Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementCybersecurity NewsGovernment: Federal, State and Local

Security leaders weigh in on Biden’s new cybersecurity executive order

By Jordyn Alger, Managing Editor
American flag

Brandon Mowinkel via Unsplash

January 17, 2025

The Biden Administration has established a new executive order with intention to bolster the nation’s cybersecurity. This executive order includes provisions for:

  • Improving software supply chain transparency and security
  • Securing federal communications
  • Boosting federal cybersecurity 
  • Strengthening digital identities
  • Utilizing artificial intelligence (AI) in cyber defense
  • Increasing sanction power against nations and individuals 
  • Establishing quantum-resistant encryption

Below, security leaders discuss the executive order and its implications. 

Security leaders weigh in 

Casey Ellis, Founder at Bugcrowd:

This final executive order has been somewhat of an open secret in Washington, with drafts being circulated to a limited audience for a few weeks now. The Whitehouse, and especially departments like ONCD, have built up a lot of technical expertise on the topics covered off by this EO over a particularly transformational time in technology, and many of those involved are political appointees or staffers who’s tours are coming to a close. Despite the strong chance that the order will be promptly reversed with the administration change, this EO is a clear effort to ensure that the core cybersecurity, safety, and International Relations equities conclusions developed over the past four years are a part of the United States policy zeitgeist.

Marcus Fowler, CEO of Darktrace Federal:

It is encouraging to see a recognition of the huge potential of AI-powered cybersecurity in this latest executive order. While AI presents new challenges for cybersecurity by enabling greater speed, scale and sophistication of attacks, it also serves as our best defense.  

The threat landscape continues to increase in sophistication in the age of AI. We are seeing a rise in novel multi-stage and multi-domain attacks that take advantage of a lack of visibility and siloes to move undetected between systems. The adoption of AI-powered cybersecurity tools — such as solutions with anomaly-based detection capabilities that can detect and respond to both known and novel threat — are instrumental in keeping both public and private sector organizations secure. 

While the order calls out AI’s ability to rapidly and effectively identify threats, greater emphasis and prioritization should be placed on AI’s role in stopping them as well. Specific types of AI can perform the micro decision-making necessary to respond to and contain malicious behavior in seconds. Private-Public partnerships are increasingly critical as some of the key areas of expansion and AI innovation are already occurring in the commercial space. Specifically, effective human-AI collaboration is augmenting stretched security teams, helping organizations to stay one step ahead of rising threats.  

We look forward to working with the next administration on the huge potential of AI-powered cybersecurity to improve the nation’s security. Together, we can help realize AI’s transformative potential in improving the cybersecurity posture of our federal agencies and beyond.

Jason Soroko, Senior Fellow at Sectigo:

Based on the text of the executive order, each federal agency must transition to quantum-resistant cryptography for all new systems and communications within a specific, near-term timeline — generally set at 18 to 24 months from issuance. The order also mandates that within this same period, agencies develop a detailed plan to retrofit or replace any legacy systems that cannot meet new standards.

In practical terms, this means agencies cannot deploy new encryption tools unless they align with NIST-approved quantum-resistant algorithms.

The order also imposes strict standards on the private sector, especially software suppliers. Firms vying for federal contracts must prove secure development practices and compliance with rigorous testing, patching, and reporting obligations. This can have the effect of forcing suppliers to harden their products overall, not just for offerings meant for the federal government.

James Yeager, VP of Public Sector at Abnormal Security:

Biden’s Executive Order puts a large focus on AI use for cyber defense — no surprise, given AI’s powerful potential to better anticipate and mitigate national security threats. However, limiting the program to the Pentagon (as outlined in the EO summary) is disconcerting. It’s potentially a missed opportunity to additionally support the Executive Branch and FCEB agencies, many of which are on the frontlines of grappling with increasingly sophisticated and targeted cyberattacks. 

Additionally, the EO’s proposed establishment of working groups to conduct more threat hunting and EDR in federal networks is encouraging. But threat hunting goes hand in hand with visibility, and it will be interesting to see what guidance CISA releases around how visibility is defined and promoted. 

I think there is an opportunity here to open up the aperture when it comes to defining ‘visibility.’ For example, email continues to be the number one threat vector facing organizations today, and is the root cause of the vast majority of federal incidents and breaches. Expanding visibility into systems like email could be necessary precursors for conducting effective threat hunting in federal networks. 

Lastly, the push for digital identity documents and validation services promises enhancements to the process of applying for public benefits, but comes with potential risks. Public sector organizations may need to prepare for spikes in identity-based fraud, for example, and figure out how they protect a deluge of PII from being exploited by adversaries.

KEYWORDS: artificial intelligence (AI) national security security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Dark figure coding on computer

    Security leaders weigh in on the Trump campaign hack

    See More
  • Laptop with coding on screen

    Security leaders weigh in on Life360 data breach

    See More
  • American flag

    Cyber leaders weigh in on proposed vulnerability disclosure policy

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing