Verification works best when it’s low-burden, hard to fake, and built to serve everyone over time.
www.csoonline.com/article/4078...
#cybersecurity #datasovereignty #cyberpolicy
@cyallianceprez.bsky.social
        
            www.csoonline.com/article/4078...
#cybersecurity #datasovereignty #cyberpolicy
@cyallianceprez.bsky.social
Data sovereignty proof: How to verify controls like ‘Project Texas’
            Go beyond data sovereignty promises to proof with five CSO controls: zero-trust, local keys, logs, validation and third-party attestation.
          
            
            www.csoonline.com
          
        
          
            October 28, 2025 at 11:59 AM
            
              
              Everybody can reply
            
          
        
          
          
          2 likes
          
        
        
      
    Join us in congratulating @cyallianceprez.bsky.social for being honored with the Cyber Future Foundation Cyber Futurist Award. Congratulations, Michael. Well deserved! 
#cybersecurity #cyberpolicy #leadership
          #cybersecurity #cyberpolicy #leadership
            October 27, 2025 at 9:55 PM
            
              
              Everybody can reply
            
          
        
          
          
          2 likes
          
        
        
      
    CTA's @cyallianceprez.bsky.social said "the downsizing runs the risk of leaving CISA blind to certain threats and trends and will also limit CISA’s ability to influence the private sector and communicate its priorities.”
tinyurl.com/5n92cncb
#cybersecurity #cyberpolicy
        
            tinyurl.com/5n92cncb
#cybersecurity #cyberpolicy
CISA’s international, industry and academic partnerships slashed
            The latest round of sweeping layoffs could hamper the business community’s collaboration with the beleaguered cyber agency.
          
            
            tinyurl.com
          
        
          
            October 23, 2025 at 4:20 AM
            
              
              Everybody can reply
            
          
        
          2 reposts
          
          12 likes
          1 saves
        
        
      
    "These changes increase the likelihood that a problem will be missed or overlooked, and they will make marshaling the capability to respond to significant incidents harder," @cyallianceprez.bsky.social 
www.govinfosecurity.com/cisa-in-disa...
#cybersecurity #CISA2015 #cyberpolicy
        
            www.govinfosecurity.com/cisa-in-disa...
#cybersecurity #CISA2015 #cyberpolicy
CISA in Disarray Amid Shutdown and Growing Political Threats
            Facing major turnover, partisan upheaval and a government shutdown, the U.S. cyber defense agency is now operating at a fraction of its strength, leaving states and
          
            
            www.govinfosecurity.com
          
        
          
            October 13, 2025 at 5:30 PM
            
              
              Everybody can reply
            
          
        
          
          
          1 likes
          
        
        
      
    Now on stage at @CyberNextDC: Safeguarding the Backbone: Cybersecurity for Essential Services
Products are facing the internet that were never designed to face the internet. Secure by Operations can manage this.
@gca.bsky.social cyberseccenter.bsky.social
@cyberalliance.bsky.social
#cyberpolicy
          Products are facing the internet that were never designed to face the internet. Secure by Operations can manage this.
@gca.bsky.social cyberseccenter.bsky.social
@cyberalliance.bsky.social
#cyberpolicy
            October 8, 2025 at 7:04 PM
            
              
              Everybody can reply
            
          
        
          1 reposts
          
          1 likes
          
        
        
      
    Now on stage at #CyberNextDC Cyber Force Commission Update panel 
www.youtube.com/live/VxtE68R...
@cyberseccenter.bsky.social ky.social @cyberalliance.bsky.social
#cybersecurity #cyberpolicy
          www.youtube.com/live/VxtE68R...
@cyberseccenter.bsky.social ky.social @cyberalliance.bsky.social
#cybersecurity #cyberpolicy
            October 8, 2025 at 6:38 PM
            
              
              Everybody can reply
            
          
        
          
          
          1 likes
          
        
        
      
    Steve Vintz Co-Chief Executive Officer, Tenable speaking at #CyberNextDC 
"21st century threat with 20th century bureaucracy"
#cyberpolicy #cybersecurity
@cyberseccenter.bsky.social @cyberalliance.bsky.social
          "21st century threat with 20th century bureaucracy"
#cyberpolicy #cybersecurity
@cyberseccenter.bsky.social @cyberalliance.bsky.social
            October 8, 2025 at 5:17 PM
            
              
              Everybody can reply
            
          
        Now speaking at #CyberNextDC, the Cyber Luminaries Panel.
Paraphrasing: Many attacks are from teenagers - if we can't stop teenagers, we can't stop nation states. The advantage is to the attackers, not the defenders. Better to prioritize addressing the consequences of attacks.
#cyberpolicy
          Paraphrasing: Many attacks are from teenagers - if we can't stop teenagers, we can't stop nation states. The advantage is to the attackers, not the defenders. Better to prioritize addressing the consequences of attacks.
#cyberpolicy
            October 8, 2025 at 2:42 PM
            
              
              Everybody can reply
            
          
        Now speaking at #CyberNextDC @megans.bsky.social on What Cyber Policy Needs Next: Through the Looking Glass of the Ransomware Task Force
"We are too dependable on undependable things'
#cyberpolicy #cybersecurity #ransomware
@cyberalliance.bsky.social @cyberseccenter.bsky.social
          "We are too dependable on undependable things'
#cyberpolicy #cybersecurity #ransomware
@cyberalliance.bsky.social @cyberseccenter.bsky.social
            October 8, 2025 at 2:03 PM
            
              
              Everybody can reply
            
          
        
          
          
          1 likes
          
        
        
      
    The #CyberNextDC conference is kicking off. Watch here: youtube.com/live/VxtE68R... 
#cybersecurity #cyberpolicy
          #cybersecurity #cyberpolicy
      @cybercoalition.bsky.social executive director Ari Schwartz is kicking off #CyberNextDC! Watch the program live here: youtube.com/live/VxtE68R... 
@cyberalliance.bsky.social
      
          @cyberalliance.bsky.social
CyberNext DC 2025
          YouTube video by Center for Cybersecurity Policy and Law
        
          
          youtube.com
        
      
  
            October 8, 2025 at 1:44 PM
            
              
              Everybody can reply
            
          
        Join us Oct 8th for CyberNextDC 
Registration: tinyurl.com/mu8zpem5
We will examine how govt and industry can collaborate to confront new and emerging threats, strengthen supply chain resilience and advance proactive strategies to protect our digital future
@cyallianceprez.bsky.social
#cyberpolicy
          Registration: tinyurl.com/mu8zpem5
We will examine how govt and industry can collaborate to confront new and emerging threats, strengthen supply chain resilience and advance proactive strategies to protect our digital future
@cyallianceprez.bsky.social
#cyberpolicy
            October 7, 2025 at 1:38 PM
            
              
              Everybody can reply
            
          
        🟦 AI is outpacing old cybersecurity rule books. It’s time to build intelligent policies that evolve, adapt, and defend at machine speed. 🔐🤖
#AICybersecurity #DigitalDefense #CyberPolicy #CyberlensInnovations
thecyberlens.com/p/rethinking...
        
            #AICybersecurity #DigitalDefense #CyberPolicy #CyberlensInnovations
thecyberlens.com/p/rethinking...
Rethinking Cyber Policy for the Age of AI Security
            Why Intelligent Standards Could Redefine the Future of Digital Defense
          
            
            thecyberlens.com
          
        
          
            October 7, 2025 at 12:56 AM
            
              
              Everybody can reply
            
          
        What if hackers targeted America’s farms and ports? At the 2025 Sanford Cyber Cup, Duke student teams had one day to brief the National Security Council in a high-stakes simulation.
Read about the interdisciplinary competition: duke.is/2025-sanford...
#CyberPolicy @hofftechpolicy.bsky.social
          Read about the interdisciplinary competition: duke.is/2025-sanford...
#CyberPolicy @hofftechpolicy.bsky.social
            October 6, 2025 at 10:04 PM
            
              
              Everybody can reply
            
          
        
          
          
          2 likes
          
        
        
      
    The @cyallianceprez.bsky.social predicted that some companies will “suspend some sharing activities with the government,” but he added that a lot will depend on “each company’s risk tolerance.” Reduced collaboration will continue 
tinyurl.com/b85v7x9u
#cybersecurity #cyberpolicy #threatintelligence
        
            tinyurl.com/b85v7x9u
#cybersecurity #cyberpolicy #threatintelligence
Landmark US cyber-information-sharing program expires, bringing uncertainty
            Without legal protections, companies might stop reporting information about cybersecurity threats.
          
            
            www.cybersecuritydive.com
          
        
          
            October 2, 2025 at 11:47 AM
            
              
              Everybody can reply
            
          
        
          
          
          2 likes
          
        
        
      
    "A short term blip could cause some temporary problems, but probably not big ones," @cyallianceprez.bsky.social said. "The real issue is if the lapse stretches into months and there's no path forward for reauthorization."
www.bankinfosecurity.com/what-happens...
#cyberpolicy #cybersecurity
        
            www.bankinfosecurity.com/what-happens...
#cyberpolicy #cybersecurity
What Happens to Cyberthreat Sharing After CISA 2015?
            With a key cyberthreat sharing law expiring Tuesday, analysts tell Information Security Media Group legal protections enabling cyberthreat sharing across the public
          
            
            www.bankinfosecurity.com
          
        
          
            October 1, 2025 at 11:13 AM
            
              
              Everybody can reply
            
          
        From shaping early government cyber budgets to confronting incidents like the Sony hack and OPM breach, @cyallianceprez.bsky.social reflects on how U.S. policy thinking matured in real time.  
youtu.be/KJcm63UFkVY?...
#cybersecurity #cyberpolicy
        
            youtu.be/KJcm63UFkVY?...
#cybersecurity #cyberpolicy
Code and Country Ep. 19: Michael Daniel, CEO of the Cyber Threat Alliance
            YouTube video by Plurilock Security Inc.
          
            
            youtu.be
          
        
          
            September 19, 2025 at 12:55 PM
            
              
              Everybody can reply
            
          
        
          
          
          2 likes
          
        
        
      
    Set to be introduced today, the UK's long-awaited #CyberSecurity & Resilience Bill has been delayed again due to a cabinet reshuffle, raising concerns about the nation's ability to protect against evolving digital threats.
#CSRB #CyberPolicy #InfoSec
        
            #CSRB #CyberPolicy #InfoSec
UK delays introducing new cybersecurity legislation, again
            As high-profile incidents continue to disrupt British companies, the U.K. government, amid a cabinet reshuffle of senior and junior ministers, is delaying a bill to update cybersecurity regulations.
          
            
            therecord.media
          
        
          
            September 17, 2025 at 7:00 AM
            
              
              Everybody can reply
            
          
        “It’s very hard to map a political ideology on this mishmash of video game references and hints of different internet subcultures,” said Emerson Brooking, a fellow at the Atlantic Council, an international-affairs think tank, and a former cyberpolicy adviser at the Defense Department.
          
            September 13, 2025 at 10:45 AM
            
              
              Everybody can reply
            
          
        CTA In Focus, our Q3 newsletter. This quarter theme is Unity in Action. @cyberalliance.bsky.social members exemplify unity daily. 
www.cyberthreatalliance.org/resources/as...
#cybersecurity #threatintelligence #cyberpolicy #strongertogether
        
            www.cyberthreatalliance.org/resources/as...
#cybersecurity #threatintelligence #cyberpolicy #strongertogether
CTA in Focus (September 2025) - Cyber Threat Alliance
            
          
            
            www.cyberthreatalliance.org
          
        
          
            September 9, 2025 at 10:43 PM
            
              
              Everybody can reply
            
          
        
          
          
          1 likes
          
        
        
