US cybersecurity strategy will take toll on critical infrastructure budget

We look forward to working with our U.S. critical infrastructure partners

CEO for cybersecurity company, Nozomi Networks, says the Strategy’s requirements for critical infrastructure to increase cybersecurity posture will be met with ‘varying responses from CEOs and boards alike’, and ‘the ability for these entities to identify the budget and personnel to manage these pieces will take time’.

Edgard Capdevielle, CEO, Nozomi Networks:

“The National Cyber Strategy’s non-voluntary requirements for critical infrastructure to increase cybersecurity posture will be met with varying responses from CEOs and boards alike. While the impetus for a better cyber posture to defend against potential nation-state adversaries is wise and necessary, the ability for these entities to identify the budget and personnel to manage these pieces will take time, as it is for most companies in this macroeconomic climate.

“We look forward to working with our U.S. critical infrastructure partners, just as we have with their international counterparts, to meet changing regulatory guidelines with the best defences and visibility possible.”

Happy to arrange a chat to dive into this further if you’re keen? Some potential discussion points below:

  • Even with the large market share and vast amount of resources, we are outmanned in cyberspace. The strategy is the first concerted effort to streamline U.S. public, private, and defence sector cybersecurity resources, something our adversaries very much do not want.
  • There is a ton of healthy debate in the cybersecurity industry, but we sometimes fail to see the biggest picture. The new strategy underscores the fact that we are all on the same team, while calling out exactly where we need to strengthen muscle memory or develop new strength.
  • The strategy recognises the importance of continuing to forge international partnerships to pursue shared goals that includes extending U.S. capabilities to assist allies and partners.
  • Trust and verification for operational technology (OT) cybersecurity are not mutually exclusive. The National Cybersecurity Strategy mentions trust a total of 19 times. That said, those tasked with implementation also owe the industries impacted by this strategy a promise: stop moving goal posts for what success looks like, and define what failure looks like. This is easier said than done.

 

Tags:

Leave a Comment

Related posts