Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

Key Takeaways from the Latest DHS Cyber Strategy

Author: Scarinci Hollenbeck, LLC

Date: June 14, 2018

Key Contacts

Back

Following Several High-Profile Cyber Attacks, the Latest DHS Cyber Strategy Advocates for Increased Information Sharing…

So far this year, several private and public entities, including the City of Atlanta and Delta Airlines, suffered high-profile cyber-attacks. In its latest cybersecurity strategy, the U.S. Department of Homeland Security (DHS) is advocating increased information sharing as a means to prevent and address threats.

Key Takeaways from the Latest DHS Strategy
Photo courtesy of Kaitlyn Baker (Unsplash.com)

In a press statement, Secretary of Homeland Security Kirstjen Nielsen emphasized that the United States has reached a “historic turning point” with respect to cyber threats. “Digital security is now converging with personal and physical security, and it is clear that our cyber adversaries can now threaten the very fabric of our republic itself,” Nielsen said. “In an age of brand-name breaches, we must think beyond the defense of specific assets—and confront systemic risks that affect everyone from tech giants to homeowners. Our strategy outlines how DHS will leverage its unique capabilities on the digital battlefield to defend American networks and get ahead of emerging cyber threats.”

DHS Takes the Lead on Cyber Threats

The latest DHS cybersecurity guidance, which was required under section 1912 of the 2017 National Defense Authorization Act, does not establish any groundbreaking new strategies. However, it does suggest that the agency is asserting itself as the lead federal agency with respect to bolstering the country’s cyber defenses. It also confirms that DHS strongly believes that collaboration across the wider cybersecurity community, including with the federal government, state and local governments, industry, and the international community, is the best way to mitigate cyber threats.

According to DHS, its strategy is built around the following goals:

  • Risk Identification: Assess the evolving national cybersecurity risk posture to inform and prioritize risk management activities.
  • Vulnerability Reduction: Protect federal government information systems by reducing the vulnerabilities of federal agencies to ensure they achieve an adequate level of cybersecurity.
  • Threat Reduction: Reduce national cyber threats by countering transnational criminal organizations and sophisticated cyber criminals.
  • Consequence Mitigation: Respond effectively to cyber incidents to thereby minimize consequences from potentially significant cyber incidents through coordinated community-wide response efforts.
  • Enable Cybersecurity Outcomes: Strengthen the security and reliability of the cyber ecosystem by supporting policies and activities that enable improved global cybersecurity risk management and execute departmental cybersecurity efforts in an integrated and prioritized way.

The DHS strategy places emphasis on encouraging non-government entities to report cyber incidents, and work with other incident responders to develop consistent processes for notifying potential victims. “Encouraging a culture of reporting, notification, and information sharing will increase the security and resilience of critical infrastructure, help prevent, counter, and disrupt illicit cyber actors, and enable the government to assess and potentially manage responses to incidents of unknown severity,” the strategy states.

Understandably, many businesses are wary about voluntarily sharing information with federal regulators. Accordingly, it is imperative that agencies like the DHS continue to update and fine-tune their cyber and data protection strategies, particularly with respect to preventing information provided by the private sector from being misused.

Addressing Risks Posed by the Internet of Things

The DHS strategy also highlights that growing risks posed by the Internet of Things (IoT) and cloud technology. More than 20 billion devices are expected to be connected to the Internet by 2020, according to the agency.

“The continued globalization of the information technology supply chain and shifting of information and services to a cloud or other shared infrastructure introduces additional risks. As Internet-connected and other new technologies rapidly proliferate, the number of attack vectors also increases,” DHS states. “Developers and manufacturers of many internet-of-things and other consumer devices are frequently motivated by speed to market rather than strong security. Even specialized technologies, like medical devices and industrial control systems, remain susceptible to compromise.”

To foster more secure and resilient technologies and networks and create a more defensible cyber ecosystem, DHS aims to:

  • Identify and foster high-leverage innovations to drive more secure software, hardware, services, and technologies, and more resilient networks.
  • Develop solutions to identify and manage supply chain risks for federal networks and other national and global stakeholders.
  • Engage with relevant stakeholders to enhance cybersecurity of cloud infrastructure, internet-of-things products, and other emerging technologies or otherwise mitigate associated threats to networks.

For businesses, the DHS cyber guidance confirms that the federal government believes that the private sector plays a critical role in protecting the country’s infrastructure and other critical resources from cyber threats. Accordingly, it will continue to roll out best practices for the private sector and encourage their adoption.

