Obama Commission on Enhancing National Cybersecurity Provides Recommendations to Next Administration

Dec 15, 2016

Reading Time : 5 min

By: Natasha G. Kohne, David S. Turetsky, Visiting Professor, College of Emergency Preparedness, Homeland Security, and Cybersecurity at the University of Albany

A significant portion of the analysis and some of the recommendations should be of interest to the incoming Trump team as it moves forward with its own plans to have a Cyber Review Team that includes government and private sector representation and will be led by the Department of Defense (DoD), to conduct a far-ranging cybersecurity review of U.S. cyber defenses and vulnerabilities, including critical infrastructure and other important areas; and to create joint task forces throughout the U.S. to coordinate federal, state, and local law enforcement efforts against cybercrime.

The Report by the Numbers

  • The Commission’s 12 members included individuals recommended by leaders of both parties in the House and Senate and others selected by the President. These included, in addition to Chairman Tom Donilon, the former National Security Advisor to President Obama, the Commission’s Vice Chair, Samuel Palmisano, the former Chairman and CEO of IBM, and a host of distinguished leaders and experts from academia and industry, including several CEOs, some of whom had previously held critical government roles.
  • In developing the Report, the Commission obtained a wide range of input, including testimony from six hearings it held across the country and from numerous written comments received in response to its public solicitations.
  • The Report identifies 10 foundational principles, nine broad findings, six major imperatives, 16 recommendations and a total of 53 action items associated with those recommendations.
  • Each action item includes guidance regarding when the Commission believes work on it should commence. All were designated for the short or medium term, ranging from the first 100 days to five years, depending on whether action is required by both Congress and the Administration, or extensive consultation with other stakeholders is required, or if more information is needed.    
  • The nine broad findings state that many organizations still fail to do even basic cybersecurity. Companies are under pressure to move innovations to market quickly, even at the expense of cybersecurity; flexible and mobile working environments are necessary but increase risk and make the “classic concept of the security perimeter…largely obsolete”; technological complexity creates vulnerabilities and sophisticated attackers can gain access at a fraction of the cost of defense; risks from increased connectivity are sometimes associated with the Internet of Things (“IoT”); interdependencies, decentralization and supply chain risks abound; government is vexed by large legacy technology systems and challenges in making investments in and procuring needed talent and systems; and concern is increasing and trust eroding in everything from the integrity of data, elections, and organizations that produce products and services.

Action Items

The array of action items suggested by the Commission include ideas that are designed to provide a way forward to improve cybersecurity for businesses, government and consumers. Some of the action items will be appealing to the business community, others may be neutral, and still others may be regarded with skepticism or concern.

Here are some examples of the action items:

