3 Tips for Meeting the White House Cybersecurity Strategy
June 12, 2023

Meredith Bell
AutoRABIT

The White House recently released its National Cybersecurity Strategy(link is external). This document outlines the government's plan to address growing concerns over cyberattacks and ransomware attacks. The administration recognizes cybersecurity as an ongoing consideration that will continue to grow in importance.


The strategy outlines two main tactics(link is external) to accomplish continued data security for companies, individuals, and government agencies throughout the country:

1. Rebalance the responsibility to defend cyberspace.

2. Realign incentives to favor long-term investments.

The cybersecurity strategy outlines the groundwork for increased cyber defenses and alludes to potential regulations.

Here are three tips to align your cybersecurity strategy with the White House guidelines, to avoid any breaches that your organization may be held liable for.

1. Understand Your Responsibilities

You can't assume the government will save you from cyberattacks. Your own data security is your responsibility, especially in the case of a business holding customer information.

The strategy calls out this responsibility in section 3.1: "We must hold the stewards of our data accountable for the protection of personal data; drive the development of more secure connected devices; and reshape laws that govern liability for data losses and harm caused by cybersecurity errors, software vulnerabilities, and other risks created by software and digital technologies."

Companies that handle sensitive information are required to do all they can to protect it, otherwise it could cost them. This needs to be built into your data security strategy.

2. Know the Government's Role

The White House's strategy outlines five pillars in its approach:

1. Defend Critical Infrastructure: Gas, electric, and water systems will receive direct attention from the government, but will still need the cooperation of private enterprises.

2. Disrupt and Dismantle Threat Actors: Nation-state groups are frequent sources of cybercrime. The government will work to stop these threats.

3. Shape Market Forces to Drive Security and Resilience: Federal grants will be awarded to new infrastructure that is deemed secure.

4. Invest in a Resilient Future: Next-generation technologies will determine the stability of our networks. The White House aims to be a leader in secure innovation.

5. Forge International Partnerships to Pursue Shared Goals: A partnership will be formed with friendly countries to support a safe technological ecosystem for all.

3. Keep Your Eyes on the Future

This cybersecurity strategy does not immediately introduce any new laws or regulations, although it does hint at a few, and organizations shouldn't have to be forced to properly protect their data through the threat of fines and penalties, it should be a part of your bottom-line.

The systems you put in place today can save you from an incredibly costly data breach — the average cost for American companies is up to $9.44 million, according to IBM(link is external) — in the near or distant future.

Communicating best practices, introducing automated DevSecOps tools, and hosting your network on-premises are just a few ways your organization can immediately begin strengthening your data security measures.

Our reliance on technology will keep growing as software continues to becomes more efficient. The White House's National Cybersecurity Strategy aims to put measures in place today that will protect our technological infrastructure from bad actors in the future. We can't be sure what these threats will be, but we can fortify our platforms to give ourselves the best chance at staying safe.

Meredith Bell is CEO of AutoRABIT
Share this

Industry News

March 25, 2025

Chainguard announced Chainguard Libraries, a catalog of guarded language libraries for Java built securely from source on SLSA L2 infrastructure.

March 25, 2025

Cloudelligent attained Amazon Web Services (AWS) DevOps Competency status.

March 25, 2025

Platform9 formally launched the Platform9 Partner Program.

March 24, 2025

Cosmonic announced the launch of Cosmonic Control, a control plane for managing distributed applications across any cloud, any Kubernetes, any edge, or on premise and self-hosted deployment.

March 20, 2025

Oracle announced the general availability of Oracle Exadata Database Service on Exascale Infrastructure on Oracle Database@Azure(link sends e-mail).

March 20, 2025

Perforce Software announced its acquisition of Snowtrack.

March 19, 2025

Mirantis and Gcore announced an agreement to facilitate the deployment of artificial intelligence (AI) workloads.

March 19, 2025

Amplitude announced the rollout of Session Replay Everywhere.

March 18, 2025

Oracle announced the availability of Java 24, the latest version of the programming language and development platform. Java 24 (Oracle JDK 24) delivers thousands of improvements to help developers maximize productivity and drive innovation. In addition, enhancements to the platform's performance, stability, and security help organizations accelerate their business growth ...

March 18, 2025

Tigera announced an integration with Mirantis, creators of k0rdent, a new multi-cluster Kubernetes management solution.

March 18, 2025

SAP announced “Joule for Developer” – new Joule AI co-pilot capabilities embedded directly within SAP Build.

March 17, 2025

SUSE® announced several new enhancements to its core suite of Linux solutions.

March 13, 2025

Progress is offering over 50 enterprise-grade UI components from Progress® KendoReact™, a React UI library for business application development, for free.

March 13, 2025

Opsera announced a new Leadership Dashboard capability within Opsera Unified Insights.

March 13, 2025

Cycloid announced the introduction of Components, a new management layer enabling a modular, structured approach to managing cloud resources within the Cycloid engineering platform.