News

Concepts of a Cyberplan

  • Alan Shimel--securityboulevard.com
  • published date: 2026-03-12 00:00:00 UTC

None

<p><i><span style="font-weight: 400;">Three Pages to Secure the Nation?</span></i></p><p><span style="font-weight: 400;">I’ve seen cocktail napkins with more substance than the White House cybersecurity “strategy” that just dropped. Three pages. Three. You could print it on the back of a diner menu between the pastrami special and the cheesecake.</span></p><p><span style="font-weight: 400;">And yet we’re supposed to believe this is the roadmap for defending the most digitally dependent nation on Earth.</span></p><p><span style="font-weight: 400;">If this feels familiar, it should. For about a decade now we’ve been promised a healthcare plan that would be amazing, tremendous, the best ever, lower prices, more choice, everybody happy. What we got instead were “concepts of a plan.” Not a plan. Not legislation. Not implementation details. Concepts.</span></p><p><span style="font-weight: 400;">Welcome to cybersecurity’s version of that same movie. Call it </span><em>Concepts of a Cyberplan.</em></p><h3><b>Three Pages Is Not a Strategy</b></h3><p><span style="font-weight: 400;">Let me explain something to anyone who has never actually had to run security operations at scale. Real strategy documents are boring. They’re dense. They’re full of org charts, timelines, budgets, authorities, inter-agency coordination rules, escalation paths, and accountability metrics. They tell you who does what when something blows up at 2:17 a.m.</span></p><p><span style="font-weight: 400;">They are not inspirational pamphlets.</span></p><p><span style="font-weight: 400;">A national cyber strategy should answer basic operator questions:</span></p><ul><li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Who is in charge during a major incident?</span></li><li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">How do federal agencies coordinate with states and industry?</span></li><li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">What funding supports these mandates?</span></li><li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">What authorities change?</span></li><li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">What regulations tighten or loosen?</span></li><li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">How do we measure success?</span></li></ul><p><span style="font-weight: 400;">Instead we got vibes. Aspirations. High-level goals that sound terrific until you ask the only question that matters:</span></p><p><b>OK, how exactly?</b></p><p><span style="font-weight: 400;">No answer.</span></p><h3><b>The Healthcare Déjà Vu</b></h3><p><span style="font-weight: 400;">The parallel to the long-promised healthcare overhaul is almost too perfect. Big promises. Beautiful outcomes. Zero operational roadmap.</span></p><p><span style="font-weight: 400;">“We’re going to lower drug prices.”</span><span style="font-weight: 400;"><br></span><span style="font-weight: 400;">“We’re going to give you more choices.”</span><span style="font-weight: 400;"><br></span><span style="font-weight: 400;">“It’s going to be huge.”</span></p><p><span style="font-weight: 400;">Now translate that into cyber:</span></p><p><span style="font-weight: 400;">“We’ll be safer.”</span><span style="font-weight: 400;"><br></span><span style="font-weight: 400;">“We’ll deter adversaries.”</span><span style="font-weight: 400;"><br></span><span style="font-weight: 400;">“We’ll punish attackers.”</span><span style="font-weight: 400;"><br></span><span style="font-weight: 400;">“We’ll unleash innovation.”</span></p><p><span style="font-weight: 400;">Terrific. Who’s doing what on Monday morning?</span></p><p><span style="font-weight: 400;">Silence.</span></p><h3><b>Offensive Cyber Powerhouse? News Flash</b></h3><p><span style="font-weight: 400;">The document talks about becoming an offensive cyber powerhouse, as if we’ve been sitting around knitting sweaters while nation-states run wild.</span></p><p><span style="font-weight: 400;">News flash. The United States has had formidable offensive cyber capabilities for decades. If raw offensive power alone solved the problem, ransomware would be extinct and foreign intrusion campaigns would be a historical footnote.</span></p><p><span style="font-weight: 400;">Instead, attacks continue because cyber conflict is asymmetric, deniable, and cheap. You don’t deter a swarm of opportunistic actors the same way you deter a nuclear superpower.</span></p><p><span style="font-weight: 400;">Declaring dominance is not a strategy. It’s a press release.</span></p><h3><b>Self-Policing Critical Infrastructure Is Fantasy</b></h3><p><span style="font-weight: 400;">Another gem is the implication that we can ease regulatory pressure and let industry largely police itself.</span></p><p><span style="font-weight: 400;">Look, I love the private sector. I’ve spent my career in it. But critical infrastructure is not a startup hackathon. It runs pipelines, power grids, hospitals, ports, and financial systems. The incentives don’t naturally align toward national security outcomes. They align toward cost, uptime, and shareholder value.</span></p><p><span style="font-weight: 400;">That’s not evil. That’s capitalism.</span></p><p><span style="font-weight: 400;">Public-private partnership has taken over a decade to build. Information sharing frameworks, sector coordinating councils, joint exercises, incident response integration. Thousands of professionals on both sides worked their tails off to make it functional.</span></p><p><span style="font-weight: 400;">To wave that away with a “trust us” approach is not bold leadership. It’s magical thinking.</span></p><h3><b>Where’s CISA?</b></h3><p><span style="font-weight: 400;">For years, the Cybersecurity and Infrastructure Security Agency has been positioned as the hub of civilian cyber defense. Not perfect. Not universally loved. But undeniably central.</span></p><p><span style="font-weight: 400;">This new document reads like that entire body of work barely exists. No clear role expansion. No operational blueprint. No acknowledgment of the machinery already in place.