  • The Department of Homeland Security (DHS) should work to address industry’s concern about increased exposure to legal actions if it engages with government proactively and collaboratively on a coordinated joint defense plan and risk management practices, by working with industry to identify needed changes in statutes, regulations or policies such as public disclosure laws like FOIA, discovery in civil litigation, use in regulatory enforcement actions or rulemaking, implications for attorney-client privilege, or similar concerns. Action Item 1.2.3
  • The National Institute of Standards and Technology (NIST) should build on its Cybersecurity Framework and establish a Cybersecurity Framework Metrics Working Group (CFMWG) to develop industry-led, consensus-based metrics that industry can use to voluntarily assess relative corporate risk, help government and insurers to understand insurance coverage needs and standardize premiums, and implement a nationwide voluntary incident reporting program for identifying cyber gaps. Action Item 1.4.1
  • Federal regulators should harmonize existing and future regulation with the NIST Cybersecurity Framework to address strong private sector concerns that regulators are inconsistently using and applying the Framework; and are creating redundancy, inconsistency, higher compliance costs for businesses, and impediments to innovation. In addition, the Report calls for the creation of Office of Management and Budget (OMB) procedures to reduce the likelihood of these federal problems and also calls for state and local regulatory agencies to address overlapping and potentially inconsistent state regulation. Action Item 1.4.3
  • The government should create additional incentives to companies that implement cyber risk management principles and demonstrate collaborative engagement, such as liability protections, including certain safe harbors for companies in regulated sectors. Additional incentives might include tax and government procurement incentives, prioritized cyber technical assistance, regulatory streamlining or public recognition. Action Item 1.4.5
  • The Department of Justice (DOJ) should lead an interagency study with governmental and private parties to assess whether the law provides appropriate incentives for companies to design security into their products, including in regard to liability for harm caused by faulty IoT devices. This includes whether there are adequate protections for companies that do adequately design-in cybersecurity and identification and action regarding any gaps. Action Item 2.1.3
  • Independent organizations should develop the equivalent of a cybersecurity “nutritional label” for technology products and services to provide consumers better information to make informed choices, perhaps linked to understandable and impartial third-party ratings. Action Item 3.1.1
  • The General Services Administration (GSA) should lead efforts to integrate technology across government more effectively and share standard platforms, and improve federal procurement by involving agency CISOs, creating integrated teams of agency technology and acquisition experts, and reforming the procurement and bid protest process. Action Item 5.2.2
  • To address a lack of standards of measurement in assessing cybersecurity preparedness, the CFMWG should develop metrics to assess an agency’s cybersecurity posture and integrate the metrics with other relevant measures to evaluate performance as part of the annual budget process. Action Item 5.3.3
  • Congress should consolidate cybersecurity and infrastructure protection functions under the oversight of a single federal agency with appropriate capabilities and responsibilities to do the job. Action Item 5.5.2
  • The President should appoint an Ambassador for Cybersecurity as part of a federal government effort to build consensus, standards and norms to harmonize U.S. and international approaches to cybersecurity and avoid inconsistencies that create unnecessary costs. See, e.g., Action Items 6.1.1, 2, 3.

In a written statement,2 President Obama urged President-elect Trump and the next Congress to consider the recommendations. The President said, “The Commission’s recommendations are thoughtful and pragmatic…I believe that the next administration and the next Congress can benefit from the Commission’s insights and should use the Commission’s recommendations as a guide.” President Obama also asked the Commission to brief President-elect Trump and his transition team on the report “at their earliest opportunity.”3


1 Commission on Enhancing National Cybersecurity:  Report on Securing and Growing the Digital Economy (Dec. 1, 2016), https://www.whitehouse.gov/sites/default/files/docs/cybersecurity_report.pdf. The page count includes the appendices.

2 Statement by the President on the Report of the Commission on Enhancing Cybersecurity (Dec. 2, 2016),

3 See the penultimate paragraph of the Statement by the President on the Report of the Commission on Enhancing Cybersecurity (Dec. 2, 2016),.

Share This Insight

Previous Entries

Deal Diary

June 27, 2024

On June 24, 2024, the U.S. Securities and Exchange Commission (SEC) published five new Form 8-K Compliance and Disclosure Interpretations (C&DIs) expanding the agency’s interpretations of cybersecurity incident disclosures pursuant to Item 1.05 of Form 8-K. In July 2023, the SEC adopted final rules with respect to cybersecurity incidents that generally require public companies to disclose (i) material cybersecurity incidents within four business days after determining the incident was material and (ii) material information regarding their cybersecurity risk management, strategy and governance on an annual basis. We wrote about the final cybersecurity disclosure rules here.

...

Read More

Deal Diary

February 12, 2024

The Securities and Exchange Commission (SEC) recently adopted final rules (available here; also see the fact sheet and press release) representing significant changes to  special purpose acquisition companies (SPACs), shell companies and the disclosure of projections. These rules aim to enhance disclosures, protect investors and align the regulatory framework for SPACs with traditional IPOs. The following summarizes the key aspects of these rules.

...

