What Does this Executive Order Mean For My Organization?
The Executive Order focuses on improving the cybersecurity posture and readiness of federal agencies. Here is a breakdown of each section of the Executive Order and what it means for your organization.

To the Point: Strengthening Cybersecurity
Experts from Tanium break down the details in the Executive Order and share the questions you should be asking to prepare for the next incident.
Watch nowof Americans believe public and private sectors should share info to prevent cyberattacks.
THE HARRIS POLLWhy It Matters
Section Summary
This section of the Executive Order discusses the need to:
- Share threat information about the incidents they suffer with the federal government.
- Collect and preserve data that could aid threat detection, investigation and response.
- Perform technical activities — like network monitoring — to collaborate with agencies surrounding incident investigation and response.
Why This Is Needed
Historically, organizations have not shared threat information from the incidents they have suffered — and when they do, they tend to share the minimum information required to meet their compliance requirements.
The reason is simple: no organization wants to share bad news, especially when it comes to their cybersecurity capabilities. By sharing information about incidents that they have suffered, they risk damaging their reputation, losing their customers' trust, reducing their share price and making it seem like they wasted money on their current cybersecurity tools.
“The thought leaders who draft recommendations for new contractual language will have to refine the thresholds for reporting cyber intelligence to the government.”- Bradley Barth, Deputy Editor, SC Media
The Expected Impact
Staying silent about cybersecurity incidents is unsustainable and harms our broader community.
If an organization does not disclose information about their incidents, then other organizations will remain ignorant of that threat and remain at greater risk for suffering it themselves.
But if an organization rapidly shares information about their incidents, others can proactively hunt for indicators of that threat within their environment and raise defenses against it.
With this Executive Order, the federal government is creating a central authority to collect this threat information and share it publicly. But this approach will work only if organizations step up and rapidly share their incident information.
More resources
Why It Matters
Section Summary
This section of the Executive Order discusses the need to to modernize IT and cybersecurity standards across multiple dimensions. To do so, organizations must develop the ability to:
- Move to secure cloud services.
- Deploy multifactor authentication, data encryption.
- Build Zero-Trust architecture within a centralized enterprise model.
- Establish governance frameworks to coordinate incident response activities.
- Catalog data in the environment, including each data's type, sensitivity and risk levels.
- Drive cybersecurity analytics by centralizing and streamlining access to relevant data.
Why This Is Needed
Historically, organizations have kept most of their employees, endpoints and data on-premises, and they have used cybersecurity tools and models that created a hardened perimeter around their centralized workforces.
But employees, endpoints and data no longer live on-premises. The rapid move to work-from-home (WFH) and digital transformation trends have created distributed networks, dissolved security perimeters and made legacy cybersecurity tools and models obsolete. Organizations must rapidly acquire modern cybersecurity tools and models developed to secure today's environments — not yesterday's.
“In order to bank the returns on investment in digitization, including customer engagement and workforce flexibility, both public and private sector enterprises need to reimagine their cybersecurity capabilities, and the EO provides a valuable blueprint against which to critically assess their future cybersecurity strategies and investments – and with an appropriate sense of urgency.”- Gary Blair, Former CISO at Commonwealth Bank, NAB, Westpac,
Tanium Advisor
The Expected Impact
Legacy cybersecurity tools and models have contributed to a growing wave of breaches. These tools and models are often unable to create comprehensive visibility or real-time control over remote endpoints, leading to open vulnerabilities, easy exploits and insufficient incident response.
In short: relying on legacy cybersecurity tools and models will no longer work.
With this Executive Order, the federal government seeks to lead the way to increase the adoption of modern cybersecurity models and to drive the rapid acquisition of emerging cybersecurity technologies that move visibility and control away from the perimeter and onto the endpoint itself.
Why It Matters
Section Summary
This section of the Executive Order discusses the need to:
- Establish baseline security standards for the development of third-party software.
- Require suppliers to demonstrate the security of their development environment.
- Make security data for software suppliers publicly available and accountable.
- End procurement of legacy software developed out of compliance with these standards.
Why This Is Needed
Historically, organizations have lacked visibility into the security of their suppliers. They have relied on overly simplistic audits to manually track each of their supplier's security and risk, or they have fallen back on trust and assumed that their suppliers maintained effective defenses.
