top of page

Biden’s Cybersecurity Overhaul Sets a New Standard, but Uncertainty Looms with Incoming Administration

In a move to modernize America’s cybersecurity framework, President Biden’s administration unveiled an executive order on Thursday, introducing stringent standards for companies providing software to federal agencies. This directive seeks to enhance the nation’s digital resilience, address escalating cyber threats, and set the tone for future cybersecurity policies. However, with the administration on the cusp of transition, questions linger over the order’s longevity and implementation.

“This order is about strengthening America’s digital foundations,” said Anne Neuberger, deputy national security advisor for cybersecurity and emerging technology, in a Wednesday briefing. She emphasized the critical need for robust defenses following a series of high-profile attacks, including breaches at Change Healthcare, Colonial Pipeline, and U.S. government email systems allegedly orchestrated by Chinese hackers.

Key Highlights of the Executive Order

The order outlines several transformative mandates:

  • Enhanced Software Security: Federal contractors must demonstrate secure development practices, with compliance evidence shared publicly to benefit broader software users.

  • Cloud Security Transparency: Cloud providers will be required to publish secure usage guidelines, as per policies set by the General Services Administration.

  • AI-Driven Cyber Defense: The order recognizes AI’s potential to identify and mitigate threats swiftly, urging federal agencies to adopt AI-powered tools for anomaly detection and incident response.

  • Cyber Trust Mark for IoT: Starting in 2027, the federal government will only procure internet-connected devices bearing the U.S. Cyber Trust Mark, ensuring baseline security standards.

Expert Perspectives

Jim Routh, Chief Trust Officer at Saviynt, applauded the order’s focus on third-party risk management (TPRM) and identity interoperability. “Today’s Executive Order provides additive guidance for federal agencies and suppliers. There is greater emphasis on resilience in cloud computing and maturity of digital identity standards,” he noted. However, Routh critiqued conventional TPRM practices, advocating for real-time vendor assessments informed by dynamic data sources.

Steve Cobb, CISO at SecurityScorecard, echoed concerns about TPRM. “The order highlights verification as a major challenge,” he said. “While it pushes for rigorous assessments, it falls short by not emphasizing continuous monitoring. Suppliers’ security postures must be evaluated in real time to hold vendors accountable.”

Kevin Kirkwood, CISO at Exabeam, raised questions about the broader strategy. “Executive orders address gaps through mandates rather than comprehensive strategies,” he said. “The government should simplify adoption of proven security platforms without overburdening agencies with excessive regulation.”

Casey Ellis, founder of Bugcrowd, highlighted the order’s symbolic significance during a transitional period. “Despite a strong chance of reversal with the administration change, this EO embeds core cybersecurity principles into U.S. policy discourse,” Ellis said.

Marcus Fowler, CEO of Darktrace Federal, emphasized AI’s dual role in cybersecurity. “AI presents both opportunities and challenges,” he noted. “While it enhances threat detection, greater focus is needed on AI’s capacity to neutralize threats through micro decision-making.” Fowler also stressed the importance of public-private partnerships in advancing AI innovation.

James Scobey, CISO at Keeper Security, lauded the order’s emphasis on zero-trust architecture and quantum-resistant cryptography. “These measures align with reducing risks across federal systems and supply chains,” he said. Scobey also underscored workforce development as crucial for implementing advanced cybersecurity strategies.

Jason Soroko, Senior Fellow at Sectigo, highlighted the urgency of transitioning to quantum-resistant cryptography. “Federal agencies must adopt NIST-approved algorithms within 18-24 months and retrofit legacy systems to meet new standards,” he said. Soroko also noted that stringent supplier requirements could elevate industry-wide security standards.

James Yaeger, VP of Public Sector at Abnormal Security, voiced concerns over the limited scope of AI deployment. “Restricting AI to Pentagon use is a missed opportunity,” he argued. Yaeger called for broader adoption across federal agencies and emphasized the need for expanded visibility, particularly in email systems, which remain the top threat vector.

Challenges and the Road Ahead

While the executive order’s ambitions are clear, its implementation faces hurdles, particularly with the incoming administration. Neuberger acknowledged that discussions with the new administration’s cybersecurity team had yet to occur. “We are open to conversations during this transition period,” she said.

Experts like Routh and Cobb stress that true progress hinges on real-time risk management and continuous monitoring. Kirkwood and Fowler emphasize the need for a layered, flexible approach to cybersecurity strategy. Meanwhile, Ellis and Soroko see the order as a pivotal, albeit fragile, step in embedding foundational principles into U.S. policy.

Ultimately, the order’s success will depend on sustained collaboration between public and private sectors. As Scobey put it, “This directive reinforces the need for a unified approach to cybersecurity. Proactive measures today will define our resilience against the sophisticated threats of tomorrow.”

bottom of page