Module 3: Cybersecurity Policy at the National Level

Stasy Hsieh
15 min readOct 26, 2024

--

This article serves as a lecture summary about the U.S. National Cybersecurity Strategy aims to secure critical infrastructure, disrupt cyber threats, and hold tech companies accountable for security. It emphasizes public-private collaboration, increased R&D, and global partnerships to promote resilient systems and democratic values in cyberspace. The strategy seeks to shift cybersecurity responsibilities to well-resourced entities, countering decades of attackers’ advantage and enhancing national security.

“Cyber Posture Trends in China, Russia, the United States, and the European Union”:

  1. China: China’s cyber posture has evolved from “information security” to a dual focus on information and “cybersecurity,” with a proactive defense approach. China emphasizes cyber sovereignty and aims to influence global cyber standards through initiatives like the Digital Silk Road. The People’s Liberation Army (PLA) integrates both peacetime and wartime strategies, reflecting China’s comprehensive approach to cyber operations.
  2. Russia: Russia maintains a focus on “information security” and “information warfare,” avoiding direct references to “cybersecurity.” Russia differentiates between information-technical and information-psychological warfare, including concepts such as “war against mentality.” Its cyber strategy leans toward “deterrence by punishment” rather than merely defensive measures, aiming to safeguard national security and uphold information sovereignty.
  3. United States: The U.S. has transitioned its cyber focus from an extension of its nuclear command structure to treating cyberspace as an independent operational domain. U.S. cyber policy emphasizes “zero trust” and combines defensive and offensive strategies, including private sector collaboration. The U.S. approach includes persistent engagement to counteract potential adversarial actions and relies on resilience against inevitable breaches.
  4. European Union: The EU faces challenges in unifying its cyber posture among member states. Although “cybersecurity” has gained prominence, terms like “data protection” remain central, reflecting the EU’s regulatory focus. The EU aims for a global regulatory role while maintaining a cautious stance on offensive cyber capabilities, favoring limited deterrence by punishment through sanctions against non-state actors.
  5. Convergence and Divergence: Key areas of divergence include the EU’s and U.S.’s differing views on offensive cyber operations. Convergences include shifts towards proactive defense across China, Russia, and the U.S. The document suggests potential for crisis management through shared cyber interests, although proactive actions may also increase pre-emptive behaviors.

“Regulating Risks within Complex Sociotechnical Systems: Evidence from Critical Infrastructure Cybersecurity Standards,” by Aaron Clark-Ginsberg and Rebecca Slayton

Summary:

1. Complex Sociotechnical Systems: The document argues that complex systems, such as the electric grid, involve intricate interactions between technology, organizations, and regulations. Regulations interact with these systems, producing both intended and unintended consequences.

2. Key Regulatory Factors: Three primary factors influence regulatory effectiveness:

• Incentives: Regulations can create incentives for organizations to prioritize public goods like cybersecurity. However, these incentives can also be unpredictable and lead to conflicting priorities.

• Scope: Regulations may protect specific aspects of a system while leaving other interconnected areas vulnerable.

• Adaptability: Effective regulation must adapt to evolving risks, although such changes are often slow and may struggle to keep pace with technological advancements.

3. NERC CIP Standards Case Study: Through a detailed case study of the NERC CIP standards, the document examines how these regulations have influenced cybersecurity in the U.S. electric grid. The standards provide a baseline for security but have also introduced challenges, such as compliance burdens that may detract from overall security focus.

4. Emergent Effects: The authors argue that the effectiveness of cybersecurity regulations is often an emergent property, shaped by interactions among various stakeholders, including regulators, utility companies, and auditors. The case study illustrates how regulations, while beneficial, may sometimes hinder security due to compliance costs and rigidity.

5. Conclusion: The study highlights the need for resilience-focused regulations that accommodate unexpected interactions within complex systems. By understanding regulations as part of a sociotechnical system, policymakers can better address challenges and unintended effects, promoting cybersecurity without overburdening organizations with compliance requirements.

National Cybersecurity Strategy 2023 document

Introduction

The strategy emphasizes the integration of cybersecurity as a national security priority for the U.S., reflecting how critical digital technologies have become across sectors. To achieve a safer digital ecosystem, the government aims to increase collaboration between private and public sectors while reducing the cybersecurity burden on individuals. The administration also advocates a values-based internet approach, ensuring it supports democracy and human rights while addressing challenges posed by authoritarian states.

Pillar One: Defend Critical Infrastructure

The first priority is to secure critical infrastructure, essential for public safety, national security, and economic stability. This pillar promotes collaboration between government entities like the Cybersecurity and Infrastructure Security Agency (CISA) and the private sector. New regulatory requirements for cybersecurity are recommended across sectors, where regulations will be performance-based and leverage frameworks from organizations like the National Institute of Standards and Technology (NIST).