</span></p><p><span style="font-weight: 400;">Imagine releasing a national defense strategy that forgets to mention the Army.</span></p><p><span style="font-weight: 400;">That’s what this feels like to people who actually work in federal cyber programs.</span></p><h3><b>The Apologists Are Missing the Point</b></h3><p><span style="font-weight: 400;">What really stunned me wasn’t the document itself. Governments produce vague papers all the time. What stunned me was the cheerleading from some corners of the industry.</span></p><p><span style="font-weight: 400;">The argument goes something like this: detailed plans are bad because the threat landscape changes. Therefore broad goals are smarter.</span></p><p><span style="font-weight: 400;">Nice theory. Completely backwards in practice.</span></p><p><span style="font-weight: 400;">Adaptive planning does not mean no planning. It means modular planning, scenario planning, contingency planning. The military does this constantly. So do mature enterprises.</span></p><p><span style="font-weight: 400;">Operators don’t need slogans. They need guidance.</span></p><p><span style="font-weight: 400;">If your house is on fire, you don’t want a philosophy about firefighting. You want a hose, a plan, and someone in charge.</span></p><h3><b>Practitioners Are Not Impressed</b></h3><p><span style="font-weight: 400;">Talk privately to people who have worked inside federal cyber teams or closely with them. The reaction is not excitement. It’s not relief. It’s disbelief.</span></p><p><span style="font-weight: 400;">After years of incremental progress, coordination improvements, and hard-won lessons from real incidents, they’re staring at a three-page document that feels like a reset to square one.</span></p><blockquote><p><b>“Cybersecurity can’t run on slogans. Three pages of promises won’t defend a nation wired to the teeth.”</b></p></blockquote><p><span style="font-weight: 400;">These are not armchair commentators. These are the people pulling night shifts during major breaches, coordinating with intelligence agencies, advising governors, and helping companies recover while the headlines rage.</span></p><p><span style="font-weight: 400;">They are the ones providing the blanket of protection the rest of us sleep under.</span></p><p><span style="font-weight: 400;">And they know a placeholder when they see one.</span></p><p><span style="font-weight: 400;">Others riding the beltway gravy train can analyze and apologize, but they are too afraid to criticize.</span></p><h3><b>Consequences Without Mechanisms</b></h3><p><span style="font-weight: 400;">The strategy promises punishment for adversaries who harm the United States.</span></p><ol><li><span style="font-weight: 400;"> How?</span></li></ol><p><span style="font-weight: 400;">Cyber retaliation is legally, diplomatically, and operationally complex. Attribution takes time. Escalation risks are real. International norms are murky. Many attackers operate through proxies or criminal ecosystems.</span></p><p><span style="font-weight: 400;">Saying “there will be consequences” without describing the toolbox is like announcing tough new law enforcement without hiring any cops.</span></p><h3><b>We’ve Seen This Movie Before</b></h3><p><span style="font-weight: 400;">History is full of conflicts launched with enthusiasm and vague objectives, only to drag on because no one defined success or exit conditions. Strategy is supposed to prevent that.</span></p><p><span style="font-weight: 400;">Cyber conflict is already continuous, global, and largely invisible. The last thing we need is less clarity about how we intend to navigate it.</span></p><h3><b>Time for Serious People</b></h3><p><span style="font-weight: 400;">In </span><i><span style="font-weight: 400;">The American President</span></i><span style="font-weight: 400;">, Michael Douglas delivers a line that hits harder every year: when the talking is over, it’s time for serious people to get to work.</span></p><p><span style="font-weight: 400;">That’s where we are.</span></p><p><span style="font-weight: 400;">Cybersecurity is not a branding exercise. It is not a campaign promise. It is not solved by declaring greatness or issuing a glossy summary.</span></p><p><span style="font-weight: 400;">It is grinding, technical, bureaucratic, expensive work carried out by thousands of specialists across government and industry. They deserve direction, resources, and accountability, not a three-page wish list.</span></p><h3><b>No Plan Is Not a Strategy</b></h3><p><span style="font-weight: 400;">Calling this an improvement over the progress of the past decade is not just optimistic. It’s disrespectful to the professionals who built that progress piece by piece, incident by incident.</span></p><p><span style="font-weight: 400;">Hope is not architecture. Intent is not execution. And slogans do not stop malware.</span></p><p><span style="font-weight: 400;">If this is the best we can produce for defending the digital backbone of the country, then we don’t have a cyber strategy.</span></p><p><span style="font-weight: 400;">We have concepts of one.</span></p><p><span style="font-weight: 400;">And the people standing watch on our networks deserve a lot better than concepts.</span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/03/concepts-of-a-cyberplan/" data-a2a-title="Concepts of a Cyberplan"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F03%2Fconcepts-of-a-cyberplan%2F&amp;linkname=Concepts%20of%20a%20Cyberplan" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F03%2Fconcepts-of-a-cyberplan%2F&amp;linkname=Concepts%20of%20a%20Cyberplan" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F03%2Fconcepts-of-a-cyberplan%2F&amp;linkname=Concepts%20of%20a%20Cyberplan" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F03%2Fconcepts-of-a-cyberplan%2F&amp;linkname=Concepts%20of%20a%20Cyberplan" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F03%2Fconcepts-of-a-cyberplan%2F&amp;linkname=Concepts%20of%20a%20Cyberplan" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>