Get All Access for $5/mo

Why This Expert Says Trump's Cyber Policy Could Be 'Remarkably Boring' A Department of Homeland Security official suggests the White House cyber security order could be remarkably pedestrian.

By Max Eddy

This story originally appeared on PCMag

Christopher Halloran | Shutterstock

If leaked drafts are any indication, the Trump administration's forthcoming cyber policy will likely be similar to those of previous presidents, a former Homeland Security official said here at RSA.

"I actually think we have some decent clues. We've seen a couple of different leaked drafts of a cyber order," said Stewart Baker, former Department of Homeland Security Assistant Secretary for Policy under George W. Bush. "Compared to the [other executive] orders that were actually signed, they are remarkably boring and responsible."

Assuming something like the leaked draft orders are eventually signed by the president, the new policy will build on those from the Obama and Bush administrations, Baker speculated.

The first leak was "very procedural very respectful of cabinet ... responsibilities and not a know-it-all kinda document," Baker said. Specifically, it calls for a series of reports about various areas of cyber-security policy. The second leaked draft document called for more action, but still very measured action in the form of plans to harden security measures.

Both were "very thoughtful and pretty consistent with past practices and with an orderly process," Baker said.

That might come as a relief to security experts watching an administration that has, at times, seemed to move faster than Washington might have expected. President Trump's travel ban executive order sparked protests across the country, and drew criticism from the tech industry.

It's also a departure from other aggressive policies introduced by the new administration. The new head of the FCC, for example, has been a critic of the agency's net neutrality rules.

But issues of cyber security have taken an increasingly large role on the world stage. In 2015, Chinese state-sponsored hackers were accused of stealing data from the US Office of Personnel Management, which contained information on millions of current and former government employees. More recently, the Obama administration levied sanctions against Russia in response to reports from U.S. intelligence that the country tampered in the 2016 presidential election.

Max Eddy

Software Analyst

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Growing a Business

The Best Way to Run a Business Meeting

All too often, meetings run longer than they should and fail to keep attendees engaged. Here's how to run a meeting the right way.

Fundraising

Working Remote? These Are the Biggest Dos and Don'ts of Video Conferencing

As more and more businesses go remote, these are ways to be more effective and efficient on conference calls.

Business Solutions

Boost Business Efficiency with Five Years of Control D for $40

Secure, optimize, and customize your internet experience with this tool.

Franchise

7-Eleven Stores in the U.S. Will Introduce Some Japanese-Inspired Changes. Here's What to Expect.

You'll soon be able to pick up some fresh sushi or a new type of snack at your local 7-Eleven — but the Big Gulp isn't going away.

Marketing

Launching Your First Paid Product? Here's How to Successfully Turn Your Expertise Into Profit

Are you ready to launch your first paid product but feeling nervous? Don't worry — starting small with the right type of product is the secret to success. Read on to learn how to outline clear benefits, value price, leverage social media marketing and deliver excellent customer experience.

Starting a Business

How to Find the Right Programmers: A Brief Guideline for Startup Founders

For startup founders under a plethora of challenges like timing, investors and changing market demand, it is extremely hard to hire programmers who can deliver.