SecureWorld News

Trump Administration Issues National Cyber Strategy, Targets Cybercrime

Written by Drew Todd | Tue | Mar 10, 2026 | 11:42 AM Z

The White House released President Trump's Cyber Strategy for America on March 6, 2026, a seven-page document outlining the administration's priorities for maintaining U.S. dominance in cyberspace. Alongside the strategy, President Trump signed an Executive Order directing federal agencies to ramp up efforts against cybercrime, fraud, and predatory schemes targeting American citizens.

Together, the two actions signal a philosophical shift in how Washington approaches cybersecurity: less compliance, more consequence. The strategy commits the U.S. to deploying both offensive and defensive cyber operations, incentivizing private-sector participation in threat disruption, and leveraging AI and emerging technologies to scale national cyber defense.

But the ambitious vision arrives against a challenging backdrop. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has lost roughly one-third of its staff over the past year, NIST's Computer Security Division has shed more than 20% of its workforce, and CISA still lacks a Senate-confirmed director. Whether the strategy's goals can be achieved with diminished institutional capacity remains an open question.

The six pillars

The strategy is organized around six policy pillars that will guide implementation and resourcing.

1. Shape adversary behavior

The strategy's most aggressive pillar commits the U.S. to deploying the full suite of offensive and defensive cyber operations. It pledges to erode adversaries' capabilities, raise the costs of aggression, and deny safe havens to cybercriminals. Notably, the document references recent operations against Iran's nuclear infrastructure and the capture of Venezuelan leader Nicolás Maduro as demonstrations of American cyber power—an unusual inclusion for a strategy document.

The strategy also calls for creating private-sector incentives to identify and disrupt adversary networks, a move that could significantly expand the scope of who participates in national cyber defense.

2. Promote common sense regulation

Framing Biden-era regulatory expansion as burdensome, the strategy pledges to streamline cyber regulations, reduce compliance costs, and better align regulators with industry. This aligns with the administration's decision to delay the final rule under the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) from October 2025 to May 2026. The pillar also emphasizes data privacy protections for Americans and American data.

3. Modernize and secure federal networks

The strategy calls for accelerating the adoption of zero-trust architecture, post-quantum cryptography, cloud migration, and AI-powered cybersecurity tools across federal systems. It also emphasizes lowering procurement barriers to give smaller and newer technology vendors access to government contracts.

4. Secure critical infrastructure

This pillar focuses on hardening the energy grid, financial systems, telecommunications, hospitals, water utilities, and data centers. The strategy emphasizes moving away from adversary-made products and technologies, and calls for strengthening the role of state, local, tribal, and territorial authorities as a complement to federal cybersecurity efforts.

5. Sustain superiority in critical and emerging technologies

Perhaps the most forward-looking pillar, this section positions cryptocurrency and blockchain security alongside AI and quantum computing as national security priorities. The strategy commits to securing the AI technology stack, including data centers, and pledges to rapidly adopt agentic AI for network defense. It also targets foreign AI platforms that censor, surveil, or mislead their users.

6. Build talent and capacity

Calling the cyber workforce a "strategic asset," the strategy pledges to align academia, vocational schools, corporations, and government to build a talent pipeline for the next generation of cyber professionals. This pillar arrives after a year in which the administration cut a significant number of cyber positions across federal agencies.

The companion Executive Order

Signed the same day, the Executive Order specifically targets transnational criminal organizations (TCOs) running cyber-enabled fraud, sextortion, and scam operations. Key directives include:

  • Establishing a dedicated operational cell within the National Coordination Center (NCC) to coordinate efforts against TCOs

  • Directing the Attorney General to prioritize prosecutions of cyber-enabled fraud

  • Creating a Victims Restoration Program to return seized or forfeited funds directly to victims

  • Directing the Secretary of State to impose sanctions, visa restrictions, and other consequences on nations that harbor cybercriminals

  • Partnering with the NCC to provide training and technical assistance for state and local partners

According to the White House fact sheet, American consumers reported losing more than $12.5 billion to cyber-enabled fraud in 2024, with seniors on average losing the most. The fact sheet also notes that 73% of U.S. adults have experienced some form of online scam or attack.

What cybersecurity experts are saying

Industry reaction has been broadly positive, particularly around the strategy's emphasis on public-private partnership and the shift from compliance-focused to operations-focused cybersecurity.

John Watters, CEO and Managing Partner at iCOUNTER, called the strategy's commitment to defending commercial-sector infrastructure a turning point, saying: "The Cyber Strategy for America, and accompanying Executive Order, cover common objectives of prior administrations with one bold and important difference—President Trump makes it clear that the government will now lean in to help protect the entirety of our national interests, not just government infrastructure."

