{"id":6467,"date":"2022-01-25T17:25:05","date_gmt":"2022-01-25T17:25:05","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/"},"modified":"2022-01-25T17:25:05","modified_gmt":"2022-01-25T17:25:05","slug":"what-the-cybersecurity-executive-order-means-for-the-private-sector","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/","title":{"rendered":"What the Cybersecurity Executive Order Means for the Private Sector"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div>\n<p>Companies and governments have suffered from delaying the fundamental\u00a0<a class=\"editor-link editor_tip\" title=\"\" href=\"https:\/\/readwrite.com\/2021\/06\/20\/covid-19-global-economy-and-its-impacts-on-cybersecurity\/\" data-original-title=\"\">cybersecurity<\/a> overhauls necessary to defend against increasingly sophisticated and common attacks for too long.<\/p>\n<h2><b>The Executive Order<\/b><\/h2>\n<p>As a response to this threat landscape, President Joe Biden issued an\u00a0<a class=\"editor-link editor_tip\" title=\"\" href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" data-original-title=\"\">executive order on improving the nation\u2019s cybersecurity<\/a>, specifically with Zero Trust security architecture.<\/p>\n<p>In a <a class=\"editor-link editor_tip\" title=\"\" href=\"https:\/\/fcw.com\/articles\/2021\/06\/03\/nsc-ransomware-letter-colonial-cna.aspx\" data-original-title=\"\">White House memo<\/a>\u00a0that followed the order, the administration addressed the private sector, imploring companies to invest in cybersecurity and to segment their networks, which is the\u00a0first step\u00a0toward Zero Trust security.<\/p>\n<p>Biden\u2019s order and the subsequent memo spotlight the need for government agencies and businesses alike to move rapidly to a\u00a0Zero Trust architecture.<\/p>\n<p><b>Impacts on the Private Sector<\/b><\/p>\n<p>So what does this mean for private industry professionals today? Business leaders, managers, department heads, and anyone in a position to lead the charge needs to shift the way they think about security and help their teams do the same.<\/p>\n<h3><b>Zero Trust is more than just a new set of tools and procedures. It\u2019s a whole new strategy for protecting your business.<\/b><\/h3>\n<p>In brief, a\u00a0<a class=\"editor-link editor_tip\" title=\"\" href=\"https:\/\/readwrite.com\/2021\/11\/12\/the-future-of-cloud-security-2022-and-beyond\/\" data-original-title=\"\">Zero Trust security model<\/a>\u00a0stems from the concept of \u201cnever trust, always verify,\u201d and \u201cassume breach.\u201d With a Zero Trust framework, only confirmed-safe traffic, processes, and users are trusted. It acknowledges that the biggest threats to security can come from within the organization and leaves nothing up to chance.<\/p>\n<h2><b>The Need for Zero Trust<\/b><\/h2>\n<p>As the United States\u2019 third federal CIO serving from 2015 to 2017, I\u2019ve seen firsthand the mounting number of cyber threats against U.S. organizations. One of my first projects on the job was leading the federal government response to the <a class=\"editor-link editor_tip\" title=\"\" href=\"https:\/\/www.wired.com\/2016\/10\/inside-cyberattack-shocked-us-government\/\" data-original-title=\"\">Office of Personnel Management cyber intrusions<\/a>, which the previous year had exposed security clearance background information on about 21.5 million government employees and laid bare the vulnerabilities in existing cybersecurity models.<\/p>\n<p>One upshot of these breaches was the\u00a0<a class=\"editor-link editor_tip\" title=\"\" href=\"https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2016\/02\/09\/fact-sheet-cybersecurity-national-action-plan\" data-original-title=\"\">Cybersecurity National Action Plan<\/a>, which sought to strengthen cybersecurity both in the federal government agencies and within all Americans\u2019 digital lives.<\/p>\n<p>On the front lines of cybersecurity as CIO of Microsoft and Disney, I saw that cyber threats were only becoming more destructive and more widespread. It became clear to me that traditional, perimeter-based security would continue to fail and that the single most effective long-term strategy would be to adopt a Zero Trust framework.<\/p>\n<h3><b>So, what\u2019s holding companies back from implementing Zero Trust?<\/b><\/h3>\n<p>Challenges have ranged from psychological to material.<\/p>\n<p>The biggest worry that many businesses or team leaders have is that moving swiftly into the unknown will only cause more problems. They might think, \u201cHow will I transition to this entirely new framework without breaking something?\u201d<\/p>\n<p>Another common block is the misconception that adopting a Zero Trust framework is a massively heavy lift that will certainly overload teams. Other challenges include lack of skills, time, budget, or managerial commitment.<\/p>\n<h2><b>It\u2019s Well Worth the Effort<\/b><\/h2>\n<p>As companies come to terms with the inevitable threat to their\u00a0<a class=\"editor-link editor_tip\" title=\"\" href=\"https:\/\/readwrite.com\/2021\/02\/19\/securing-the-future-cybersecurity-predictions-for-2021\/\" data-original-title=\"\">revenues and reputations<\/a>, they\u2019re recognizing that the need for a Zero Trust security posture far outweighs the implementation challenges.