Read More

Deal Diary

October 4, 2023

On September 20, 2023, the U.S. Securities and Exchange Commission (SEC) issued a final rule amending the so-called “Names Rule” (found here) that is “designed to modernize and enhance” protections under Rule 35d-1 of the Investment Company Act of 1940. The final rule is part of the SEC’s holistic efforts to regulate environmental, social and governance (ESG) matters, and is the SEC’s latest attempt to curb greenwashing in U.S. capital markets. The amendments require registered investment funds that include ESG factors in their names to place 80% of their assets in investments corresponding to those factors, thereby extending to ESG funds the SEC’s long-standing approach of regulating the names of registered funds to ensure they are marketed to investors truthfully. Fund complexes with more than $1 billion in assets will have two years from the final rule’s effective date (60 days after publication in the Federal Register) to comply, while fund complexes with less than $1 billion in assets will be given a compliance period of 30 months.

Chair Gary Gensler said “[t]he Names Rule reflects a basic idea: A fund’s investment portfolio should match a fund’s advertised investment focus. In essence, if a fund’s name suggests an investment focus, the fund in turn needs to invest shareholders’ dollars in a manner consistent with that investment focus. Otherwise, a fund’s portfolio might be inconsistent with what fund investors desired when selecting a fund based upon its name.” The sole dissenting vote against the rule modification, Commissioner Mark Uyeda, said “[w]ith these amendments, the Commission overemphasizes the importance of a fund’s name, as if to suggest that investors and their financial professionals need not look at the prospectus disclosures.” Commissioner Uyeda also expressed concern that fund investors will bear the increased compliance costs associated with the rule change.

...

Read More

Deal Diary

May 31, 2023

As discussed in our prior publication (found here), the Securities and Exchange Commission (SEC) adopted amendments on December 14, 2022, regarding Rule 10b5-1 insider trading plans and related disclosures. On May 25, 2023, the SEC issued three new compliance and disclosure interpretations (C&DIs) relating to the Rule 10b5-1 amendments.

...

Read More

Deal Diary

May 24, 2023

On May 15, 2023, the Eastern District of California ruled that California Assembly Bill No. 979 (“AB 979”) violates the Equal Protection Clause of the U.S. Constitution’s Fourteenth Amendment and 42 U.S.C. § 1981. As enacted, California’s Board Diversity Statute, required public companies with headquarters in the state to include a minimum number of directors from “underrepresented communities” or be subject to fines for violating the statute. AB 979 defines a “director from an underrepresented community” as “an individual who self-identifies as Black, African American, Hispanic, Latino, Asian, Pacific Islander, Native American, Native Hawaiian, or Alaska Native, or who self-identifies as gay, lesbian, bisexual, or transgender.”

...

Read More

Deal Diary

May 9, 2023

Update: On October 31, 2023, the Fifth Circuit granted the US Chamber of Commerce's petition for review of the SEC's share repurchase disclosure rules, holding that the SEC acted arbitrarily and capriciously in violation of the Administrative Procedure Act. The court directed the SEC to correct the defects within 30 days of the opinion. On December 1, 2023, the SEC informed the Fifth Circuit that it was unable to correct the rule's defects within 30 days of the opinion. On December 19, 2023, the Fifth Circuit vacated the SEC’s share repurchase disclosure rules.

...

Read More

Deal Diary

April 12, 2023

We have released our 2023 ESG Survey which includes a collection of reports reflecting on significant ESG themes and trends from 2022, as well as what we believe to be key developments for 2023.

...

Read More

Deal Diary

February 6, 2023

As companies begin preparing for the 2023 proxy season, we note that Institutional Shareholder Services Inc. (ISS) and Glass Lewis, the leading providers of corporate governance solutions and proxy advisory services, issued updated benchmark policies (proxy voting guidelines), which can be found here and here, respectively. The updated proxy voting guidelines generally focus on board accountability and oversight considerations and address topics such as climate accountability, board diversity, shareholder rights, corporate governance standards, executive compensation and social issues. What follows is a summary of the proxy voting guidelines published by ISS and Glass Lewis for the 2023 proxy season.

...

Read More

© 2024 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.