Trustwave SpiderLabs Exposes Unique Cybersecurity Threats in the Public Sector. Learn More

Trustwave SpiderLabs Exposes Unique Cybersecurity Threats in the Public Sector. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Biden Administration Releases National Cybersecurity Strategy

President Joe Biden took the next step in the nation's ongoing effort to combat cyber threats by issuing the National Cybersecurity Strategy on March 2, which focuses on growing the public-private sector security partnership needed to protect critical infrastructure, dismantle threat groups, and increase resiliency.

“Trustwave Government Services (TGS) believes the National Cybersecurity Strategy is an important next step in the nation’s ability to thwart cyberattacks from both state-sponsored and criminal threat actors,” said Bill Rucker, president of TGS. “TGS is ready to support and extend our current partnerships with federal, state and local governments in order to protect critical assets and the privacy of our citizens.”

The 39-page document outlines the Biden Administration's long-term plan to protect U.S. interests and is the latest in a line of Federal efforts designed to bolster the nation's cybersecurity posture. These include the 2021 National Security Strategy Executive Order 14028 (Improving the Nation's Cybersecurity), 2021 National Security Memorandum 5 (Improving Cybersecurity for Critical Infrastructure Control Systems), and 2022 M-22-09 (Moving the U.S. Government Toward Zero-Trust Cybersecurity Principles).

"This strategy outlines how the federal government will use all tools available to reshape incentives and achieve unity of effort in a collaborative, equitable, and mutually beneficial manner. We must ensure that market forces and public programs alike reward security and resilience, build a robust and diverse cyber workforce, embrace security and resilience by design, strategically coordinate research and development investments in cybersecurity, and promote the collaborative stewardship of our digital ecosystem," the document states.

The Biden Administration's ultimate goal is to create a path to address these threats and secure the promise of our digital future by making the digital ecosystem defensible with a cyber defense methodology that is overwhelmingly easier, cheaper, and more effective. The plan aims to create a resilient environment where cyber incidents and errors will have little widespread or lasting impact; and where our most cherished values shape—and are in turn reinforced by— our digital world.

“We cannot understate the importance of coordinating cybersecurity efforts between the public and private sectors. TGS believes the cybersecurity expertise provided by the private sector combined with the power of the federal government to ensure effective and widespread adoption is the best way to protect our nation,” Rucker said.

The strategy centers on five specific areas that Federal efforts will focus upon to build and enhance collaboration.

  1. Defend Critical Infrastructure by:
  • Expanding the use of minimum cybersecurity requirements in critical sectors to ensure national security and public safety and harmonizing regulations to reduce the burden of compliance
  • Enabling public-private collaboration at the speed and scale necessary to defend critical infrastructure and essential services
  • Defending and modernizing Federal networks and updating Federal incident response policy.
  1. Disrupt and Dismantle Threat Actors by:
  • Using all instruments of national power, making malicious cyber actors incapable of threatening the national security or public safety of the United States
  • Strategically employing all tools of national power to disrupt adversaries
  • Engaging the private sector in disruption activities through scalable mechanisms
  • Addressing the ransomware threat through a comprehensive Federal approach and in lockstep with international partners.
  1. Shape Market Forces to Drive Security and Resilience by:
  • Placing responsibility on those within the digital ecosystem that are best positioned to reduce risk and shift the consequences of poor cybersecurity away from the most vulnerable in order to make the digital ecosystem more trustworthy
  • Promoting privacy and the security of personal data
  • Shifting liability for software products and services to promote secure development practices
  • Ensuring that Federal grant programs promote investments in new infrastructure that are secure and resilient.
  1. Invest in a Resilient Future by: 
  • Reducing systemic technical vulnerabilities in the foundation of the Internet and across the digital ecosystem while making it more resilient against transnational digital repression
  • Prioritizing cybersecurity R&D for next-generation technologies such as postquantum encryption, digital identity solutions, and clean energy infrastructure and developing a diverse and robust national cyber workforce.
  1. Forge International Partnerships to Pursue Shared Goals by:
  • Leveraging international coalitions and partnerships among like-minded nations to counter threats to the digital ecosystem through joint preparedness, response, and cost imposition
  • Increasing the capacity of partners to defend themselves against cyber threats, both in peacetime and in crisis; and working with allies and partners to make secure, reliable, and trustworthy global supply chains for information and communications technology and operational technology products and services.

White House Calls Out China, Russia, Iran and North Korea

The National Cybersecurity Strategy specifically cited China, Russia, North Korea, and others as acting against U.S. and international interests in cyberspace. U.S. authorities also raised the threat posed by criminal syndicates through the use of ransomware and attacks on critical infrastructure to a level where they pose a threat to the nation and its allies.

“Their reckless disregard for the rule of law and human rights in cyberspace is threatening US National Security and economic prosperity,” the strategy states, adding that China now presents the broadest, most active and persistent threat to both government and private sector networks and I the only country  with both the intent and power to reshape international order.

The document said the Russian government has not shied away from using its cyber abilities to destabilize and interfere with its neighbors and democracies worldwide, meanwhile it noted that Iran and North Korea are also growing their abilities and willingness to conduct malicious cyber activities.

Trustwave’s Role in Defending Government Agencies

Trustwave Government Solutions (TGS), a Federally focused Managed Detection and Response (MDR) provider and the wholly-owned subsidiary of Trustwave Holdings, has a long history of partnership with governmental agencies and works daily to protect our Federal partners from cyber threats.

Trustwave recently expanded this capability announcing a partnership with Palo Alto Networks by achieving Palo Alto Networks Cortex eXtended Managed Detection and Response (XMDR) Specialization.

The Cortex XMDR Specialization will enable TGS to combine the power of best-in-class Cortex XDR™ detection and response solution with their leading managed services offerings — helping customers worldwide streamline security operations center (SOC) operations and quickly mitigate cyber threats.

“We are thrilled to be expanding our managed security services collaboration with Palo Alto Networks to bring a whole new level of protection to government institutions,” Rucker said. “This achievement confirms our commitment to providing our clients with next-generation security technology and services and offering the first-ever managed detection and response service specifically built for the rigorous requirements of the federal government.”

DOC_19651_gov-talk-to-sales

 

Latest Trustwave Blogs

Email Security Must Remain a Priority in the Wake of the LabHost Takedown and BEC Operator’s Conviction

Two positive steps were taken last month to limit the damage caused by phishing and Business Email Compromise (BEC) attacks when a joint action by UK and EU law enforcement agencies compromised the...

Read More

Defining the Threat Created by the Convergence of IT and OT in Critical Infrastructure

Critical infrastructure facilities operated by the private and public sectors face a complex and continuously growing web of security threats that are compounded by the increasing convergence of...

Read More

Behind the MDR Curtain: The Importance of Original Threat Research

Searching for a quality-managed detection and response (MDR) service provider can be daunting, with dozens of vendors to choose from. However, in its 2023 Gartner® Market Guide for Managed Detection...

Read More