<\/p>\n<h3>Modernized cloud-based Zero Trust technology<\/h3>\n<p>And today\u2019s modernized cloud-based Zero Trust technology\u00a0is simplifying the path to Zero Trust for enterprises, using powerfully streamlined automation and machine learning, and integrating with existing security tools.<\/p>\n<p>As Biden\u2019s executive order puts cybersecurity in stark focus for the public sector and the White House urges the private sector to follow suit, companies should look to the order as a guiding star for cybersecurity standards across industries moving forward. To make Zero Trust implementation smoother, organizations need to prepare in the following three ways:<\/p>\n<h4><b>1. Focus on organization-wide education first<\/b><\/h4>\n<p>Because an entire institution must embrace Zero Trust implementation, organization-wide education is the necessary first step.<\/p>\n<p>Educating employees is essential for changing mindsets and gaining buy-in, and everyone must understand that Zero Trust isn\u2019t just an exercise for the IT department. Instead, it requires full participation across the organization to establish and maintain business processes for verified identities, protected devices, and secure data, networks, and infrastructures.<\/p>\n<p>Education begins with leaders, both at the top and managerial levels. Company leaders should set the implementation in motion by making it a company goal to ensure every person understands what the Zero Trust model is, why it\u2019s important, and how it can help secure the organization and its assets.<\/p>\n<p>Managers and department heads can help translate this into more specific and targeted communication and education for employees. For example, features such as single sign-on and multifactor authentication are basic examples of implementation that employees might already be familiar with.<\/p>\n<p>Employees need to know that the organization\u2019s strengthened cybersecurity workflows won\u2019t render their jobs impossible. Managers can show employees how Zero Trust architecture will affect their work and reiterate the benefits along the way.<\/p>\n<h3><b>2. Build the Zero Trust muscle<\/b><\/h3>\n<p><b\/>Anything worth doing requires learning, practice, and refining, the same goes for Zero Trust. Implementing Zero Trust doesn\u2019t start on Friday morning and end just in time for happy hour. Zero Trust is a new security framework, so it is a marathon that you will build on at a reasonable pace, it\u2019s not a sprint.<\/p>\n<h4><b>Practice with a small patch and learn how to manage it, then expand from there.<\/b><\/h4>\n<p>SaaS platforms can kickstart the path to Zero Trust and simplify legwork with AI and machine learning that make policy recommendations for you. And they allow you to test in simulation mode, reducing uncertainty to help you scale faster.<\/p>\n<p>At the early stages, it\u2019s also important to identify what compliance standards you need to adhere to (e.g., HIPAA, PCI, GDPR) so that you can build your security posture with those regulations in mind.<\/p>\n<p>As the Zero Trust muscle grows, I\u2019ve found that many businesses can move quickly in scaling Zero Trust implementation, especially with today\u2019s cloud-delivered platforms.<\/p>\n<p>When I was at Microsoft, we were one of the most attacked organizations globally. Through our experience warding off attacks, we got pretty good at it. But we knew we weren\u2019t completely invulnerable, so we started to think harder about what more we could do to cover the necessary surface area to be safe, scaling bit by bit.<\/p>\n<p>I can\u2019t say that you\u2019ll get this down right away, but it\u2019s a truly effective long-term strategy, and so it\u2019s also a long game compared to \u201cset and forget,\u201d tools.<\/p>\n<h3><b>3. Overcome the organization\u2019s internal silos<\/b><\/h3>\n<p>It is common that teams are experts in their function, such as\u00a0cloud administration, but have little visibility into others, such as end-user device administration.<\/p>\n<p>The greatest implementations\u00a0break down some of those barriers\u00a0during the Zero Trust journey, to educate across domains and strengthen posture not only on a technological level, but also on an organizational level.<\/p>\n<p>Each implementation of Zero Trust that I have witnessed \u201ca-ha\u201d moments of discovery within the company\u2019s environments, including undetected traffic from the outside, outdated internal interfaces they didn\u2019t think were still running, and misrouted traffic putting an unknown burden on the network.<\/p>\n<p>Let\u2019s face it: Intruders don\u2019t have the governance and budget constraints of a regular institution. They\u2019re always looking for new ways to break through your perimeter. But when you have embraced Zero Trust implementation, you can isolate the threat before it does any more damage and therefore recover much faster.