As part of the President’s Cybersecurity National Action Plan (CNAP), the Administration released the 2016 Federal Cybersecurity Research and Development Strategic Plan, which was coordinated by the National Science and Technology Council.
Cyber Security and Information Assurance (CSIA) Interagency Working Group coordinates the activities of the CSIA Program Component Area.
As part of the President’s Cybersecurity National Action Plan (CNAP), the Administration released the 2016 Federal Cybersecurity Research and Development Strategic Plan, which was coordinated by the National Science and Technology Council. This is the most comprehensive Federal cybersecurity research and development (R&D) plan to date, and it updates 2011’s Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program. With the goal of making cyberspace inherently more secure, the plan challenges the cybersecurity R&D community to provide methods and tools for deterring, protecting, detecting, and adapting to malicious cyber activities. The plan defines near-, mid-, and long-term goals to guide and evaluate progress. Read more in the White House announcement of the strategic plan.
In 2011, Federal agencies released “Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program”, a strategic plan for cybersecurity research and development.
The strategic plan provides a framework for prioritizing Federal cybersecurity R&D in a way that concentrates research efforts on limiting current cyberspace deficiencies, precluding future problems, and expediting the infusion of research accomplishments into the marketplace. The main thrusts of the strategy are:
Achieving enduring trustworthiness of cyberspace requires new paradigms that re-balance security asymmetries of today’s landscape: the cost of simultaneously satisfying all the requirements of an ideal cybersecurity solution in a static system is impossibly high, and so we must enable sub-spaces in cyberspace to support different security policies and different security services for different types of interactions; the cost of attack is asymmetric, favoring the attacker, and so defenders must increase the cost of attack and must employ methods that enable them to continue to operate in the face of attack; the lack of meaningful metrics and economically sound decision making in security misallocates resources, and so we must promote economic principles that encourage the broad use of good cybersecurity practices and deter illicit activities.