{"id":38941,"date":"2020-12-30T15:18:07","date_gmt":"2020-12-30T15:18:07","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31888\/A-New-Year-A-New-Administration-Doors-Open-In-2021-For-Public-Private-Cooperation.html"},"modified":"2020-12-30T15:18:07","modified_gmt":"2020-12-30T15:18:07","slug":"a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/","title":{"rendered":"A New Year, A New Administration: Doors Open In 2021 For Public-Private Cooperation"},"content":{"rendered":"<div class=\"wysiwyg\">\n<p><em>With 2020 coming to a close, SC Media is delivering through&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/home\/year-in-review\/\" target=\"_blank\">a series of articles<\/a>&nbsp;our picks of the most high impact events and trends of the last year, which we predict will factor into community strategies in 2021 and beyond. This is the fourth in that series.<\/em><\/p>\n<p>Like coronavirus, the election&nbsp;is a big story that permeates&nbsp;all&nbsp;other big stories. If there is a&nbsp;regulatory or legislative solution to any problem raised in 2020, it will be up to the government of 2021 to achieve.&nbsp;&nbsp;<\/p>\n<p><a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/cybersecurity-and-a-potential-biden-white-house-past-tech-priorities-resurrected\/\" data-type=\"URL\" data-id=\"https:\/\/www.scmagazine.com\/home\/security-news\/cybersecurity-and-a-potential-biden-white-house-past-tech-priorities-resurrected\/\" target=\"_blank\" rel=\"noreferrer noopener\">As we wrote in October<\/a>, a&nbsp;Joe&nbsp;Biden administration&nbsp;would bring with it a boatload of potential changes.&nbsp;Experts describe&nbsp;President Donald Trump\u2019s approach&nbsp;to China, a leading force&nbsp;in hacking for industrial espionage and a consistent&nbsp;complication in supply chain security, as transactional and impulsive; Biden, they hope, would be more strategic. Vice President Elect Kamala Harris\u2019s role&nbsp;as a California attorney general, focusing on privacy issues, places her in a unique position to&nbsp;usher in a federal privacy law. And optimism&nbsp;remains&nbsp;as evergreen as it has the last three administrations that the next administration will be the one to pass a comprehensive technology policy.&nbsp;&nbsp;<\/p>\n<p>But while all of that is speculative,&nbsp;a few aspects of how the government\u2019s information security interactions with the private sector have begun to crystalize.&nbsp;&nbsp;<\/p>\n<p><strong>From silos to collaboration?<\/strong><\/p>\n<p>If confirmed as secretary, for example, Alejandro Mayorkas&nbsp;will be the first person&nbsp;known for his work on federal cybersecurity policy to head the Department of Homeland Security. Mayorkas was a critical figure in creating the differentiation of powers&nbsp;in cybersecurity&nbsp;among federal agencies as a deputy secretary of DHS&nbsp;during the Obama administration.&nbsp;&nbsp;<\/p>\n<p>More on&nbsp;point for chief information security officers and the security operations center, Mayorkas was a massive proponent of&nbsp;threat&nbsp;information sharing between federal agencies,&nbsp;federal and private sector&nbsp;entities, and even between international allies.&nbsp;&nbsp;<\/p>\n<p>That means Mayorkas could be&nbsp;a potential advocate&nbsp;to address&nbsp;many of the&nbsp;ways&nbsp;information sharing falls short.&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"614\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973-1024x614.jpg\" alt class=\"wp-image-109994\" srcset=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973-1024x614.jpg 1024w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973-300x180.jpg 300w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973-768x461.jpg 768w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973-1536x921.jpg 1536w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973-860x516.jpg 860w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973-1720x1031.jpg 1720w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973-156x94.jpg 156w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973-312x187.jpg 312w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973-640x384.jpg 640w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973-1280x768.jpg 1280w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/Alejandro_Mayorkas_Deputy_Secretary_of_Homeland_Security_USA_26228258921-e1606257240973.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><figcaption>President-elect Joe Biden nominated Alejandro Mayorkas as his secretary of Homeland Security, a move that drew quick praise from information security experts. Mayorkas, a former U.S. attorney and former deputy secretary of Homeland Security, is a known commodity in cybersecurity quarters. (World Travel &amp; Tourism Council)<\/figcaption><\/figure>\n<p>\u201cAs we look to the next four years, we need more cross sector and cross government communication,\u201d said Kiersten&nbsp;Todt, managing director&nbsp;of the Cyber Readiness Institute, which&nbsp;champions small and medium sized&nbsp;business&nbsp;cybersecurity. \u201cMy sense is that Mayorkas understands this.\u201d&nbsp;<\/p>\n<p>There has been longstanding consternation in the private sector over the quality&nbsp;of data that comes from&nbsp;federal threat information spigots. It is an issue DHS is keenly aware&nbsp;of;&nbsp;an&nbsp;<a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/companies-that-opt-out-of-dhs-threat-sharing-platform-call-for-better-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">inspector&nbsp;general\u2019s report<\/a>&nbsp;earlier this year called for improvements to the automated intelligence system (AIS) due to low usership.&nbsp;&nbsp;<\/p>\n<p>\u201cWe\u2019ve always struggled with the private sector saying they give more information to the government than the government gives&nbsp;back,\u201d said Todt.&nbsp;&nbsp;<\/p>\n<p>The problem goes deep, with many CISOs&nbsp;expressing feelings that the current AIS is a waste of their time, a low signal-to-noise system where data has been sanitized of most of its&nbsp;usefulness&nbsp;before the government spits it back.&nbsp;&nbsp;<\/p>\n<p>Many CISOs find the data that comes out of AIS hard to apply to&nbsp;any specific setting.&nbsp;&nbsp;<\/p>\n<p>\u201cSharing indicators of compromise is not good enough,\u201d said Greg&nbsp;Touhill, former federal CISO and current president of&nbsp;Appgate&nbsp;Federal Group. \u201cWe need to share timely information and need to share context. It\u2019s really important to say,&nbsp;\u2018This is what we think they\u2019re after.\u2019\u201d&nbsp;<\/p>\n<p>The U.S. intelligence community is not currently&nbsp;configured to emphasize threat sharing with the private sector.&nbsp;This a key point in&nbsp;<a href=\"https:\/\/www.scmagazine.com\/home\/solarwinds-hack\/as-microsoft-confirms-breach-president-brad-smith-argues-for-federal-policy-changes\/\" data-type=\"URL\" data-id=\"https:\/\/www.scmagazine.com\/home\/solarwinds-hack\/as-microsoft-confirms-breach-president-brad-smith-argues-for-federal-policy-changes\/\" target=\"_blank\" rel=\"noreferrer noopener\">a recent blog post from&nbsp;Microsoft&nbsp;president Brad Smith<\/a>&nbsp;about the potential policy responses to&nbsp;prevent the next&nbsp;SolarWinds&nbsp;fiasco.&nbsp;If the intelligence community found out through covert means that Russia was intending to capitalize upon supply chain attacks, there is a reasonable&nbsp;chance that information might not be shared with the tech companies who make up the supply chains.&nbsp;&nbsp;<\/p>\n<p>Smith compares this to 9\/11, where intelligence silos prevented critical information from&nbsp;traversing agencies in a way that could have prevented the attacks. But a better comparison might be the 2016 election, where the federal government had fully developed an information sharing plan with states. Russia breached several states during the election. By 2020, DHS had a plan in place.&nbsp;&nbsp;<\/p>\n<p>\u201cThe after-action report about SolarWinds is going to be fascinating,\u201d said Todt. \u201cWe\u2019ll see if there was a disconnect between intelligence and industry.\u201d<\/p>\n<p>Intelligence sharing&nbsp;is not necessarily only an issue for the DHS to address.&nbsp;The National Defense Authorization Act for 2021 provides&nbsp;for a new White House position of national cybersecurity director to help coordinate national cybersecurity strategy. The position is a product of&nbsp;the Cybersecurity Solarium Commission, a working group that included legislative and&nbsp;executive&nbsp;branch personnel and private sector&nbsp;representatives. Many are hoping the national cybersecurity director will&nbsp;also improve coordination with critical private sector&nbsp;entities.&nbsp;&nbsp;<\/p>\n<p>\u201cHopefully, the right person in that job moves the government culturally toward sharing information with critical private infrastructure,\u201d said Rep. Mike Gallagher, R-Wisc., who served on the Cybersecurity Solarium Commission.&nbsp;<\/p>\n<p>Other ideas in the NDAA that came out of the Commission included extending capabilities&nbsp;of&nbsp;Cybersecurity and Infrastructure Security Agency (CISA) for the protection of government networks. Combined, the director and&nbsp;strengthened federal defense would prevent a future SolarWinds from going unnoticed.&nbsp;&nbsp;<\/p>\n<p>\u201cThe fact that FireEye, a private sector group, alerted&nbsp;us to the breach and&nbsp;public sector did not notice is a black eye on the public sector,\u201d said Gallagher. \u201cIn a perfect universe, it\u2019s the government who notifies the companies.\u201d&nbsp;&nbsp;<\/p>\n<p>The primary purpose of the national cybersecurity director would be to make sure the government\u2019s total cybersecurity strategy is coherent across agencies.&nbsp;That, too, has an impact on the private sector, providing a final word when, say, Department of Commerce priorities conflict&nbsp;with those of the Department of Defense. That authoritative check, what the Solarium Commission has colorfully referred to as a \u201csingle throat to throttle when things go wrong,\u201d does&nbsp;not currently exist.&nbsp;&nbsp;<\/p>\n<p>\u201cWhen&nbsp;the&nbsp;kids are fighting, you want someone to&nbsp;say \u2018knock that crap out,\u2019\u201d said&nbsp;Touhill.&nbsp;&nbsp;<\/p>\n<p><strong>What will stay the same<\/strong><\/p>\n<p>How information flows between the government and private sector is a key opportunity for improvement. But there are also opportunities to expand information sharing across industries as well. Todt sees this as a potential job for&nbsp;CISA, which despite a rocky ending to 2020, had been a major success story since its inception in 2018.&nbsp;&nbsp;<\/p>\n<p>CISA, under former director Christopher Krebs, built a reputation for industry collaboration it carries into 2021, despite President Trump firing Krebs after CISA would not back unfounded claims about election tampering. Like most agencies, the ongoing mission will not change even with changes to the top.