July 19, 2024 By Josh Nadeau 2 min read

On July 10, 2024, the White House released a new memo regarding the Biden administration’s cybersecurity investment priorities, initially proposed in July 2022. This new memorandum now marks the third time the Office of the National Cyber Director (ONCD), headed by Harry Coker, has released updated priorities and outlined procedures regarding the five core pillars of the National Cybersecurity Strategy Implementation Plan (NCSIP), now relevant through fiscal year 2026.

Key highlights from the FY26 memorandum

In the latest annual version of the budget memo, a more strategic shift has been introduced with a focus on zero trust principles in organizations and improved collaboration between the public and private sectors.

Some of the key highlights of this newest memo include:

A focus on NCS pillars

The memo reinforces President Biden’s proposed five pillars of the National Cybersecurity Strategy (NCS), which are:

  • Defend critical infrastructure
  • Disrupt and dismantle threat actors
  • Shape market forces
  • Invest in a resilient future
  • Forge international partnerships

Updated zero trust requirements

Agencies are now required to submit their zero trust implementation strategies within 120 days. This includes documentation of their current and targeted maturity levels for high-value systems.

Enhanced public-private sector integrations

Before budgets are submitted, Sector Risk Management Agencies (SRMAs) need to demonstrate how they prioritize the various risk management elements outlined in the National Security Memorandum 22 (NSM-22).

Cyber workforce development

Renewed emphasis is being placed on addressing the recruiting, hiring and retention challenges in the federal cyber workforce. This includes introducing more flexible hiring requirements and removing specific degree requirements when appropriate.

Post-quantum cryptography preparation

The FY26 memo directs federal agencies to allocate resources for transitioning critical and sensitive networks and systems to quantum-resistant cryptography. This includes developing and implementing new cryptographic algorithms resistant to quantum attacks.

The evolution of the NCSIP and the ONCD

Over the past few years, the Biden administration has introduced a radical approach to cybersecurity resilience, painting federal cybersecurity priorities and strategies in a much more serious tone than before.

The establishment of the ONCD back in February 2021 marked an important step forward in the country’s response to the escalating dangers of today’s modern cybersecurity threats.

Since then, the eyes have been on the ONCD to help strengthen the nation’s cyber defenses, using the introduction of the NCSIP as a way to lead this effort. When reviewing the suggested updates and amendments between the first and third iterations of this policy, it’s clear that Coker is making some progressive improvements.

In just a couple of years, the NCSIP has expanded its scope to be much more actionable, listing clearer directives toward improving the nation’s cybersecurity infrastructure, increasing collaboration between public and private sectors, and improving the government’s ability to respond to cyber threats.

The expanding role of federal cyber regulation

The ONCD’s role is starting to become more of a proactive influencer when it comes to federal cybersecurity policy-making. Stepping away from the broad categorization of cybersecurity initiatives to more specific deadlines surrounding agency requirements on zero trust implementation planning and explicit mandates for quantum-resistant cryptography readiness, it’s clear that the ONCD is becoming more confident in what it can ask of the federal government.

As we move forward, it’s fair to say we’ll continue to see more refinements of the NCSIP with increasingly more detailed guidance and requirements for agencies to follow.

More from News

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

Research finds 56% increase in active ransomware groups

4 min read - Any good news is welcomed when evaluating cyber crime trends year-over-year. Over the last two years, IBM’s Threat Index Reports have provided some minor reprieve in this area by showing a gradual decline in the prevalence of ransomware attacks — now accounting for only 17% of all cybersecurity incidents compared to 21% in 2021. Unfortunately, it’s too early to know if this trendline will continue. A recent report released by Searchlight Cyber shows that there has been a 56% increase in…

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today