This approach was never ideal, and it's spiraling out of control as supply chains become more complex.
The result: organizations often perform supply chain security governance too late in their onboarding process. They often fail to regularly reappraise the security of their suppliers, and they typically lack meaningful end-to-end visibility into the risks their supply chain carries.
"The U.S. government and industry must work together to achieve the trusted, secure, and reliable global supply chain that is necessary to encourage economic growth, protect national security, and harness U.S. innovation."- Jason Oxman, President and CEO, Information Technology Industry Council
The Expected Impact
Software supply chain attacks have emerged as one of today's most significant threats, best exemplified by the recent SolarWinds attack that compromised hundreds of organizations, including dozens of federal government agencies.
With this Executive Order, the federal government seeks to create a more secure and accountable vendor ecosystem. To do so, they are using their purchasing power to incentivize third-party suppliers to implement secure software developer standards and to report their compliance with evidence.
More resources
Why It Matters
Section Summary
This section of the Executive Order discusses the need for a federal Cybersecurity Review board that will be co-chaired by government and private sector leads to:
- Continuously review and assess threat activity.
- Convene following significant cybersecurity incidents to analyze them.
- Provide recommendations on how organizations can improve their security.
- Provide functions similar to the National Transportation Safety Board.
“The order offers several sections of direct outreach to businesses, including its intent to make the incident review board a public private partnership headed by industry. That has the potential to be transformative. It may give stakeholders a chance to avoid mistakes by learning from attacks.”- Joe Uchill, SC Magazine
Why This Is Needed
Historically, the federal government has lacked a centralized authority on cybersecurity to receive information on incidents, analyze what happened and provide recommendations for remediation and security improvement.
In addition, there has been no formal partnership between cybersecurity leaders within the federal government and the private sector.
The result: organizations have lacked a single source for clear guidance on cybersecurity matters — both on developing incidents and baseline security measures.
“Too often organizations repeat the mistakes of the past and do not learn lessons from significant cyber incidents. When something goes wrong, the Administration and private sector need to ask the hard questions and make the necessary improvements.”- Maria Henriquez, Security Magazine
The Expected Impact
Cybersecurity incidents are growing in size, volume and complexity. Organizations need credible information on emerging threats and recent incidents to secure themselves before they become victims themselves.
With this Executive Order and the creation of this board, the federal government seeks to provide fast, consistent and practical guidance on all things cybersecurity.
In addition, they highlight the simple fact that piecemeal solutions to cybersecurity are no longer viable and that centralized visibility, investigation, analysis, and action have become the table stakes to combat today’s threats.
More resources
of respondents say real-time data is very or extremely important to network visibility.
GCB FLASH POLLWhy It Matters
Section Summary
This section of the Executive Order discusses the need to:
- Create standardized playbooks and definitions for vulnerability and incident response.
- Achieve equal maturity levels around response plans across the entire organization.
- Execute uniform steps with consistent results to identify and mitigate threats.
Why This Is Needed
Historically, vulnerability and incident response has often been siloed, fragmented and ad hoc activities within organizations, performed using varying procedures to identify, remediate and recover from cybersecurity problems.
The result: organizations have lacked a shared understanding of their cybersecurity status and how to improve it. They have struggled to perform consistent vulnerability and incident response activities, maintain compliance with industry standards like the National Institute of Standards and Technology (NIST) Cybersecurity Framework and ensure you have maximum awareness of where vulnerabilities exist and a mechanism and a process to remediate them quickly.
“For the federal government, the uniform playbook is intended to help coordinate incident response. For the private sector, the standardized playbook will be a potentially valuable reference point as companies evaluate their own incident response policies and procedures.”- Global Law Firm Mayer Brown
The Expected Impact
To cause a breach, a malicious actor needs to find only one gap in an organization’s cybersecurity posture. If an organization cannot agree internally about what an incident looks like, how to prevent one, and how to respond if one occurs, then malicious actors will find many gaps to exploit.
Further, once an incident does occur, different groups within the organization will struggle to rapidly collaborate on remediation, furthering the spread and impact of the incident.
These standardized definitions and playbooks are also required to empower centralized cybersecurity authorities by giving them benchmarks to evaluate internal compliance against.