Key Initiatives:

1. Mandatory Cybersecurity Standards: Establishing minimum cybersecurity requirements for critical sectors, which will increase resilience against cyber threats.

2. Public-Private Collaboration: Federal and private sector partnerships to create a robust defense model, including incident reporting for critical infrastructure.

3. Enhanced Federal Response: Federal agencies, led by CISA, will provide unified guidance during incidents, aiming for a “call to one is a call to all” approach.

4. Modernizing Federal Systems: The government will advance its own defenses with a “zero trust” architecture, creating a model for industry standards.

Pillar Two: Disrupt and Dismantle Threat Actors

The U.S. aims to proactively disrupt cyber threat actors using law enforcement, diplomatic, financial, and military tools. This includes stopping ransomware campaigns, state-backed espionage, and disruptive cyber attacks by both domestic and international actors.

Key Strategies:

1. Coordinated Disruption Efforts: Federal agencies will work together to dismantle cybercriminal networks, particularly those targeting critical infrastructure.

2. Public-Private Collaboration: Through collaboration hubs like the Joint Cyber Defense Collaborative, private companies will support intelligence-sharing efforts.

3. Intelligence Sharing: Sharing intelligence about cyber threats will be streamlined to notify potential victims and prevent attacks, involving private companies that have insight into threat activities.

4. Prevent Abuse of U.S.-Based Infrastructure: Measures to stop the misuse of U.S. infrastructure, like cloud services, by malicious actors, will be strengthened.

5. Countering Ransomware: The administration is committed to a global approach, leveraging international alliances to prevent ransomware payments and disrupt their financial models.

Pillar Three: Shape Market Forces to Drive Security and Resilience

This pillar seeks to shift the responsibility of cybersecurity from individuals and small organizations to those best positioned to manage risk, like tech providers and critical infrastructure operators. Emphasis is on making the market work in favor of security by holding software companies and data stewards accountable.

Key Initiatives:

1. Accountability for Data Stewards: Companies with access to personal data must take responsibility for securing it, with government support for legislation that enforces data security.

2. Secure IoT Development: IoT devices are increasingly targets for cyberattacks. Labeling programs for IoT security, alongside standards in the IoT Cybersecurity Improvement Act, will guide consumers and businesses in choosing secure products.

3. Liability for Insecure Software: Legislation is planned to hold software companies liable for cybersecurity flaws, driving companies to prioritize security in their products.

4. Federal Procurement: Federal purchasing will prioritize companies that meet cybersecurity standards, incentivizing vendors to adopt secure development practices.

5. Cyber Insurance: Establishing a federal cyber insurance backstop for catastrophic events will stabilize the market, ensuring economic recovery after major incidents.

Pillar Four: Invest in a Resilient Future

The government will invest strategically in research, development, and cybersecurity education to future-proof the nation’s cybersecurity. These investments will address vulnerabilities in emerging technologies such as artificial intelligence, quantum computing, and the Internet of Things (IoT).

Key Strategies:

1. Technical Foundations: Strengthen core internet infrastructure and encourage global adoption of security standards to create a more secure digital ecosystem.

2. Federal Cybersecurity R&D: Increase funding for projects that enhance cybersecurity in AI, cloud computing, industrial controls, and other high-risk areas.

3. Post-Quantum Security: Quantum computing poses risks to current encryption standards, so a national plan for quantum-resistant cryptography is being developed.

4. Clean Energy Infrastructure: As the U.S. transitions to clean energy, cybersecurity for distributed energy resources and smart grids will be prioritized.

5. Digital Identity: Establish secure digital identity systems to reduce fraud, improve access to government services, and streamline digital transactions.

Pillar Five: Forge International Partnerships to Pursue Shared Goals

The final pillar focuses on international cooperation, promoting a global framework for cybersecurity that aligns with democratic values. The U.S. will work with allies to combat cyber threats and counter digital authoritarianism.

Key Objectives:

1. Strengthen Alliances: Collaborate with allies to establish norms and standards that deter harmful cyber behavior by state and non-state actors.

2. Counter Authoritarian Influence: Address challenges from countries that promote digital repression, specifically China and Russia.

3. Assist Developing Nations: Provide technical support and capacity-building programs to nations with emerging digital infrastructure, strengthening their cybersecurity.

Implementation and Long-Term Vision

The National Cybersecurity Strategy emphasizes resilience through two shifts:

1. Rebalancing Responsibility: Key players in the digital ecosystem, such as tech providers and critical infrastructure operators, will be accountable for security, reducing the burden on end-users and small organizations.

