This presentation delves into the pressing concern of cybersecurity in the digital age, outlining the rising threats and the implications for national security. It provides a critical evaluation of past and present cybersecurity policies from various administrations while highlighting the pivotal role of legislation and cybersecurity programs. The presentation also proposes numerous strategic measures to bolster cybersecurity, minimize human error, and tackle cybercrimes more effectively.
AS, Sungard. “Ransomware Attacks against U.S. Government Entities: 5 Key Observations and Takeaways for Municipalities.” Sungard AS United States, 10 Feb. 2021, https://www.sungardas.com/en-us/blog/ransomware-attacks-on-us-government-entities/.
Biden, Joe. “Executive Order on Improving the Nation's Cybersecurity.” The White House, The United States Government, 12 May 2021, https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/.
“Biden's Executive Order on Cybersecurity: What's in It and Who Should Be Ready for It.” PwC, https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/library/bidens-executive-order-cybersecurity.html
Chabrow, Eric, and Ron Ross. “Obama Signs 5 Cybersecurity Bills.” Bank Information Security, Information Security Media Group, Corp, 18 Dec. 2014, https://www.bankinfosecurity.com/obama-signs-5-cybersecurity-bills-a-7697. .
Contreras, Belisario. “3 Ways Governments Can Address Cybersecurity in the Post-Pandemic World.” World Economic Forum, World Economic Forum, 29 June 2020,
https://www.weforum.org/agenda/2020/06/3-ways-governments-can-address-cyber-threats-cyberattacks-cybersecurity-crime-post-pandemic-covid-19-world/.
“Cybersecurity: A Global Priority and Career Opportunity.” University of North Georgia, https://ung.edu/continuing-education/news-and-media/cybersecurity.php.
“Cybersecurity.” Cybersecurity | Homeland Security, 11 Nov. 2022, https://www.dhs.gov/topics/cybersecurity.
“Cyber Security Law: Top 5 Cyber Security Laws Everyone Should Know.” Cyber Security Degree, EducationDynamics , 7 Jan. 2021, https://cyber-security.degree/resources/5-cyber-security-laws-to-know/.
Fadia, Ankit, et al. “Follow the Leaders: How Governments Can Combat Intensifying Cybersecurity Risks.” McKinsey & Company, McKinsey & Company, 16 Sept. 2020,
https://www.mckinsey.com/industries/public-and-social-sector/our-insights/follow-the-leaders-how-governments-can-combat-intensifying-cybersecurity-risks.
“The Importance of Cyber Technologies in Government.” National Institutes of Health, U.S. Department of Health and Human Services, https://nitaac.nih.gov/resources/articles/importance-cyber-technologies-government.
McLean, Mike. “2023 Must-Know Cyber Attack Statistics and Trends.” Embroker, Embroker Insurance Services LLC, 6 Mar. 2023, https://www.embroker.com/blog/cyber-attack-statistics/.
Mitchell, Travis. “1. Americans' Experiences with Data Security.” Pew Research Center: Internet, Science & Tech, Pew Research Center, 15 Sept. 2022, https://www.pewresearch.org/internet/2017/01/26/1-americans-experiences-with-data-security/.
“The Importance of Mitigating Human Error in Cybersecurity.” Cetrom Information Technology, Inc., 6 June 2022, https://www.cetrom.net/resources/blog/importance-of-mitigating-human-error-in-cybersecurity.
Wheeler, Tom. “Protecting the Cybersecurity of America's Networks.” Brookings, Brookings, 9 Mar. 2022, https://www.brookings.edu/blog/techtank/2021/02/11/protecting-the-cybersecurity-of-americas-networks/.