{"id":48348,"date":"2022-09-08T00:00:00","date_gmt":"2022-09-08T00:00:00","guid":{"rendered":"urn:uuid:6ea85e38-7489-4d11-d1a4-48035fe3420a"},"modified":"2022-09-08T00:00:00","modified_gmt":"2022-09-08T00:00:00","slug":"biden-cybersecurity-executive-order-ex-usss-reflects","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/","title":{"rendered":"Biden Cybersecurity Executive Order: Ex-USSS Reflects"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/bidens-cybersecurity-executive-img:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/22\/bidens-cybersecurity-executive-img.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>In response to the crippling <a href=\"https:\/\/www.cnbc.com\/2021\/05\/08\/colonial-pipeline-shuts-pipeline-operations-after-cyberattack.html\" target=\"_blank\" rel=\"noopener\">ransomware attack on Colonial Pipeline<\/a>, President Biden signed <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Executive Order 14028, \u201cImproving the Nation\u2019s Cybersecurity,\u201d<\/a> on May 12, 2021. Biden\u2019s Executive Order aimed to protect critical infrastructure from further attacks by modernizing the nation\u2019s cybersecurity.<\/p>\n<p>Reflecting on the past 15 months, I look at the effectiveness of the Executive Order, its challenges, and what CISOs from businesses of all sizes and sectors can learn to strengthen their cybersecurity strategies.<\/p>\n<p><span class=\"body-subhead-title\">Overview of President Biden\u2019s Executive Order on Cybersecurity<\/span><\/p>\n<p>According to the <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/05\/12\/fact-sheet-president-signs-executive-order-charting-new-course-to-improve-the-nations-cybersecurity-and-protect-federal-government-networks\/\" target=\"_blank\" rel=\"noopener\">factsheet published by the White House<\/a>, the Executive Order addresses seven key points:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Remove barriers to cyber threat information sharing between government and the private sector<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Modernize and implement more robust cybersecurity standards in the Federal Government<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Improve software supply chain security<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Establish a Cybersecurity Safety Review Board<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Create a standard playbook for responding to cyber incidents<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Improve detection of cybersecurity incidents on Federal Government networks<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Improve investigative and remediation capabilities<\/span><\/li>\n<\/ul>\n<p>The Executive Order also set several deadlines for implementing <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/definition\/zero-trust\">Zero Trust<\/a> architecture, multi-factor authentication, and deploying endpoint detection and response (EDR) initiatives.<\/p>\n<p>Other requirements called for <a href=\"https:\/\/www.cisa.gov\/executive-order-improving-nations-cybersecurity\" target=\"_blank\" rel=\"noopener\">CISA<\/a> to develop and issue a cloud-service governance framework and cloud-security technical reference architecture documentation that illustrated the recommended approach for cloud migration and data protection.<\/p>\n<p><span class=\"body-subhead-title\">Security wins and challenges<\/span><\/p>\n<p>In November 2021, <a href=\"https:\/\/www.csoonline.com\/article\/3638750\/biden-s-cybersecurity-executive-order-progress-report.html\" target=\"_blank\" rel=\"noopener\">CSO reported<\/a> that 19 of 46 mandated tasks were completed, but not all Federal agencies had reported their progress. And some may be unable to due to the highly sensitive nature of their work.<\/p>\n<p>Regardless of whether your organization was impacted, I\u2019ve often said the security teams that succeed take a federal-first approach by aligning their security strategy to that of the Federal Government. As the logic tracks, the Federal Government must thwart the most advanced cyberattacks; therefore, the lessons learned and derived strategy is helpful to all organizations.<\/p>\n<p>With this in mind, let\u2019s review the most significant \u201cwins\u201d and \u201cchallenges\u201d for any business\u2014not just those mandated\u2014trying to implement the tasks outlined in the Executive Order:<\/p>\n<p><b><u>Remove barriers to sharing threat information<\/u><\/b><\/p>\n<p><i>Win: More mature threat intelligence and information sharing<\/i><br \/>Previously, information sharing lacked context, which made it harder to operationalize and used to defend networks. The industry shifted from manually passing PDFs of long lists of suspicious to malicious IPs to automated high-volume feeds with minimal context.<\/p>\n<p>Now, information is shared through standardized frameworks like the <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/d\/mitre-engenuity-attack-simulator.html\">MITRE ATT&amp;CK Framework<\/a>, which provides the context security teams need to investigate and remediate cyber threats.<\/p>\n<p><i>Challenge: Legal liability<\/i><br \/>Private industries may be hesitant to share threat intelligence or IoCs because it may contain sensitive or classified information that, if wrongfully shared, could lead to litigation. Additionally, anti-trust issues exist when competitors share information. Even though progress has been made in the last two years to alleviate legal challenges around redacting sensitive information, widespread intelligence and information sharing are still not occurring at the level they should.