Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business ResilienceGovernment: Federal, State and Local

Enterprise Services

Public and Private Collaboration Can Help Bolster our Cyber-Posture

Through collaboration, security leaders can address fragmented approaches to cybersecurity within the U.S.

By Brian Harrell, Contributing Writer
Capital building
Greggory DiSalvo / iStock / Getty Images Plus / Via Getty Images
September 5, 2025

The escalating and constant digital threats from state-sponsored adversaries like China, Iran, North Korea, and Russia coincide with a fractured global governance and a shifting domestic policy landscape. This moment presents a unique opportunity for the administration to continue to set the tone as a global leader in cyber threat deterrence. Public and private collaboration can help with this effort.

By collaborating, we can address the fragmented approaches to cybersecurity within the U.S. government, help defenders navigating the maze of competing regulation, and clarify among industry stakeholders about jurisdictional responsibilities as well as regulatory priorities which currently dilute efforts to combat malicious actors effectively.

The private sector’s adaptability to change is beneficial for national security agencies in quickly responding to new threats. Criminals have rapidly embraced the digital world, often outpacing authorities who may struggle with limited funding and resources. Their ability to work across jurisdictions and quickly turn challenges to their advantage, as seen in recent geopolitical crises, highlights the need for a strategic shift in focus toward criminal behavior rather than specific types of crime. By taking advantage of private-sector capabilities, national security agencies can access the data and tools to monitor patterns, become more adaptable, and be better equipped to address these evolving threats. We can do this with privacy top-of-mind.

Risks remain high for infrastructure attacks and financial stability threats, and even organizations with robust security measures are not immune to the domino effect of supply chain vulnerabilities. More than ever, partnering with the private sector is key. Sharing methodologies such as cybersecurity risk scores and analytics as well as frontline offensive tactics can help government maneuver threatening environments and detect potential issues in their supply chains.

The Trump administration is driving progress by streamlining governance and harmonizing efforts across federal agencies. DHS Secretary Kristi Noem affirmed that “the Trump team would continue to push companies to develop more secure technology while reducing regulatory and information-sharing burdens on the private sector.”

In this hyper-connected era, our agencies are keenly aware that protecting and securing the homeland and cyberspace also means being vigilant of our cyber infrastructure.”

Complementing this approach would be a more cohesive framework for sector risk management agencies — such as those overseeing energy, water, transportation and health care — which will provide clarity and reduce redundancy. By simplifying regulations, organizations will be empowered to focus resources on meaningful security measures rather than bureaucratic compliance.

At the international level, a unified U.S. approach to global cybersecurity regulation will be critical. Inconsistent standards among allies and partners create exploitable gaps in defenses. Gaps such as defense capabilities, cyber vulnerabilities and supply chain weaknesses remind us that in the digital age — cybersecurity is a shared concern.

Yet, by championing global harmonization, the Trump administration has a unique opportunity to redefine America’s role as the world’s global cybersecurity leader while strengthening our collective security and advancing U.S. leadership in cybersecurity policymaking. By sharpening the Cybersecurity and Infrastructure Security Agency’s (CISA’s) focus, harmonizing governance efforts, and addressing digital supply chain vulnerabilities, the administration can lay the groundwork for a more resilient and secure future.

In this hyper-connected era, our agencies are keenly aware that protecting and securing the homeland and cyberspace also means being vigilant of our cyber infrastructure. The threat environment to our homeland through cyberspace now changes by the nanosecond, and we must keep up. Every day, the Department of Homeland Security works with government, industry, and international partners to prevent, detect, and respond to cyber intrusions. CISA proactively addresses a rapidly evolving cyber threat environment and helps thwart cyber-attacks from foreign adversaries and cyber criminals.

Their factsheets, advisories and alerts reflect how attacks continue to grow in frequency, scope, and severity, as demonstrated by the recent cyber espionage campaign by the People’s Republic of China (PRCs) advanced persistent threat (APT) group known as Salt Typhoon, which resulted in the compromise of numerous IT environments in various critical sectors, including communications, energy, transportation systems, and water and wastewater systems. These attacks are intended to pre-position capabilities to disrupt critical functions during future geopolitical tensions. Salt Typhoon demonstrates how China has the capability and intent to infiltrate and potentially disrupt critical systems within the United States incessantly.

This moment demands more than defense — it calls for comprehensive focus. To combat malicious cyber-attacks on American sovereignty and increasingly aggressive intrusions into our homeland and our interests, a reimagined cybersecurity strategy has the potential to protect critical infrastructure while reinforcing America’s position as the global standard-bearer in the face of mounting digital threats.

KEYWORDS: Government Security public private partnerships security posture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brianharrell

Brian Harrell is the former Assistant Secretary for Infrastructure Protection at the U.S. Department of Homeland Security under President Donald J. Trump (DHS). Image courtesy of Harrell

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • usa cyber

    Public-private partnerships can increase cyber readiness

    See More
  • AI-safety-freepik1170x658v09.jpg

    Can AI help cyber-proof public safety systems?

    See More
  • SEC0919-public-Feat-slide1_900px

    How Strong Public-Private Partnerships Bolster Security Programs

    See More

Related Products

See More Products
  • surveillance.jpg

    Surveillance, Privacy and Public Space

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing