May 21, 2018 By David Bisson 2 min read

The Department of Homeland security (DHS) has a new plan to reduce software vulnerabilities, counter malicious actors, respond to incidents and build resiliency. The DHS released a national cybersecurity strategy on May 15, which focused on addressing the evolving digital threat landscape. The unveiled plan is part of the organization’s commitment to implement these cybersecurity responsibilities over the next five years.

DHS Cybersecurity: ‘A Historic Turning Point’

Kirstjen Michele Nielsen, the DHS secretary, explained that the new national cybersecurity strategy responds to changes in the threat landscape. She found the convergence of digital security with personal and private security particularly remarkable — calling this a “historic turning point” that necessitates a reevaluation of her department’s approach to cybersecurity.

“In an age of brand-name breaches, we must think beyond the defense of specific assets — and confront systemic risks that affect everyone from tech giants to homeowners,” Nielsen said in a DHS press release. “Our strategy outlines how DHS will leverage its unique capabilities on the digital battlefield to defend American networks and get ahead of emerging cyberthreats.”

5 Security Objectives of the DHS

The DHS divided its strategy into five pillars:

  1. Bolster risk identification: Understand the department’s posture concerning national cybersecurity risk and prioritize responsive risk management efforts.
  2. Reduce vulnerabilities: Help federal agencies patch up weak points in their networks so they can achieve a reasonable level of cybersecurity.
  3. Diminish threats: Combat transnational criminal organizations and individual actors who abuse the digital space.
  4. Mitigate consequences: Minimize the effects of potentially significant security incidents through the cooperation of the entire community.
  5. Enable cybersecurity outcomes: Support activities and efforts that promote global risk management activities while making the department’s cybersecurity efforts more integrated and streamlined.

The DHS explained it intends to pursue these objectives while upholding the national values of the U.S. and protecting the civil liberties of Americans.

Collaboration in the Name of a Safer World

In its national cybersecurity strategy, the DHS revealed that it would not be able to tackle the majority of its goals alone. It said it would need to draw from the strength of the international community to track down criminals, prepare for attacks (on the scale of WannaCry or NotPetya) and promote risk management worldwide. Toward that end, it expressed its commitment to support research into security innovations that help better protect its networks as well as other organizations’ systems.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today