Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

CISA Announces Cyber Security Strategy Plan for 2024 to 2026

admin by admin
Aug 8, 2023
in News
A A
0

On August 4, 2023, America’s Cyber defense agency CISA announced Strategic Plan for FY24- FY26. It further adds that the plan would bring a new vision for cybersecurity, a vision grounded in collaboration, innovation, and in accountability.

The Cybersecurity and Infrastructure Security Agency (CISA) is responsible for strengthening cybersecurity and infrastructure protection across all levels of government and improving the government’s cybersecurity protections against private and nation-state hackers.

As our nation relies on connected technologies every hour of every day of our daily lives, Malicious cyber actors constantly attempt to exploit this reliance for financial or strategic gain. 

We must change how we design and develop technology products, such that exploitable conditions are uncommon and secure controls are enabled before products reach the market, said the CISA.

 Cybersecurity Strategic Plan outlines three enduring goals:

GOAL 1: Address Immediate Threats: CISA will work with partners to gain visibility to emerging threats and accelerate mitigation of exploitable conditions that adversaries recurringly exploit.

GOAL 2: harden the Terrain: CISA will provide support, guidance, and direction for organizations to prioritize effective security investments that measurably reduce the likelihood of damaging

intrusions.

GOAL 3: Drive Security At Scale: CISA aims to prioritize security in products throughout their lifecycle. Confront the challenge of unsafe technology products to reduce the risks and fully leverage the benefits posed by artificial intelligence.

“Defending the systems and assets that constitute our critical infrastructure is vital to our national security, public safety, and economic prosperity … We aim to operationalize an enduring and effective model of collaborative defense that equitably distributes risk and responsibility and delivers a foundational level of security and resilience for our digital ecosystem.”

Cybersecurity Strategic Plan Overview

According to CISA, the three-year strategic plan is a necessary and ambitious approach toward safeguarding cyberspace for all Americans.

CISA aims to optimize cyber defense operations to identify, prevent, and address acute threats and vulnerabilities and mitigate incidents more quickly throughout the implementation plan.

Keep informed about the latest Cyber Security News by following us on GoogleNews, Linkedin, Twitter, and Facebook.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.