In light of the news that The White House will be rolling out a substantial Cybersecurity National Action Plan (CNAP), Harley Geiger, Director of Public Policy, at Rapid7 have the following comments on it.
Harley Geiger, Director of Public Policy, at Rapid7:
“The President’s Cybersecurity National Action Plan aims to modernise agencies’ technology and user behaviour and we believe it is a broadly positive step forward. If implemented, the proposal will help support federal agencies that are very much in need of more secure IT to help prevent or mitigate more serious breaches. We hope Congress and the Administration will collaborate to execute this plan.
Last year, Congress made cybersecurity a clear priority as it passed a cybersecurity information sharing bill, but, as demonstrated by the President’s proposal, information sharing is only one of many actions needed to strengthen cybersecurity. The President’s plan would help address some other needed improvements, though there is still a long way to go before US national cyber defences are commensurate with today’s threat landscape.”
[su_box title=”About Rapid7″ style=”noise” box_color=”#336588″]Rapid7 security data and analytics software and services help organizations reduce the risk of a breach, detect and investigate attacks, and build effective IT security programs. With comprehensive real-time data collection, advanced correlation, and insight into attacker techniques, Rapid7 strengthens an organization’s ability to defend against everything from opportunistic drive-by attacks to advanced threats. Unlike traditional vulnerability management and incident detection technologies, Rapid7 provides visibility, monitoring, and insight across assets and users from the endpoint to the cloud. Dedicated to solving the toughest security challenges, Rapid7 offers proprietary capabilities to spot intruders leveraging today’s #1 attack vector: compromised credentials. Rapid7 is trusted by more than 3,700 organizations across 90 countries, including 30% of the Fortune 1000.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.