&nbsp;&nbsp;<\/p>\n<p>It\u2019s unlikely, for example, that a Department of Justice strategy to confront Chinese activity will change under Biden; it\u2019s a strategy&nbsp;whose origins come from the Clinton administration, and whose recent prosecutions were the culmination of work performed under several attorneys general.&nbsp;&nbsp;<\/p>\n<p>But&nbsp;a&nbsp;volatile&nbsp;China&nbsp;situation that entangles cybersecurity with trade, supply chains, relationships with allies and&nbsp;human rights concerns,&nbsp;still appears likely to many experts to force a confrontation.&nbsp;&nbsp;<\/p>\n<p>\u201cChina\u2019s continued behaviors are going to force governments and private companies to make increasingly tough decisions,\u201d said Jonathan Reiber,&nbsp;former chief strategy officer for cyber policy at the Department of Defense&nbsp;and current senior director for cybersecurity strategy and policy at&nbsp;AttackIQ.&nbsp;&nbsp;<\/p>\n<p>A change in government isn\u2019t just limited to the executive branch. Rep. Will Hurd, R-Texas, is retiring this year, which will deprive Congress of one of its most active cybersecurity voices. Hurd was an advocate for issues that are important, but&nbsp;too&nbsp;drab&nbsp;to get on Congress\u2019s radar, like&nbsp;upgrading federal technology and reworking international export agreements on the export of cybersecurity products.&nbsp;&nbsp;<\/p>\n<p>2021, just like any other year, will be as defined by the drab policies the government will bore itself with as the exciting emerging threats.&nbsp;&nbsp;<\/p>\n<p>\u201cIs it exciting? No,\u201d said Touhill. \u201cBut neither is wearing a mask or washing your hands.\u201d&nbsp;<\/p>\n<\/p><\/div>\n<section class=\"post-tags\">\n<h2>Topics:<\/h2>\n<p> <a href=\"https:\/\/www.scmagazine.com\/tag\/government\/\" class=\"button -secondary\">Government<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/threat-intelligence\/\" class=\"button -secondary\">Threat intelligence<\/a> <\/section>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31888\/A-New-Year-A-New-Administration-Doors-Open-In-2021-For-Public-Private-Cooperation.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38942,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[372],"class_list":["post-38941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A New Year, A New Administration: Doors Open In 2021 For Public-Private Cooperation 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A New Year, A New Administration: Doors Open In 2021 For Public-Private Cooperation 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-30T15:18:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"614\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"A New Year, A New Administration: Doors Open In 2021 For Public-Private Cooperation\",\"datePublished\":\"2020-12-30T15:18:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/\"},\"wordCount\":1534,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation.jpg\",\"keywords\":[\"headline,government,usa\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/\",\"name\":\"A New Year, A New Administration: Doors Open In 2021 For Public-Private Cooperation 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation.jpg\",\"datePublished\":\"2020-12-30T15:18:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation.jpg\",\"width\":1024,\"height\":614},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusa\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A New Year, A New Administration: Doors Open In 2021 For Public-Private Cooperation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A New Year, A New Administration: Doors Open In 2021 For Public-Private Cooperation 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/","og_locale":"en_US","og_type":"article","og_title":"A New Year, A New Administration: Doors Open In 2021 For Public-Private Cooperation 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-30T15:18:07+00:00","og_image":[{"width":1024,"height":614,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"A New Year, A New Administration: Doors Open In 2021 For Public-Private Cooperation","datePublished":"2020-12-30T15:18:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/"},"wordCount":1534,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation.jpg","keywords":["headline,government,usa"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/","url":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/","name":"A New Year, A New Administration: Doors Open In 2021 For Public-Private Cooperation 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation.jpg","datePublished":"2020-12-30T15:18:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation.jpg","width":1024,"height":614},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/a-new-year-a-new-administration-doors-open-in-2021-for-public-private-cooperation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusa\/"},{"@type":"ListItem","position":3,"name":"A New Year, A New Administration: Doors Open In 2021 For Public-Private Cooperation"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38941"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38941\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38942"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}