Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

White House Unveils Strategic Plan for Cybersecurity R&D Program

Federal Government Releases “Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program”

The Office of Science and Technology Policy (OSTP) released a report detailing the roadmap of priorities for government agencies that sponsor research and development in cyber-security.

Federal Government Releases “Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program”

The Office of Science and Technology Policy (OSTP) released a report detailing the roadmap of priorities for government agencies that sponsor research and development in cyber-security.

Federal Cybersecurity R&D Strategic PlanIn a report entitled, Trusthworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, the OSTP organized the government’s priorities into the following four areas: 

1. Inducing Change – using game-changing themes to understand the root causes of existing cybersecurity deficiencies with the goal of disrupting the status quo;

2. Developing Scientific Foundations – minimizing future cybersecurity problems by developing the science of security;

3. Maximizing Research Impact – catalyzing coordination, collaboration, and integration of research activities across Federal agencies for maximum effectiveness;

4. Accelerating Transition to Practice – expediting improvements in cyberspace from research findings through focused transition programs.

According to the report, the goal is to achieve “greater cyberspace resiliency. As part of outlining how to reach those ends, the government establishes four “themes”: technology for secure software development; economic incentives that may involve market-based, legal, regulatory, or institutional interventions; strategies to help security professionals analyze and deploy mechanisms that increase cost and complexity for attackers; and the development of what the report calls “tailored trustworthy spaces,” which provide distributed, trusted environments.

Federal Cybersecurity R&D Plan

Under each of those themes are different focus areas, including technology for more secure wireless mobile networks and the development of tools designed to deepen visibility into cyberspace and the threat landscape.

Advertisement. Scroll to continue reading.

“Given the magnitude and pervasiveness of cyberspace threats to our economy and national security, it is imperative that we fundamentally alter the dynamics in cybersecurity through the development of novel solutions and technologies,” according to a joint blog post from U.S. Chief Technology Officer Aneesh Chopra and Howard Schmidt, cybersecurity coordinator and special assistant to the President. “The Federal government is in a unique position to leverage its fundamental research resources to address the underlying causes of cybersecurity problems. Using this strategic plan as a road map, sustained efforts in these areas will result in a more secure and trustworthy cyberspace.”

“We invite researchers and innovators in industry and academia to join us in this effort,” the duo blogged. “Together, we can maximize the benefits of research and accelerate their transition into the marketplace.”

The Office of Science and Technology Policy was established by the National Science and Technology Policy, Organization, and Priorities Act of 1976. OSTP’s responsibilities include advising the President in policy formulation and budget development on questions in which science and technology are important elements; articulating the President’s science and technology policy and programs; and fostering strong partnerships among Federal, state, and local governments, and the scientific communities in industry and academia.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem