Harry Coker: ONCD Works Hard for National Cybersecurity Strategy

February 9, 2024
1 min read

TLDR: National Cyber Director Harry Coker discussed the efforts of his office to implement the National Cybersecurity Strategy, including the integration of memory-safe programming languages in secure-by-design initiatives. The Office of the National Cyber Director plans to release a paper addressing software measurability and memory safety. Coker also mentioned other initiatives, such as improving the Border Gateway Protocol, building a diverse cyber workforce, and holding software developers accountable for insecure code.

The National Cyber Director’s office is focused on implementing the National Cybersecurity Strategy, particularly in the area of software security. Coker highlighted the importance of memory-safe programming languages in preventing memory safety bugs, which are often exploited by criminals. The office plans to release a paper that addresses software measurability and memory safety, with the aim of encouraging the adoption of memory-safe coding languages.

In addition to software security, the National Cyber Director is working on other initiatives. One is to improve the Border Gateway Protocol, which is a vital component of the internet infrastructure. The office aims to address vulnerabilities and enhance the security of this protocol.

Another focus of the National Cyber Director’s office is building a diverse national cyber workforce. Coker emphasized the importance of diversity in cybersecurity, as different perspectives and experiences can help to identify and address vulnerabilities more effectively.

The office is also exploring ways to hold software developers accountable for bringing insecure code to market. Coker mentioned working with legal and academic experts to examine liability regimes related to insecure code. The goal is to create a framework that ensures developers are held responsible for the security of their software.

Overall, the National Cyber Director’s office is taking a comprehensive approach to cybersecurity, addressing both technical and human factors. By promoting the adoption of memory-safe coding languages, improving the Border Gateway Protocol, building a diverse cyber workforce, and holding developers accountable for insecure code, the office is working towards a more secure digital environment.

Latest from Blog

Trust is the secret sauce for cybersecurity success

TLDR: Key Points: Trust between CISOs and top executives is crucial for justifying cybersecurity investments. Five key questions CISOs must ask themselves about their cybersecurity strategy include budget justification, risk reporting, celebrating

Expert opinion on cyber security is a must have

TLDR: Key points from the article: Study shows link between lack of sleep and increased risk of Alzheimer’s disease. Researchers found that poor sleep quality was associated with higher levels of brain