Looking for analysis on @POTUS' recent Executive Order on Improving the Nation's Cybersecurity? We've got you covered. THREAD 🧵

First, listen to @BobbyChesney and @CyberStatecraft director Trey Herr break it down on the @lawfareblog podcast. 1/4
lawfareblog.com/lawfare-podcas…
Second, we brought together @likethecoins, @NMAndersen, @wendynather, @_kate_stewart, @drdavidawheeler, and @WeldPond to mark up the executive order.

See their annotations throughout the text here. 2/4 atlanticcouncil.org/blogs/new-atla…
Third, check out @BobbyChesney and Trey Herr's article for @lawfareblog for an overview of the order and their core takeaways. 3/4
lawfareblog.com/everything-you…
Finally, for more on the events that inspired the executive order, the state of US cyber strategy, and the work that lies ahead, see our report below.

Follow us at @CyberStatecraft for more, and join the conversation using #ACcyber. 4/4
atlanticcouncil.org/in-depth-resea…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Cyber Statecraft

Cyber Statecraft Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @CyberStatecraft

17 Dec 20
THREAD | A groundbreaking espionage operation targeting USG, the #Sunburst incident was also software supply chain compromise similar to 31 attacks observed since 2010. Using our Breaking Trust report @Cyberstatecraft walks through the incident. 1/16

atlanticcouncil.org/in-depth-resea…
COMPROMISE BUILD: Malicious code inserted into a SolarWinds software library compromised the Orion software in development. Here, we track the compromise along a visualization of 115 software supply chain attacks and vulnerability disclosures since 2010. 2/16
Direct comparisons to 2015 Kingslayer, 2017 NotPetya, and 2018 Webmin, where attackers went stealth, seeding malware into administrative and security tools later distributed through trusted update channels. 3/16

comsecglobal.com/kingslayer-a-s…
Read 18 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(