2. Incentivizing Long-Term Security Investments: Government actions will encourage both market-driven and regulatory approaches to foster a resilient digital future.

The strategy includes policy continuity with existing regulations and plans for regulatory harmonization across agencies to reduce compliance burdens while enhancing security.

Conclusion

The National Cybersecurity Strategy aims to create a secure, resilient digital ecosystem by fostering collaboration, assigning clear roles and responsibilities, and promoting accountability. This comprehensive approach addresses both current cyber threats and long-term structural vulnerabilities, seeking to protect the United States’ national security, economic stability, and democratic values in an increasingly interconnected world.

“Regulation in Cyberspace” by Gabi Siboni and Ido Sivan-Sevilla

This document provides an in-depth look at the challenges and strategies involved in regulating cyberspace, focusing on protecting national security within increasingly digitized infrastructures. It examines current regulatory models in the U.S., EU, Israel, and other Western countries, detailing the varied approaches that nations have adopted to address cybersecurity risks. Here’s an expanded summary that covers the core points across the document’s chapters, including unique insights from comparative sectors like environmental and nuclear regulation:

Executive Summary

The authors highlight cyberspace as an emerging security frontier, with the private sector’s vulnerabilities posing significant threats to national stability. Despite this risk, existing regulations, particularly in Western countries, have fallen short. The proposed regulatory model outlines a structured, multi-layered approach for Israel’s business-civilian sector. This model combines self-regulation, binding regulation, and incentive-based strategies and seeks to close gaps by building on existing cybersecurity practices.

The proposal includes several innovative solutions for Israel:

1. Business Licensing Law: Using this law as a tool to preemptively identify potential cyber threats within critical infrastructure.

2. Centralizing Regulatory Processes: Central resiliency points within Israel’s cyber economy are emphasized, with targeted state interventions ensuring minimal costs but maximizing security.

3. Incentivization Mechanisms: Introducing incentives like tax breaks, cyber insurance markets, and information-sharing protocols to encourage proactive cybersecurity efforts across sectors.

Insights from the Literature

A literature review reveals considerable variation in how Western countries approach cyber regulation. The U.S., Britain, France, Germany, and Israel show different levels of engagement, influenced by state priorities such as critical infrastructure protection or countering cybercrime. Although all invest heavily in cybersecurity, few systematically regulate the business-civilian sector to mitigate national security risks.

Israel’s approach is comparatively decentralized, with responsibilities spread across government agencies and private organizations. There have been recent attempts to consolidate authority within Israel’s National Cyber Directorate, but a more cohesive regulatory strategy for early threat detection and risk mitigation is still needed.

The Development of a Regulatory Model

To address cyber threats effectively, the authors turn to other regulated fields: environmental protection and nuclear energy. These sectors offer models for managing large-scale risks that could apply to cybersecurity. For instance, Israel’s environmental regulation provides insight into comprehensive protection measures across various risk sources, emphasizing preventive assessments (similar to environmental impact assessments) that could be adapted for cyber threats. The nuclear energy sector, on the other hand, highlights the benefits of private sector cooperation, standardized professional practices, and robust international norms. These principles are applied to the proposed cyberspace model.

Proposed Regulatory Model

The suggested model introduces three main regulatory components:

1. Self-Regulation: For high-sensitivity organizations like the Israel Defense Forces (IDF) and intelligence agencies, internal regulations should be strengthened, with risk management handled independently by each entity.

2. Binding Regulation: This applies to critical sectors where a cyber breach could significantly impact national security. Five main categories fall under this:

• Defense Industries and Sensitive Facilities: Supervised by the Director of Security of the Defense Establishment.

• Critical Infrastructure: Existing National Cyber Directorate oversight continues, but with expanded scope and regular inspections.

• Essential Economic Sectors: Important but non-critical organizations (like hospitals and banks) would develop cyber expertise under sectoral regulators.

• Business-Civilian Sector: Every organization renewing a business license would undergo cyber risk assessments.

• Resiliency Points: Identification of essential service providers and suppliers (e.g., cloud hosts, internet service providers) where protection would significantly bolster Israel’s national cybersecurity.

3. Incentive-Based Regulation: Encouraging the private sector to adopt stronger cybersecurity measures through:

• Cyber Insurance: Establishing a cyber insurance market in Israel to distribute financial risks.

• Tax Incentives: Offering tax breaks for companies that invest in substantial cyber protection.

• Information Sharing: Developing protocols to allow inter-organizational threat data sharing, reducing liability when sharing information improves collective resilience.

