Last week the Washinton Post reported on Administration’s plans to access Artificial Intelligence (AI) tools to identify opportunities for broad-based deregulation. While that broader program is not slated to launch until next year, AI tools are already available which demonstrate that eliminating redundant cybersecurity regulations would generate billions of dollars in government savings, tens of billions of dollars in industry savings – and most importantly – free up enormous amounts of scarce resources to significantly enhance our security against dangerously elevated cyber-attacks and all at no additional cost.
ISA used artificial intelligence tools—specifically natural language processing and semantic clustering— to analyze 304 cybersecurity-related regulations across the federal government to quantify duplication and identify opportunities for streamlining. The analysis showed numerous results all broadly consistent with the administration’s estimates from savings from their large plan. These results included:
The JHU analysis showed that while each regulation seeks to address genuine risks—protecting personal data, securing critical systems, or defending national security—lack of coordination has led to substantial overlap. “Organizations are often subject to multiple, slightly different mandates for the same types of activities (such as breach reporting or risk management). This not only increases compliance cost but also pulls attention away from substantive risk reduction efforts (GAO, 2024a). As digital threats and regulatory scrutiny both escalate, the cost of inefficiency is no longer sustainable. Moreover, JHU found that the opportunity cost is profound. When up to 70% of cyber staff time is spent on compliance in some sectors resources are diverted from threat response. The threat landscape is dynamic, but compliance lags behind, making organizations “compliant but not secure.” The time to act is now. We are suffering from literally hundreds of thousands of cyber-attacks daily which have already compromised much of our critical infrastructure. We are long past the time for additional research and “taskforces.” Both the House Homeland Security and Oversight and Government Reform Committees leadership have found that OMB has the existing authority to eliminate cyber regulatory duplication and urged OMB to “act now to do so. Their April 2025 letter to OMB specifically identifies eliminating these redundancies as “the most cost-effective way to strengthen our nations cybersecurity” at the ground level – and at no cost. Industry has also backed this proposal with a muti-association lett4er to OMB requesting that OMB set up a process to eliminate the cyber regulatory duplication. Both the House Committee and industry requests are fully consistent with President Trump’s AI Action Plan OMB should act to eliminate cyber regulatory redundance now.
METHODOLOGYISA conducted a Four-Stage Analytical Process including Natural Language Processing Tokenization, Clauds Opus 4, Jaccard Similarity Analysis and Functional Clustering. Stage 1: Natural Language Processing Tokenization Claude Opus 4 breaks down each regulation into its component linguistic elements, creating a standardized format that enables systematic comparison across different regulatory texts, regardless of formatting or stylistic differences. Stage 2: Jaccard Similarity Analysis The system calculates similarity scores between regulations by comparing their tokenized content. This mathematical approach identifies regulations that share substantial textual overlap, indicating potential duplication or redundancy. Stage 3: Functional Clustering Regulations with high similarity scores are grouped into clusters, allowing analysts to examine families of potentially related or duplicative requirements. This clustering reveals patterns of regulatory overlap that might not be apparent through manual review. Stage 4: Automated Text Verification Claude Opus 4 performed over 45,000 automated verifications of clustered regulations to confirm actual duplication versus legitimate regulatory variation. This AI-powered verification process ensures accuracy and relevance of findings while maintaining complete automation throughout the analysis.
JHU METHODOLOGYRather than relying on a single technology or vendor, this validation relied on practical, side-by-side review—comparing official regulatory texts, agency guidance, GAO reports, and real-world enforcement practices. The goal was to document how and where cybersecurity rules overlap across agencies. The findings confirm what prior AI analysis showed: duplication is systemic, costly, and avoidable.
|