<\/p>\n<p><b><u>Modernize cybersecurity<\/u><\/b><\/p>\n<p><i>Challenge: Lack of nuance<\/i><br \/>The definition of Zero Trust is comprehensive and often has several interpretations. An organization\u2019s architecture and whether it&#8217;s built on implicit trust will impact how Zero Trust is implemented. Some organizations are often only focused on implementing MFA and calling it a day, while more mature businesses are looking to implement it across all the five pillars of the <a href=\"https:\/\/www.cisa.gov\/zero-trust-maturity-model\" target=\"_blank\" rel=\"noopener\">Zero Trust Maturity Model outlined by CISA<\/a>. The maturity model provides agencies with specific examples of a traditional, advanced, and optimal zero trust architecture.<\/p>\n<p><b>Improve software supply chain security<\/b><\/p>\n<p><i>Win: More awareness<\/i><br \/>I\u2019ve noticed a substantial increase in awareness around the challenges organizations will face if they don\u2019t improve their <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/g\/software-supply-chain-cybersecurity.html\">software supply chain security<\/a>. This has led to other initiatives being promoted in line, like the Software Bill of Materials (SBOM).<\/p>\n<p>SBOMs, by their definition, provide a formal record containing the details and supply chain relationships of various components used in building critical software. Software developers and vendors often create products by assembling existing open source and commercial software components. The SBOM enumerates these components in a product, which helps security teams better identify and assess risk.<\/p>\n<p><i>Challenge: Open source code<\/i><br \/>According to many reports, open source software (OSS) usage continues to grow. By some surveys of enterprises, that <a href=\"https:\/\/betanews.com\/2022\/08\/09\/80-percent-of-enterprises-use-open-source-software-and-nearly-all-worry-about-security\/\" target=\"_blank\" rel=\"noopener\">number is as high as 80%<\/a>.<\/p>\n<p>Our closest partner on DevOps, Snyk, who integrates with developer tools and workflows to continuously find and automatically fix vulnerabilities, has found through their research documented in their <a href=\"https:\/\/go.snyk.io\/state-of-open-source-security-report-2022.html\" target=\"_blank\" rel=\"noopener\">State of Open-Source Software Security 2022 Report<\/a> that many organizations are unprepared for dealing with OSS risks.<\/p>\n<p>Specifically, they found that:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">41% of organizations are not confident in their open-source software security.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">The average application in development contains 49 vulnerabilities and 69 dependencies.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">The time it takes to fix vulnerabilities in open-source projects has steadily increased, doubling from 49 days in 2018 to 110 days in 2021.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">51% of organizations don\u2019t have a security policy for OSS development or usage.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">30% of organizations without an open-source security policy readily recognize that no one on their team is responsible for addressing open source security.<\/span><\/li>\n<\/ul>\n<p>Open source code continues to be a Catch-22 for businesses; while it\u2019s essential for developers who need to build at the speed of light, it poses significant security risks. It\u2019s difficult for teams to identify the different aspects of open source code in software without the proper tools and partnerships, leaving them vulnerable to attacks. I consider secure code development as priority #1 regarding software supply chain security.<\/p>\n<p><b><u>Create standard playbooks for responding to global software supply chain exploitation events<\/u><\/b><\/p>\n<p><i>Win: More resiliency<\/i><br \/>Playbooks are incredibly effective in preparing for cyber-attacks and campaigns, with the caveat only if practiced and exercised regularly.<\/p>\n<p>Playbooks are highly effective because they enumerate what to do and when. The faster you can <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/h\/patch-management-process-best-practices.html\">patch a vulnerability<\/a>, the more resilient your systems will be. This is especially crucial considering the time to exploit has gone from over a month to just hours. I\u2019ve noticed that organizations are often victims of inefficient or broken processes rather than the critical vulnerabilities themselves.<\/p>\n<p><i>Challenge: Security isn\u2019t one-size-fits-all<\/i><br \/>On the other hand, playbooks to respond to global software supply chain exploitation events are few and far between.<\/p>\n<p>Frameworks are great places to start when establishing your organization\u2019s playbook but don\u2019t forget to factor in your unique IT environment and geo-specific compliance regulations.<\/p>\n<p><b><u>Improve detection of cybersecurity incidents<\/u><\/b><\/p>\n<p><i>Challenge: Lack of visibility<\/i><br \/>Large organizations have 50-60 solutions in a security stack, which slows down threat activity data collection and correlation. The slower the mean-time-to-detect (MTTD), the more time an attack has to spread deeper into your architecture. More point products, more problems.