Implementation Recommendations

To support this model, the authors propose establishing an independent auditing unit within Israel’s National Cyber Directorate, enhancing Business Licensing Law enforcement, and creating a standardized system for cyber risk management across sectors. The Ministry of Economy would be central to overseeing licensing and compliance, while incentives for private-sector information sharing would be anchored in primary legislation.

Additional steps include:

• Standardizing Cyber Professions: Creating formal qualifications for cybersecurity roles to ensure quality across the sector.

• Public-Private Collaboration Forums: Platforms to share intelligence on critical cyber threats.

• Mandatory Cyberattack Reporting: New laws requiring businesses to report significant cyber events to create actuarial data and foster cyber insurance.

Conclusion

The Regulation in Cyberspace document presents a multi-layered regulatory framework aimed at enhancing Israel’s national security by improving resilience in its business-civilian sector. The proposed model advocates a proactive regulatory structure that integrates private sector involvement, public oversight, and economic incentives. The model’s innovative approach, grounded in insights from environmental and nuclear domains, is poised to address the increasingly complex challenges of cyber risk, especially as new technologies like IoT and AI expand the threat landscape.

USFederalLaw

The document “USFederalLaw” provides a summary of major U.S. federal laws governing cybersecurity and privacy. Key laws include:

1. Computer Fraud and Abuse Act (CFAA): Criminalizes unauthorized access to protected computers, with penalties for fraud, damage, and extortion involving computers.

2. Electronic Communications Privacy Act (ECPA): Protects wire, oral, and electronic communications from unauthorized interception or access, with particular protections based on privacy levels.

3. USA PATRIOT Act: Expands surveillance powers to counter terrorism, amending laws like FISA and the ECPA to ease access to electronic data for intelligence.

4. Foreign Intelligence Surveillance Act (FISA): Governs foreign intelligence gathering through surveillance and mandates judicial oversight.

The National Cybersecurity Strategy: Breaking a 50-Year Losing Streak” by Jason Healey

The article explores the U.S. government’s recent efforts to fundamentally reshape cybersecurity through the National Cybersecurity Strategy, released by the Biden administration on March 2, 2023. Healey explains that, for over 50 years, defenders have struggled against persistent cyber threats, with attackers maintaining an advantage. Past strategies have continually emphasized that unless security is “baked in” from the beginning, defenses are unlikely to succeed long-term.

The new strategy aims to tackle this by introducing two major shifts: encouraging long-term security investments over short-term fixes and shifting defense responsibilities toward entities with greater resources, such as federal agencies and major tech companies, rather than individuals or small organizations. This approach encourages robust cybersecurity frameworks in both public and private sectors, disincentivizing practices that prioritize profit over safety.

Healey categorizes the strategy’s approach to cybersecurity policy into four areas:

1. Each of Us: This involves measures for personal and organizational security, encouraging individuals and organizations to adopt safer practices, like two-factor authentication and encryption.

2. All of Us: Focusing on community-wide security, this segment includes the establishment of regulations and incentives to secure critical infrastructure, support secure digital identities, and consider federal cyber insurance options.

3. Everything: This policy layer addresses the structural foundations of cyberspace, aiming to secure crucial internet protocols and the core internet infrastructure. Innovations, such as end-to-end encryption and automatic updates, are emphasized for their broad impact.

4. Them: A focus on active defense against adversaries, this aspect includes disrupting threat actors, integrating public-private defense efforts, and expanding intelligence-sharing capabilities.

To support implementation, the Office of the National Cyber Director (ONCD) has expanded resources and authority, with Congress enabling the ONCD to influence federal budget allocations to prioritize cybersecurity objectives. The ONCD also benefits from an engaged federal government with specialized roles to sustain and advance the strategy.

Healey concludes that while no single strategy can close the gap attackers have maintained, the new National Cybersecurity Strategy marks an essential step toward a more resilient cyberspace and fortified national security.

For the video lecture content:

Topic 7:

1. Module 3, Topic 7(Putting the “Public” into “Policy”): This lesson examines how national-level cybersecurity policy is shaped by various political forces, including interest groups, lobbyists, and government agencies. It emphasizes that unlike organizational-level policies, national policies are influenced by the broader public and political interests. It also discusses how interest groups, including industry, civil society, and government entities, often compete to influence cybersecurity policies that reflect their own interests, whether those are focused on economic benefit, privacy, or regulatory control .

2. Module 3, Topic 7(Policy vs. Law; Market Failure vs. Government Failure): This lesson distinguishes between policy and law in the context of cybersecurity, highlighting that policies serve as guiding principles, while laws are enforceable rules. It discusses scenarios that justify government intervention, such as market failures or national security concerns, but also warns of government failures when political motives misalign with policy effectiveness. The lesson introduces common problems, like conflicting objectives and unintended consequences, that arise from legislative efforts in cybersecurity .

