Introduction by ISA President Larry Clinton

The reality is that we are losing the fight to sustainably secure our cyber networks – and losing badly. This means we need to change the way we have been approaching the issue. That begins by stopping the blame game focusing on the victims of cyber-attack and beginning to do the hard work of rebalancing the economics of cybersecurity.

The proposal released by Cybersecurity and Infrastructure Security Agency (CISA) “Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default.  and Pillar Three of the Biden Administration’s National Cybersecurity Strategy: “Shape Market Forces to Drive Security and Resilience” begin to move us in the right direction – but it’s going to take some hard work to turn these sentiments into practical reality.

This is the first of three blogs discussing the implementation plan’s proposal for secure by design (SDD). The key is to balance SDD implementation while simultaneously promoting innovation and competition.

The core CISA approach aligns with the long-standing ISA belief that, while private entities ought to take reasonable security precautions, that the more fundamental issue how do we rebalance the economics in which all the incentives favor the attackers so that enhanced cybersecurity is coordinated with the market economy under which the USA operates.

CISA is correct in noting the current economic model for the development of hardware and software — i.e. get your product to market as quickly as possible and fix security issues later with patches and updates – does not provide adequate security. However, altering that model carries substantial risk as it is the innovation of the IT community that is largely responsible for much of the economic and defense progress we have achieved over the last 25 years.

CISA argues that building software security into the design process prior to developing, configuring, and shipping products,  manufacturers can create technology that is safer, more secure, and more resilient against cyber intrusions.[i] That may be true, however if that process elongates the design process and limits the utility of the products these steps may make the products uncompetitive in the international market – no one wants laptops that cost $10,000 and are slow and no one will buy.

Recently CISA, held a “listening session” with the ISA board of directors including presentations from companies representing the IT software and cloud services sectors, the Defense Industrial Base, the financial services sector and the energy utility sectors examining how best to implement these ideas going forward and proposes. That process has produced seven general principles as a basis for future discussion on how to implement this strategy. Theos seven tentative principles are:

FOR GREATER DETAIL ON THE ISSUES DISCUSSED IN “TWENTY-FIVE STEPS TO IMPROVING SECURITY WITHOUT NEW REGULATIONS” SEE FIXING AMERICAN CYBERSECURITY: CREATING A STRATEGIC PUBLIC-PRIVATE PARTNERSHIP (GEORGETOWN UNIVERISTY PRESS 2023).


[i] “Security-by-Design and -Default: CISA.” Cybersecurity and Infrastructure Security Agency CISA, June 12, 2023. https://www.cisa.gov/resources-tolls/resources/secure-by-design-and-default.