If you have any questions, please contact us

Do you have any feedback, thoughts, reactions or comments concerning this topic? Feel free to leave a comment below for Fernando M. Pinguelo. If you have any questions about this post, please contact me or the Scarinci Hollenbeck attorney with whom you work at 201-806-3364. To learn more about data privacy and security, visit eWhiteHouse Watch – Where Technology, Politics, and Privacy Collide (http://ewhwblog.com).

    No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

    Scarinci Hollenbeck, LLC, LLC

    Related Posts

    See all
    One Big Beautiful Bill: New Overtime Tax Rules Employers and Employees Need to Know post image

    One Big Beautiful Bill: New Overtime Tax Rules Employers and Employees Need to Know

    Part 1 – Overtime Pay and Income Tax Treatment Overview This Firm Insights post summarizes one provision of the “One Big Beautiful Bill” related to the tax treatment of overtime compensation and related employer wage reporting obligations. Overtime Pay and Employee Tax Treatment The Fair Labor Standards Act (FLSA) generally requires that overtime be paid […]

    Author: Scott H. Novak

    Link to post with title - "One Big Beautiful Bill: New Overtime Tax Rules Employers and Employees Need to Know"
    New York’s FAIR Business Practices Act: What the New Consumer Protection Measure Means for Your Business post image

    New York’s FAIR Business Practices Act: What the New Consumer Protection Measure Means for Your Business

    In 2025, New York enacted one of the most consequential updates to its consumer protection framework in decades. The Fostering Affordability and Integrity through Reasonable Business Practices Act (FAIR Act) significantly expands the scope and strength of New York’s long-standing consumer protection statute, General Business Law § 349, and alters the compliance landscape for New York […]

    Author: Dan Brecher

    Link to post with title - "New York’s FAIR Business Practices Act: What the New Consumer Protection Measure Means for Your Business"
    How to Reduce Legal Risk as Your New Jersey Business Grows in 2026 post image

    How to Reduce Legal Risk as Your New Jersey Business Grows in 2026

    For many New Jersey businesses, growth is a primary objective for the New Year. However, it is important to recognize that growth involves both opportunity and risk. For example, business expansion often results in complex contracts, an increased workforce, new regulatory requirements, and heightened exposure to disputes. Without proactive planning, even routine growth can lead […]

    Author: Ken Hollenbeck

    Link to post with title - "How to Reduce Legal Risk as Your New Jersey Business Grows in 2026"
    Crypto Investor Protection: SEC and CFTC Enforcement Trends post image

    Crypto Investor Protection: SEC and CFTC Enforcement Trends

    Crypto investor protection continues to evolve, with the SEC and CFTC investing resources and coordinating more closely to uphold regulatory standards. Whether you’re a retail investor, an institutional trader, or part of a crypto startup, understanding enforcement trends is essential for navigating this dynamic and high-stakes regulatory environment. Crypto Is No Longer the Wild West […]

    Author: Dan Brecher

    Link to post with title - "Crypto Investor Protection: SEC and CFTC Enforcement Trends"
    New Jersey’s Next Manufacturing Tax Credit: Stability Secured, Timing Matters post image

    New Jersey’s Next Manufacturing Tax Credit: Stability Secured, Timing Matters

    A Settled Regulatory Environment Enables Confident Capital Planning New Jersey’s new manufacturing incentive program, Next New Jersey Manufacturing Program,  enters 2026 with something uncommon in economic development these days: policy stability. The statute is enacted, New Jersey Economic Development Authority’s (“NJEDA”) rules are adopted, and the application portal is open. With the election outcome settled, […]

    Author: Michael J. Sheppeard

    Link to post with title - "New Jersey’s Next Manufacturing Tax Credit: Stability Secured, Timing Matters"
    A Simple Guide to Industry Roll-Up Acquisitions post image

    A Simple Guide to Industry Roll-Up Acquisitions

    When done successfully, industry roll-up acquisitions can dramatically grow and strengthen your business. In this post, we break down what an industry roll-up is, why companies pursue it, and what makes it an effective (and sometimes risky) business strategy. What Is an Industry Roll-Up Acquisition? In an industry roll-up acquisition of companies, a buyer acquires multiple companies […]

    Author: Dan Brecher

    Link to post with title - "A Simple Guide to Industry Roll-Up Acquisitions"

    No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

    Sign up to get the latest from our attorneys!

    Explore What Matters Most to You.

    Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

    Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

    Let`s get in touch!

    * The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form. By providing a telephone number and submitting this form you are consenting to be contacted by SMS text message. Message & data rates may apply. Message frequency may vary. You can reply STOP to opt-out of further messaging.

    Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!