With this Executive Order, the federal government encourages organizations to standardize their response efforts and provides them with a template to model their new playbooks after.
More resources
of respondents say real-time data is very or extremely important to network visibility.
GCB FLASH POLLWhy It Matters
Section Summary
This section of the Executive Order discusses the need to:
- Increase visibility into vulnerabilities and accelerate detection of cybersecurity incidents.
- Establish enterprise-wide Endpoint Detection and Response (EDR) capabilities.
- Develop centralized threat hunting, containment and remediation capabilities.
Why This Is Needed
Historically, organizations have focused threat detection capabilities around simply spotting malware with known signatures. This approach has left organizations unable to detect new threats that use unknown attack patterns until it's too late.
In addition, this approach has de-emphasized the importance of identifying and closing known endpoint vulnerabilities in the environment — though many incidents begin with a malicious actor exploiting one of these vulnerabilities.
“Threat-hunting aficionados will recall that Congress actually granted CISA expanded centralized threat-hunting authority in the National Defense Authorization Act. In a sign of importance of that fresh authority, the EO calls for CISA to produce a report in 90 days explaining how they are putting this authority to work and also requires additional reporting every quarter describing its ongoing use.”- Robert Chesney, Trey Herr, Lawfare
The Expected Impact
To defend against new threats and raise the barrier to entry into their environment, organizations must extend detection beyond malware to encompass threat hunting and vulnerability checks.
If organizations fail to do so, they will remain at risk for novel threat patterns, such as the SolarWinds attacks and Microsoft Exchange Server incidents.
With this Executive Order, the federal government seeks to lead organizations to adopt proactive and expanded threat detection through enterprise-wide EDR deployments.
But while organizations must evolve their approach to threat detection, EDR may not offer the ideal way forward.
More resources
of respondents report they never have complete visibility over their IT environments.
GCB FLASH POLLWhy It Matters
Section Summary
This section of the Executive Order discusses the requirements for robust and consistent cybersecurity event logging by developing standard practices for logging and creating mechanisms to enforce those practices.
Why This Is Needed
Historically, many organizations use systems that lack robust and consistent logging.
The result: many organizations have a limited ability to detect cybersecurity incidents, remediate those incidents, and perform accurate and effective analysis to determine each incident’s spread and root cause.
“As emphasized by some of the most pointed criticism of vendors in the aftermath of SolarWinds/Sunburst, the amount (and nature) of data recorded to network logs, and how that data is retained and accessed, can have a major influence on the speed and success of cyber incident response.”- Robert Chesney, Trey Herr, Lawfare
The Expected Impact
Recent incidents — most notably the SolarWinds attack — made it clear just how important log data is when a major incident occurs.
Organizations that retained sufficient log data in an easily accessible manner were more effective at remediating this incident than their counterparts.
With this Executive Order, the federal government seeks to lead the way in collecting and maintaining a sufficient volume of log data.
But the centralized approaches and Endpoint Detection and Response (EDR) solutions discussed within the Executive Order may not provide the optimal approach toward logging data to mitigate modern threats and vulnerabilities.
More resources
How Tanium Supports the Cybersecurity Executive Order
IT environments are complex and managing them is more challenging than ever before. With Tanium, know everything that’s going on — on every endpoint — in order to prevent bad things from happening or fix them fast when they do.

Know everything now
See into every endpoint, managed or unmanaged, with complete, accurate and real-time data in seconds.
Take control
Whether on premises or in the cloud, take control of your entire IT estate in seconds with minimal network impact.
Fix it fast
Contain, remediate or patch emerging incidents at scale in minutes and take a proactive approach to IT management.
Align teams
With a single source of truth, gain a shared understanding of all of the data across your entire environment.
Gain Visibility and Control Into Your Digital Business
Contact us today for advice on endpoint management and security, and learn how Tanium customers are ready for whatever comes next.

Gain Visibility and Control Into Your Digital Business
Contact us today for advice on endpoint management and security, and learn how Tanium customers are ready for whatever comes next.
Gain Visibility and Control Into Your Digital Business
Contact us today for advice on endpoint management and security, and learn how Tanium customers are ready for whatever comes next.