August 2025.pdf
Belch_12e_PPT_Ch18_Accessible_university.pptx
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
340036916-American-Literature-Literary-Period-Overview.ppt
Principles of Marketing, Industrial, Consumers,
IFRS Notes in your pocket for study all the time
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Unit 1 Cost Accounting - Cost sheet
5 Stages of group development guide.pptx

Cyber Policy Recommendations For The Federal Government

  • 1. Cyberspace Security Policy Recommendations Marcus H. Sachs, P.E. National Security and Cyber Policy Verizon
  • 2. Federal Cyber Security Policy Priorities Organized cyber attacks pose a significant risk to the national and economic security of the United States; however: Nearly all intrusions are preventable Coordinated actions by both the public and private sectors can successfully protect critical American assets Policy makers should focus on leveraging governmental resources to advance cyber security goals While also creating incentives for the private sector to do the same
  • 3. The Federal Government Must Lead By Example Set the “gold standard” by managing ALL government systems in a secure manner that can be duplicated .mil, .gov, and beyond Use acquisition powers to improve everybody’s ability to secure cyberspace Be an early adopter of new security tools Lowers the cost for the private sector Develop a career field for government cyberspace professionals, from initial entry all the way to SES Security is all about the people, not the technology Look at cyberspace security through the lens of economics rather than just military offense/defense
  • 4. Preserve the Public-Private Partnership in Cyberspace Limit legislation and Presidential authority to the government’s critical infrastructures only Only include private sector infrastructure if it directly supports the government Any legislation or regulation must address liability, confidentiality, cost, legal conflicts, and other legitimate private sector concerns Terminology must be consistent (i.e., the definition of “cyberspace”) Existing laws such as the ECPA or Patriot Act must be examined to improve the information sharing process