Watters emphasized that, with 90% of U.S. critical infrastructure in commercial hands, tasking national cyber capabilities embedded in Cyber Command, NSA, and other government agencies to defend the private sector fundamentally changes the risk calculus for attackers.

"It will be interesting to see how this plays out, however, I applaud the bold move and message it sends," Watters said.

Bruce Jenkins, CISO at Black Duck, praised the strategy's practitioner-oriented focus: "President Trump's Cyber Strategy for America puts operational effect ahead of 'compliance theater.' From a practitioner's perspective, the emphasis on modernizing federal systems with zero trust, post-quantum cryptography, and AI-enabled defense—while streamlining duplicative regulation—is directionally appropriate. The real test and historical challenge will be in execution: translating these pillars into clear requirements, faster procurement, and measurable risk reduction across government and the defense industrial base.”

Kevin E. Greene, Chief Cybersecurity Technologist, said the strategy will drive the evolution of zero-trust architecture: "The new cyber strategy from the White House will necessitate a Zero Trust 2.0 approach that builds upon its foundational principles while incorporating deterrence and disruption concepts. Zero Trust must evolve to become the core engine for cyber deterrence."

Greene highlighted the shift from reactive to proactive cybersecurity as a defining feature of the strategy, noting that defensive and offensive capabilities must work in tandem to reshape adversary behavior. He said the strategy presents an opportunity for cybersecurity to be less risk-averse and to adopt a "fail fast" mentality.

"Shifting to active cyber defense will greatly maximize and enhance our offensive capabilities," Greene said. "Offensive capabilities are most lethal when the adversary's operations are physically constrained. It's the idea of shortening the playing field to yield greater offensive impact to further shape adversary behavior. This is a seismic shift we need to defend and protect forward."

Matthew Hartman, Chief Strategy Officer at Merlin Group, emphasized the importance of moving from vision to execution: "The National Cyber Strategy represents an important step in aligning federal cyber policy with the scale and complexity of today's threats. However, the hard work begins now, and that's translating the vision into ambitious-yet-achievable operational outcomes. Consequence-based prioritization will be essential to ensure finite federal and private-sector resources are focused on the systems where disruption would have the greatest national impact."

Hartman added that the strategy presents an opportunity to clarify how government and industry divide responsibility for defining and delivering shared security and resilience outcomes.

"If implemented effectively, the strategy can help drive coordinated action across government and strengthen resilience across the infrastructure that underpins the U.S. economy and national security," Hartman said.

Context and criticism

Despite industry support, the strategy has drawn scrutiny from analysts and policy experts who question the gap between ambition and capacity.

At seven pages, the document is noticeably shorter than its predecessors; Trump's first-term strategy in 2018 was 40 pages, and Biden's 2023 version was 39 pages. The Office of the National Cyber Director (ONCD) is drafting a more detailed implementation plan, but specifics on resourcing and timelines remain thin.

The strategy also arrives during a period of significant upheaval at CISA, the nation's primary civilian cyber defense agency. CISA has lost approximately 1,000 staff since early 2025 through buyouts, early retirements, and layoffs—reducing its workforce by roughly one-third. Senior leaders in counter-ransomware, threat hunting, and secure software development have departed. The agency's acting director was reassigned just one week before the strategy's release, and DHS Secretary Kristi Noem was fired earlier the same week.

At NIST, the Computer Security Division—responsible for the Cybersecurity Framework, the NIST SP 800-series, and the post-quantum cryptography standardization effort—has lost more than 20% of its federal workforce since January 2025, including its longtime division chief.

The Council on Foreign Relations (CFR) published an analysis arguing the strategy overemphasizes offensive operations while underestimating the systemic nature of threats from China, including the Salt Typhoon and Volt Typhoon campaigns that compromised U.S. telecommunications firms and pre-positioned access in critical infrastructure. CFR argues that cyber capabilities function best as an enabler of conventional military operations rather than a standalone strategic tool.

The Bloomsbury Intelligence and Security Institute noted that the strategy's commitment to streamlining regulation could accelerate private-sector innovation, but warned that the absence of a finalized mandatory incident reporting framework coincides with the period of greatest threat from state-sponsored actors.

Looking ahead

The strategy is designed to set cyber policy for the next three years. The ONCD is now drafting detailed action plans tied to each pillar, and the CIRCIA final rule—which will establish mandatory incident reporting requirements for critical infrastructure—is expected by May 2026.

For cybersecurity practitioners, the strategy's direction is clear: offense-forward operations, AI-powered defense, regulatory streamlining, and a deeper public-private partnership model. Whether the administration can execute on those ambitions—particularly with diminished capacity at the agencies responsible for implementation—will determine whether this strategy marks a genuine turning point or remains aspirational.

Follow SecureWorld News for more stories related to cybersecurity.