November 24, 2015 By Rick M Robinson 2 min read

The Presidential Election and Cybersecurity

Don’t look now, but cybersecurity is lurking as a major issue in the developing U.S. presidential election cycle. The stage has been set by developments in the seven years since the last election with no incumbent on the ballot.

In 2008, no one had heard of the Target or Sony hacks, the Stuxnet worm or Dyre malware. Hardly anyone cared about Facebook’s privacy policy. Most people thought of cybercriminals as bright but maladjusted teenagers, and Internet crime meant emails from fake Nigerian widows.

In short, the cybersecurity era has come of age. But its full political implications are only now beginning to emerge, and we don’t yet know the level of importance cybersecurity will take in the upcoming presidential election.

Professionals Look for an Understanding

A survey of cybersecurity professionals by Tripwire found that 68 percent of them preferred to vote for a presidential candidate with a strong cybersecurity policy. But as one expert put it, there is “a big difference between a candidate who has a cybersecurity policy and a candidate who has an understanding of cybersecurity.”

Cybersecurity professionals hardly compose a strong voting bloc, and presidential campaigns will target them not for votes but rather to win support from cybersecurity thought leaders. Their views could help shape public perceptions of a complex issue that most people cannot expect to understand on their own.

Just to complicate things, the cybersecurity issue does not always go by that name. In this day and age, privacy as an issue refers chiefly to online and data privacy, which means to say cybersecurity as viewed through a privacy lens.

An Issue that Takes Many Forms

How safe are people’s computers and mobile devices from snooping? How safe is the personal data such as credit card numbers they have entrusted to companies and other organizations? What about their data stored in the cloud? Are people even aware that whatever they put on their devices is being stored in the cloud? These issues are all about cybersecurity.

Public concern about cybersecurity is also subject to cross-cutting concerns. Privacy protection wins strong support on both the right and left, but with differences in focus: Conservatives are more likely to worry about foreign threats, liberals about prying by business, and both sides may be suspicious of government snooping and cybersecurity policies.

Enterprise security, which is a major concern of cybersecurity professionals, may not strongly engage the electorate in and of itself — people are more likely to scoff at corporate victims than to feel sorry for them. But enterprise breaches also expose consumers, giving voters a stake in corporate cybersecurity, as well.

Given the complexities of the issue and the many forms it takes, cybersecurity by that name may not directly emerge as a campaign battleground issue. But whether as concern about terrorism, government intrusion or consumer financial protection, cybersecurity issues in one form or another are likely to be prominent in the 2016 presidential election.

More from Government

Updated SBOM guidance: A new era for software transparency?

3 min read - The cost of cyberattacks on software supply chains is a growing problem, with the average data breach costing $4.45 million in 2023. Since President Biden’s 2021 executive order, software bills of materials (SBOMs) have become a cornerstone in protecting supply chains.In December 2023, the National Security Agency (NSA) published new guidance to help organizations incorporate SBOMs and combat the threat of supply chain attacks.Let’s look at how things have developed since Biden’s 2021 order and what these updates mean for…

Roundup: Federal action that shaped cybersecurity in 2023

3 min read - As 2023 draws to a close, it’s time to look back on our top five federal cyber stories of the year: a compilation of pivotal moments and key developments that have significantly shaped the landscape of cybersecurity at the federal level.These stories highlight the challenges federal agencies faced in securing digital infrastructure in the past year and explore the evolving nature of cyber threats, as well as the innovative responses required to address them.New White House cybersecurity strategyThe White House’s…

ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware

12 min read - As of December 2023, IBM X-Force has uncovered multiple lure documents that predominately feature the ongoing Israel-Hamas war to facilitate the delivery of the ITG05 exclusive Headlace backdoor. The newly discovered campaign is directed against targets based in at least 13 nations worldwide and leverages authentic documents created by academic, finance and diplomatic centers. ITG05’s infrastructure ensures only targets from a single specific country can receive the malware, indicating the highly targeted nature of the campaign. X-Force tracks ITG05 as…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today