Shortcomings Of The National Cybersecurity Strategy 640b5c9c71522

Shortcomings of the National Cybersecurity Strategy

March 10, 2023
The National Cybersecurity Strategy fails to adequately address fundamental control system and critical infrastructure issues

In May 1998, Presidential Decision Directive (PDD) 63 mandated the cyber security of the critical infrastructures be implemented by May 2003 (not a typo). Twenty years and multiple PDDs and Presidential Executive Orders later, the government agencies responsible for securing the critical infrastructures are still failing to adequately address the issues that can cripple our country and its critical infrastructures – the process control systems. The more than 17 million actual control system cyber incidents attest to the failure. The March 2023 National Cybersecurity Strategy is based on issues associated with Internet Protocol (IP) networks and consumer Internet of Things (IOT) devices, not control system devices such as process sensors that affect process safety nor do they address the cultural issues between the engineering and network security communities.

Joe Weiss

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.