The Quantum Cybersecurity Preparedness Act Builds on National Security Memorandum 8
On January 19th, the President signed National Security Memorandum (NSM) 8, “Improving the Cybersecurity of National Security, Department of Defense and Intelligence Community Systems”.
NSM8 appeared to have been inspired by Project Warp Speed – specifically, the elimination of layers of reportage and bureaucracy when trying to innovate with unprecedented speed and scale. With NSM8 and NSS, the goal was not so much the acceleration of innovation, but the ability to “defend forward” at speed and scale – with a tight OODA Loop between the White House and the NSA. At the time, the signing of NSM 8 appeared tactical, not strategic.
Legislation introduced in the House in early April builds on NSM 8 – which inspired us to return to NSM8 for further analysis as we promised at the end of our analysis back in January. Our coda back in January: “This memorandum is a wildly interesting national security development. Stay tuned for more OODA Loop coverage as details are made available.” There were major Quantum Cybersecurity strategic directives in NSM 8 which was not a part of our initial analysis. The legislation in the house, entitled The Quantum Cybersecurity Preparedness Act is – excuse the pun – a quantum leap forward to this strategic plan for what will be “the greatest cryptographic migration in history.” (1)
In this post, we will return to the section of NSM 8 concerned with Quantum Cybersecurity, including the 30, 60, 90, and 180-day deadlines from the date of the memorandum.
We will then take a look at the legislation to determine if the House Committee on Oversight and Reform has become the central, public-facing organizational entity for this strategic initiative. The research question is: How many of the deadline-driven deliverables and directives informed the bill and/or found their way into the legislation? Is this legislation the mechanism for delivery of the directives? If not, is there a public repository available for unclassified documents which may be of interest to the private sector exploring opportunities to provide solutions?
We also included directives and deadlines related to zero trust architecture – as OODA Network members are proponents of the innovative architecture. Also of interest (and encouraging): commercial cloud technologies and commercial national security algorithms (CNSA) crop up in a few places, complete with specific directives.
To continue reading please consider joining as either a subscriber or full member to support our continued research and analysis. For more on benefits of membership see below.
Want more insight? Log in for the full report
Already a member? Sign in to your account.
OODA Loop provides actionable intelligence, analysis, and insight on global security, technology, and business issues. Our members are global leaders, technologists, and intelligence and security professionals looking to inform their decision making process to understand and navigate global risks and opportunities.
You can chose to be an OODA Loop Subscriber or an OODA Network Member. Subscribers get access to all site content, while Members get all site content plus additional Member benefits such as participation in our Monthly meetings, exclusive OODA Unlocked Discounts, discounted training and conference attendance, job opportunities, our Weekly Research Report, and other great benefits. Join Here.
Explore OODA Research and Analysis
Use OODA Loop to improve your decision making in any competitive endeavor. Explore OODA Loop
The greatest determinant of your success will be the quality of your decisions. We examine frameworks for understanding and reducing risk while enabling opportunities. Topics include Black Swans, Gray Rhinos, Foresight, Strategy, Stratigames, Business Intelligence and Intelligent Enterprises. Leadership in the modern age is also a key topic in this domain. Explore Decision Intelligence
We track the rapidly changing world of technology with a focus on what leaders need to know to improve decision-making. The future of tech is being created now and we provide insights that enable optimized action based on the future of tech. We provide deep insights into Artificial Intelligence, Machine Learning, Cloud Computing, Quantum Computing, Security Technology, Space Technology. Explore Disruptive/Exponential Tech
Security and Resiliency
Security and resiliency topics include geopolitical and cyber risk, cyber conflict, cyber diplomacy, cybersecurity, nation state conflict, non-nation state conflict, global health, international crime, supply chain and terrorism. Explore Security and Resiliency
The OODA community includes a broad group of decision-makers, analysts, entrepreneurs, government leaders and tech creators. Interact with and learn from your peers via online monthly meetings, OODA Salons, the OODAcast, in-person conferences and an online forum. For the most sensitive discussions interact with executive leaders via a closed Wickr channel. The community also has access to a member only video library. Explore The OODA Community