3. Module 3, Topic 7(U.S. Cybersecurity Legal Framework): This lesson provides an overview of U.S. cybersecurity laws, focusing on four categories: computer crime laws, privacy laws, domestic interception laws, and foreign surveillance laws. It highlights key acts, such as the Computer Fraud and Abuse Act (CFAA) and Electronic Communications Privacy Act (ECPA), examining their evolution and interaction. The lesson underscores how technological advancements continually challenge existing laws, prompting new legislation or amendments to balance privacy, security, and law enforcement objectives .

4. Module 3, Topic 7(Cybersecurity Laws in Detail): This lesson dives into specific cybersecurity laws, including the CFAA and ECPA, and discusses new legislation like the Cybersecurity Information Sharing Act (CISA) and the Cybersecurity and Information Infrastructure Security Agency Act (CISAA). It details how ambiguities in legal language affect enforcement and interpretation. Real-life cases illustrate how evolving laws sometimes struggle to address the nuances of digital crimes, leading to ongoing revisions in legislation to adapt to cyber threats .

5. Module 3, Topic 7 (Encryption Policy and the Privacy-Security Debate): This lesson addresses the longstanding policy debate over encryption’s role in cybersecurity and its implications for privacy and national security. It reviews historical and contemporary conflicts, like the “Crypto Wars,” highlighting the tension between privacy advocates and government agencies that argue encryption hinders criminal investigations. The lesson discusses technical advances such as Transport Layer Security (TLS) 1.3 and DNS encryption protocols, which reflect attempts to strengthen data security. However, these advancements also raise issues for law enforcement’s access to information, exemplified by cases like Apple’s resistance to creating backdoors for encrypted devices .

Topic 8:

Module 3 Topic 8, Lesson 1: Executive Orders and Federal Cybersecurity

This lesson explains how U.S. executive orders have shaped federal cybersecurity policy. It reviews the role of the Department of Homeland Security (DHS) and other federal agencies, such as the Cybersecurity and Infrastructure Security Agency (CISA). The lesson outlines how executive orders mobilize the federal bureaucracy around cybersecurity, promoting centralized authority, public-private partnerships, and critical infrastructure protection .

Module 3 Topic 8, Lesson 2: The Einstein Program and Defense Industrial Base

The Einstein Program, initiated to improve situational awareness across U.S. federal networks, evolved in three phases: Einstein 1 (data collection), Einstein 2 (intrusion detection), and Einstein 3 (monitoring partnerships with private ISPs). Each phase introduced more sophisticated monitoring, though privacy concerns required adjustments. A middle-ground solution involving enhanced cybersecurity services through ISPs provided protections while safeguarding privacy .

Topic 9 :

1. Lesson 1: Definitions of Critical Infrastructure

This lesson introduces the concept of “critical infrastructure,” essential systems whose disruption could severely impact national security, economy, or public safety. Defined legally in the USA PATRIOT Act of 2001, the concept was expanded by the Presidential Policy Directive 21 in 2013, broadening the list to 16 sectors, including transportation, water, energy, and communications. The lesson explains how the critical infrastructure definition has evolved and examines how some sectors, initially non-essential, are now classified due to their potential to pose significant national risks .

2. Lesson 2: Information Sharing Organizations

The lesson explores various information-sharing frameworks, such as Information Sharing and Analysis Centers (ISACs) and Information Sharing and Analysis Organizations (ISAOs), which help coordinate cybersecurity efforts across sectors. Fusion Centers also play a role by integrating threat intelligence among local, state, and federal agencies. The lesson highlights challenges in prioritizing and contextualizing data effectively and illustrates real-world issues with case studies, such as the Texas church shooting, where failures in information-sharing protocols had severe consequences .

3. Lesson 3: Cybersecurity for Energy Delivery Systems (CEDS)

This lesson discusses the cybersecurity risks faced by the U.S. power grid, deemed critical infrastructure due to its essential role in national operations. With over 3,300 utilities and an expansive network of transmission lines, the grid’s interdependence makes it vulnerable to cyberattacks. Despite low cyber incident reports compared to weather-related disruptions, experiments like the Aurora Generator Test demonstrate the physical risks of cyber attacks on energy systems. The lesson reviews policy responses, including the roles of FERC and NERC in enhancing grid resilience through regulatory frameworks .

--

--

Stasy Hsieh
Stasy Hsieh

Written by Stasy Hsieh

Bare honest witness to the world as I have experienced with it.