<\/p>\n<p><span class=\"body-subhead-title\">Next steps<\/span><\/p>\n<p>The lack of funding and responding to unfunded mandates is underscoring all these challenges. It further compounds the consistent pressure to improve security and compliance quickly. A good place to start is consolidating your point solutions on a <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/one-platform.html\">unified cybersecurity platform<\/a> so you can improve security efficiency, increase automation, and reduce costs.<\/p>\n<p>Shifting from point solutions to a unified cybersecurity platform with comprehensive third-party integrations enables security professionals to identify and mitigate cyber risks with velocity across all attack surfaces.<\/p>\n<p>Consider a platform with XDR capabilities to collect and correlate data across the platform\u2019s solutions to detect, respond, and remediate cyber threats faster. XDR also <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/g\/xdr-security-more-security-more-savings.html\">replaces the work of eight full-time employees<\/a>, which helps businesses suffering from the cybersecurity skills gap.<\/p>\n<p>For more information, check out these resources:<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/i\/biden-cybersecurity-executive-order-14028-may-2021.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, reflects on the effectiveness of Biden\u2019s executive order and what organizations of all sizes can learn from it. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":48349,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9549,9559,9550,9548,9529,9660],"class_list":["post-48348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-cloud","tag-trend-micro-ciso-compliance","tag-trend-micro-ciso-detection-and-response","tag-trend-micro-ciso-digital-transformation","tag-trend-micro-ciso-risk-management","tag-trend-micro-ciso-skills-gap"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Biden Cybersecurity Executive Order: Ex-USSS Reflects 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biden Cybersecurity Executive Order: Ex-USSS Reflects 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-08T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/bidens-cybersecurity-executive-img:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Biden Cybersecurity Executive Order: Ex-USSS Reflects\",\"datePublished\":\"2022-09-08T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/\"},\"wordCount\":1233,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/biden-cybersecurity-executive-order-ex-usss-reflects.png\",\"keywords\":[\"Trend Micro CISO : Cloud\",\"Trend Micro CISO : Compliance\",\"Trend Micro CISO : Detection and Response\",\"Trend Micro CISO : Digital Transformation\",\"Trend Micro CISO : Risk Management\",\"Trend Micro CISO : Skills Gap\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/\",\"name\":\"Biden Cybersecurity Executive Order: Ex-USSS Reflects 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/biden-cybersecurity-executive-order-ex-usss-reflects.png\",\"datePublished\":\"2022-09-08T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/biden-cybersecurity-executive-order-ex-usss-reflects.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/biden-cybersecurity-executive-order-ex-usss-reflects.png\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-cybersecurity-executive-order-ex-usss-reflects\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Cloud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-ciso-cloud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Biden Cybersecurity Executive Order: Ex-USSS Reflects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biden Cybersecurity Executive Order: Ex-USSS Reflects 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/","og_locale":"en_US","og_type":"article","og_title":"Biden Cybersecurity Executive Order: Ex-USSS Reflects 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-08T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/bidens-cybersecurity-executive-img:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Biden Cybersecurity Executive Order: Ex-USSS Reflects","datePublished":"2022-09-08T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/"},"wordCount":1233,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/biden-cybersecurity-executive-order-ex-usss-reflects.png","keywords":["Trend Micro CISO : Cloud","Trend Micro CISO : Compliance","Trend Micro CISO : Detection and Response","Trend Micro CISO : Digital Transformation","Trend Micro CISO : Risk Management","Trend Micro CISO : Skills Gap"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/","url":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/","name":"Biden Cybersecurity Executive Order: Ex-USSS Reflects 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/biden-cybersecurity-executive-order-ex-usss-reflects.png","datePublished":"2022-09-08T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/biden-cybersecurity-executive-order-ex-usss-reflects.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/biden-cybersecurity-executive-order-ex-usss-reflects.png","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/biden-cybersecurity-executive-order-ex-usss-reflects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Cloud","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-cloud\/"},{"@type":"ListItem","position":3,"name":"Biden Cybersecurity Executive Order: Ex-USSS Reflects"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48348"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/48349"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}