.Read NIAC SECURING CYBER ASSETS FINALREPORT found at  (Youmay need to copy the url and post in an open window).  There are 11recommendations made by the National Infrastructure Advisory Council (NIAC). Ihave listed these below.  Choose one of the recommendations as a theme forthe paper.

Please research your chosenrecommendation to determine whether the private sector has taken the cue fromthe NIAC and started the work, or whether a public/private partnership has beenformed to answer the need, or whether the government has actually taken thelead in the matter.

5 Page Paper

Please use the following format for yourpaper:

Topic, subject matterreview of the chosen recommendation, key decision(s) needed to be made tosecure the given cyber asset area, the decision you would make to improve thesituation and why.

Recommendations Thechallenges the NIAC identified are well-known and reflected in study afterstudy. There is a narrow and fleeting window of opportunity before a watershed,9/11-level cyber attack to organize effectively and take bold action. 

We call on theAdministration to use this moment of foresight to take bold, decisive actions: 

1) EstablishSEPARATE, SECURE COMMUNICATIONS NETWORKS specifically designated for the mostcritical cyber networks, including dark fiber networks for critical controlsystem traffic and reserved spectrum for backup communications duringemergencies. ACTION REQUIRED BY: U.S. Department of Energy (DOE), U.S.Department of Homeland Security (DHS), Office of the Director of NationalIntelligence (ODNI), U.S. Department of Defense (DOD), NSC, and the StrategicInfrastructure Coordinating Council (SICC) (Electricity, Financial Services,and Communications) 

2) FACILITATE APRIVATE-SECTOR-LED PILOT OF MACHINE-TO-MACHINE INFORMATION SHARINGTECHNOLOGIES, led by the Electricity and Financial Services Sectors, to testpublic-private and company-to-company information sharing of cyber threats atnetwork speed. ACTION REQUIRED BY: DOE, DHS, ODNI, NSC, and the SICC 

3) Identify best-in-class SCANNING TOOLS ANDASSESSMENT PRACTICES, and work with owners and operators of the most criticalnetworks to scan and sanitize their systems on a voluntary basis. ACTIONREQUIRED BY: NSC and DHS 

4) Strengthen the capabilities of TODAYS CYBER WORKFORCE bysponsoring a public-private expert exchange program. ACTION REQUIRED BY: NSC,DHS, and Congress 4 Establish a set of LIMITED TIME, OUTCOME-BASED MARKETINCENTIVES that encourage owners and operators to upgrade cyberinfrastructure, 

5) invest in state-of-the-art technologies, and meet industrystandards or best practices. ACTION REQUIRED BY: DOE, DHS, ODNI, NSC, Congress,and the SICC 

6) Streamline and significantly expedite the SECURITY CLEARANCEPROCESS for owners of the nations most critical cyber assets, and expedite thesiting, availability, and access of Sensitive Compartmented InformationFacilities (SCIFs) to ensure cleared owners and operators can access securefacilities within one hour of a major threat or incident. ACTION REQUIRED BY:DHS, ODNI, NSC, Federal Bureau of Investigation (FBI), U.S. Office of PersonnelManagement (OPM), and all agencies that issue/sponsor clearances 

7) Establish clear protocols to RAPIDLY DECLASSIFY CYBER THREATINFORMATION and proactively share it with owners and operators of criticalinfrastructure, whose actions may provide the nations front line of defenseagainst major cyber attacks. ACTION REQUIRED BY: NSC, DHS, ODNI, FBI, and theIntelligence Community 

8) PILOT AN OPERATIONAL TASK FORCE OF EXPERTS IN GOVERNMENT ANDIN THE ELECTRICITY, FINANCE, AND COMMUNICATIONS INDUSTRIESled by theexecutives who can direct priorities and marshal resourcesto take decisiveaction on the nations top cyber needs with the speed and agility required byescalating cyber threats.  ACTION REQUIRED BY: DOE, DHS, ODNI, NSC, theSICC, DOD, U.S. Department of the Treasury (Treasury), and U.S. Department ofJustice (DOJ) 

9) USE THE NATIONAL-LEVEL GRIDEX IV EXERCISE (NOVEMBER 2017) TOTEST the detailed execution of federal authorities and capabilities during acyber incident, and identify and assign agency-specific recommendations to coordinateand clarify the federal governments response actions where they are unclear.ACTION REQUIRED BY: DOE, DHS, ODNI, NSC, and the SICC 

10) Establish an OPTIMUM CYBERSECURITY GOVERNANCE APPROACH todirect and coordinate the cyber defense of the nation, aligning resources andmarshaling expertise from across federal agencies. ACTION REQUIRED BY: DHS,ODNI, NSC, DOJ, DOD, and Congress 

11) Task the Homeland Security Advisor to review therecommendations included in this report and within six months CONVENE A MEETINGOF SENIOR GOVERNMENT OFFICIALS to address barriers to implementation andidentify immediate next steps to move forward.

 


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"