      
    They’re also pushing for AI-powered cyber defense, strengthened #CISA funding, preserved CVE program, and accelerated moves to post-quantum crypto and zero-trust models.
#ransomNews #CyberPolicy #AITechStrategy
          #ransomNews #CyberPolicy #AITechStrategy
            August 15, 2025 at 11:37 AM
            
              
              Everybody can reply
            
          
        
          
          
          2 likes
          
        
        
      
    Why are there no US or European APTs on public threat intel lists? It’s not a lack of capability — it’s politics, secrecy & selective visibility.
🔗 open.substack.com/pub/privacyr...
#CyberSecurity #APT #CyberEspionage #ThreatIntelligence #Geopolitics #CyberPolicy #Infosec #APTResearch
          🔗 open.substack.com/pub/privacyr...
#CyberSecurity #APT #CyberEspionage #ThreatIntelligence #Geopolitics #CyberPolicy #Infosec #APTResearch
            August 15, 2025 at 10:50 AM
            
              
              Everybody can reply
            
          
        Clear, real-world security documentation is often the missing link between audit-readiness and chaos. Let’s make sure your plans work under pressure—not just on paper. #CyberPolicy #SecurityPlans #Compliance www.natsar.com
        
            Cybersecurity Consulting & Strategic Advisory Services | Natsar
            With decades of experience, Natsar provides tailored cybersecurity consulting and strategic leadership advisory services to help you safeguard your organization and achieve your business objectives.
          
            
            www.natsar.com
          
        
          
            August 8, 2025 at 2:03 PM
            
              
              Everybody can reply
            
          
        
          
          
          1 likes
          
        
        
      
    🔐 Canada’s Bill C-2 could force decryption through secret orders while still claiming GDPR alignment. You can’t build trust with backdoors. I wrote about what this means for encryption, privacy & cross-border data handling.
#DigitalRights #EncryptionMatters #CyberPolicy
medium.com/@kim_9194/en...
        
            #DigitalRights #EncryptionMatters #CyberPolicy
medium.com/@kim_9194/en...
🇨🇦 Encryption, Accountability, and the Cliff Edge: Why Canada Must Rethink Bill C-2
            I grew up in Canada. I’m a proud citizen, and still carry with me that deep, cultural belief that our country, at its best, strives to…
          
            
            medium.com
          
        
          
            August 6, 2025 at 6:41 AM
            
              
              Everybody can reply
            
          
        
          
          
          1 likes
          
        
        
      
    CTA @cyallianceprez.bsky.social underscores the urgent need for Congress to reauthorize the Cybersecurity Information Sharing Act of 2015 before its expiration on September 30.
www.lawfaremedia.org/article/the-...
#cybersecurity #threatintelligence #informationsharing #cyberpolicy
        
          www.lawfaremedia.org/article/the-...
#cybersecurity #threatintelligence #informationsharing #cyberpolicy
The Case for Reauthorizing CISA 2015
            Congressional failure to reauthorize the cyber information sharing statute would deal a considerable blow to cybersecurity efforts. 
          
            
            www.lawfaremedia.org
          
        
          
            August 5, 2025 at 10:50 AM
            
              
              Everybody can reply
            
          
        
          
          
          3 likes
          
        
        
      
    🧩 The EUVD isn’t just a clone of NVD or KEV.
✅ Tailored for European needs
✅ Uses open standards (CSAF)
✅ Allows national CERTs, govs & vendors to contribute
✅ Curation with EU priorities in mind
“It’s Europe’s answer to fragmented vuln intel.” – ENISA_eu
#EUVD #CSAF #CyberPolicy
          ✅ Tailored for European needs
✅ Uses open standards (CSAF)
✅ Allows national CERTs, govs & vendors to contribute
✅ Curation with EU priorities in mind
“It’s Europe’s answer to fragmented vuln intel.” – ENISA_eu
#EUVD #CSAF #CyberPolicy
            July 22, 2025 at 12:39 PM
            
              
              Everybody can reply
            
          
         
        