Skip to content
Awareity
Primary Navigation Menu
Menu
  • Home
  • About
    • About
    • Awareity Butterfly Effect
    • Contact
    • Support
  • Solutions
    • Information Security Training
      • Information Security Awareness Training
      • Awareness and Accountability Vault (AAV)
    • Prevention and Connecting the Dots Platform
    • Prevention and GAP Assessment
    • Threat Assessment Teams
    • Climate Surveys
    • Resellers
    • Industries
      • K12
      • Higher Education
      • Diocese
      • Healthcare
      • Government
      • Corporate
  • Blog
  • Info Request

President Obama’s 10-point Cybersecurity Action Plan – Part 7

By: Awareity
On: June 16, 2009

Step 7 is:

Develop U.S. Government positions for an international cybersecurity policy framework and strengthen our international partnerships to create initiatives that address the full range of activities, policies, and opportunities associated with cybersecurity.

Wow…this is a very complex step when you consider the Cyberspace Policy Review described cybersecurity policy as:

cybersecurity policy as used in this document includes strategy, policy, and standards regarding the security of and operations in cyberspace, and encompasses the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure. The scope does not include other information and communications policy unrelated to national security or securing the infrastructure.

Step 7 is also very complex because of:

  • International partnerships and
  • Creating initiatives that address the full range of activities, policies and opportunities associated with cybersecurity.

 

The easy part of Step 7 is “developing U.S. Government positions”, because Lessons Learned have proven over and over that developing a position is fairly simple to do and all it takes is a PC and a megaphone or Press Release.

However, implementing and managing the “cybersecurity policy framework” across international partnerships (different languages across all appropriate individuals) and “creating initiatives that address the full range of activities, policies and opportunities associated with cybersecurity” will require extensive situational awareness, accountability, measurability and audit-ready documentation to ensure the initiatives are working. 

If you can’t measure it…you can’t manage it.

Stay tuned for Step 8…

Share this post to help us connect the dots...Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Email this to someone
email
Print this page
Print
2009-06-16
Previous Post: SPAM and Junk Mail Jump to 90%
Next Post: Twitter, Your Employees, Hackers and Awareness?

READ MORE:

WATCH MORE:


Get Solutions For Your Challenges!
 
 
 
 
 
 
Don't worry, we will only call if you request "Phone" as your contact preference. We hate spam calls too!


Not seeing the form to request information? Drop us a line and we'll send you more information!

Recent Blog Posts

Nashville Attack – A Call to Action to Revolutionize Community Safety

January 12, 2021

Threat Assessment Teams: Six Tools Most Community and Organization TATs Are Missing

January 7, 2021

Connecting the Dots: Stopping Human Trafficking

November 5, 2020

Ransomware Solutions: Ongoing Awareness and Accountability Vault

October 1, 2020

National Cyber Security Awareness Month 2020

October 1, 2020

Support

Need more information on
Support for AAV or TIPS?

Click here

What are you looking for?

Connect the Dots With Us!

| |

Designed using Dispatch Premium. Powered by WordPress.

This site uses cookies to ensure that we give you the best experience on our website. Continuing to use this site means you are agreeing to the use of cookies.Ok