<\/p>\n<p>A Zero Trust framework can make your organization resilient to cyber threats, even when attackers remain undiscovered. It\u2019s time to admit that the bad guys will probably find a way in and adopt a Zero Trust approach that \u201cassumes breach,\u201d stopping ransomware in its tracks <i>before\u00a0<\/i>it can wreak havoc.<\/p>\n<p>Image Credit:<\/p>\n<div class=\"about-author\">\n<div class=\"author-info\">\n<div class=\"author-avatar col-md-2\">\n<img decoding=\"async\" alt=\"\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/secure.gravatar.com\/avatar\/1a5ba351a64aa5c7afe4be38b8b8e404?s=125&amp;d=mm&amp;r=g\" data-srcset=\"https:\/\/secure.gravatar.com\/avatar\/1a5ba351a64aa5c7afe4be38b8b8e404?s=250&amp;d=mm&amp;r=g 2x\" class=\"avatar avatar-125 photo\" height=\"125\" width=\"125\" loading=\"lazy\"\/><\/div>\n<div class=\"author-description col-md-10\">\n<h3 class=\"author-title\"><a href=\"https:\/\/readwrite.com\/author\/tonyscott\/\">Tony Scott<\/a><\/h3>\n<h5 class=\"author-role\">\nBoard Member at Color Tokens<br \/>\n<\/h5>\n<p class=\"author-bio\">\nTony Scott is a board member at ColorTokens and CEO of TonyScottGroup. He was the third federal CIO (2015-2017) of the United States government in the nation\u2019s history. Scott is one of the world\u2019s foremost security and IT experts. <\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/readwrite.com\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Companies and governments have suffered from delaying the fundamental\u00a0cybersecurity overhauls necessary to defend against increasingly sophisticated and common attacks for too long. The Executive Order&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6468,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-6467","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What the Cybersecurity Executive Order Means for the Private Sector - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What the Cybersecurity Executive Order Means for the Private Sector - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-25T17:25:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Cybersecurity-in-private-Sector.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"What the Cybersecurity Executive Order Means for the Private Sector\",\"datePublished\":\"2022-01-25T17:25:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/\"},\"wordCount\":1350,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Cybersecurity-in-private-Sector.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/\",\"name\":\"What the Cybersecurity Executive Order Means for the Private Sector - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Cybersecurity-in-private-Sector.jpg\",\"datePublished\":\"2022-01-25T17:25:05+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Cybersecurity-in-private-Sector.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Cybersecurity-in-private-Sector.jpg\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/25\\\/what-the-cybersecurity-executive-order-means-for-the-private-sector\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What the Cybersecurity Executive Order Means for the Private Sector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What the Cybersecurity Executive Order Means for the Private Sector - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/","og_locale":"en_US","og_type":"article","og_title":"What the Cybersecurity Executive Order Means for the Private Sector - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2022-01-25T17:25:05+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Cybersecurity-in-private-Sector.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"What the Cybersecurity Executive Order Means for the Private Sector","datePublished":"2022-01-25T17:25:05+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/"},"wordCount":1350,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Cybersecurity-in-private-Sector.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/","url":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/","name":"What the Cybersecurity Executive Order Means for the Private Sector - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Cybersecurity-in-private-Sector.jpg","datePublished":"2022-01-25T17:25:05+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Cybersecurity-in-private-Sector.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Cybersecurity-in-private-Sector.jpg","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/25\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"What the Cybersecurity Executive Order Means for the Private Sector"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/6467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=6467"}],"version-history":[{"count":0,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/6467\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/6468"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=6467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=6467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=6467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}