Mar 18, 2026
Podcast: Inside Trump’s 2026 Cyber Strategy: Why “Check-the-Box Security” Is Dead
Welcome back to the SafeBreach studios for the Cyber Resilience Brief, a SafeBreach podcast. I’m Jova Devoren, your cohost. And today, are diving into what is arguably the most aggressive shift in American digital policy that we’ve seen in decades. We are talking about president Trump’s cyber strategy for America, which was released this week in March twenty twenty six. Adrian, you’ve been living in this document since it dropped. What’s the vibe shift? It’s a total departure from tinkering at the edges. The strategy effectively declares that the area of ambiguous partial measures is over. We’re moving towards a national security strategy that puts America first in cyberspace by leveraging unparalleled offensive and defensive nonkinetic powers. Finally, the US federal government has shifted from being reactive to being proactive. This is huge. Exactly, Tova. Need to stress it’s strategy and not regulations, so there’s no penalties for not complying with this. However, the vision in the strategy is significant. The document explicitly mentions that the US will no longer neglect the growing number and severity of cyber threats. It’s a call to action for the private sector to coordinate with the government at a level of commitment never before marshaled. Let’s get into the meat of this. Pillar one is to shape adversary behavior. But while while also being a little bit vague, this sounds like a very tall order for an individual business. Can you explain that a little bit? It’s a bold mandate, Tovar, and, again, we need to stress clues in our name, SafeBreach. We do offensive cybersecurity safely. Anybody listening to this, if you have no experience of this area, please don’t rush in where angels fear to trade. In terms of being offensive against third parties in the cyber realm, You could be committing criminal offences. You could be disrupting other government activity. The strategy states that American companies shouldn’t have to fend off sophisticated military and intelligence adversaries alone. But here’s the kicker. The government wants to unleash the private sector by creating incentives to identify and disrupt adversary networks. Well, that does sound like offensive cybersecurity one zero one, and that wades into adversarial exposure validation territory, is one that you and I know very well. Hundred percent. To detect, confront and defeat adversaries before they breach systems, you have to know how they think. At SafeBridge, AAV is how we give businesses that adversary’s eye view. If the government is deploying its full suite of offensive cyber operations, businesses need to validate their own defenses to show that they can withstand those same high level TTPs. And now Pillar two is going to be a favorite for CFOs, promote common sense regulation. What does that mean? Does that mean that they’re getting some relief? What are some of the details here? It’s a double edged sword, Tovar. The strategy says cyber defense should not be reduced to a costly checklist. Hallelujah. They want to streamline regulations to ensure the private sector has the agility necessary to keep pace. So CISOs, that means that you can’t just check off compliance and there’s no more shelfware. Shelfware is dead. And this reflects, TOVA, albeit in the European theatre, it’s regulation, but reflects emerging regulation and legislation around the world, the Cyber Defence Act in Japan, DORA, NIST two and Cyber Resilience Act in Europe. It’s a shift from compliance to Continuous Threat Exposure Management, CTEM. The US administration wants to address liability and align regulators with industry. If you aren’t continuously validating your posture, a checklist won’t save you from the steep and terrible price the strategy promises for those who failed to defend American interests. Now let’s shift to page five of the strategy, which focuses on federal networks. They’re talking about zero trust in post quantum cryptography here. This is where breach and attack simulation becomes the MVP. The strategy calls for constantly testing and hunting for malicious actors on federal networks. You can’t constantly test a zero trust architecture manually even without the continuous aspect. Zero trust solutions produce a lot of data and a lot of noise, and breaching the tax simulation bars is needed to make sure that it’s not only quality data, but actionable right now. And we’ll be right back. They also mentioned AI powered cybersecurity solutions, but that can mean anything. Exactly. AI can be a black box. SafeBreach’s role here is to provide the automated red teaming or continuous automated red teaming cards to ensure that those AI tools are actually deterring intrusions at scale. If you aren’t validating the AI, you’re just adding another layer of unverified risk. We’ve seen headlines about the energy grid and hospitals. Pillar four says that we must identify, prioritise, and harden those specific assets. Secure information and operational technology supply chains. The strategy specifically mentions moving away from adversary vendors. I mean, just to make sure we’re on the same page, what is an adversary vendor? It just seems like a very vague term. So my my reading and understanding of it, it’s it’s not pinned down and defined in the report, is it’s an element of the supply chain that’s controlled by an adversary. It belongs to an adversary, or it can also be controlled in as far as it’s been compromised by an adversary. And we’re very aware we’ve discussed in many other episodes the great efforts that intelligence agencies go to to compromise elements of a supply chain. So how does a hospital or power plant harden their supply chain? Through rigorous exposure validation. The strategy demands that we deny our adversaries initial access. With SafeBreach we can simulate the initial access vectors of known terrorists, known state actors, known intelligence agencies the same ones the strategy mentions like Nicholas Maduro, Iranian nuclear threats to ensure our grid is ready. Now let’s move on to a different aspect of this. We see agentic AI being all over this report. Now you and I work in this space, so we know that agentic AI is real, but when it applies to a federal cybersecurity recommendation, it almost sounds like sci fi. So great point, Tovar. It’s the future of defense, and for many bleeding edge companies, it’s actually the now of defense. The strategy calls for swiftly implementing AI enabled cyber tools to detect, divert, and deceive. Sounds like an intelligence agency brief. It even promotes AgenTik AI to securely scale network defense and disruption. But here’s the double edged sword issue with AgenTik AI in general, but specifically here. If we’re working with AI as an autonomous agent, how do you know for sure that it’s doing its job? Black box problem. That’s the validation in adversarial exposure validation. We need to secure the AI technology stack. SafeBreach provides the guardrails by acting as the adversarial AI testing if the agentic defense can be fooled by adversarial prompts or data poisoning. But moving away from AI for a second, we often forget about the human element, which we find over and over again is really the weakest link in most cybersecurity today. You know, this strategy calls the workforce a strategic asset. What’s going on here? So it’s about reconciling and taking advantage of existing avenues in academia and corporations to recruit the next generation. So in other words, we’re talking about the same we’ve seen with other groups like the comm in infiltrating academic settings, infiltrating corporations, working with legitimate fields then to recruit more people to work for bad actors. Am I understanding that correctly? Yes. It’s it’s about empowering, enabling, and augmenting. It’s not about replacing. By using CART to handle the repetitive testing, our warriors in cyberspace can focus on the exquisite cyber technologies, to quote the strategy, the president is calling for. It eliminates the roadblocks between the military and industry. By reducing the friction in workflow. And we’ll be right back. Yes. Okay. Let’s talk about the shift to offensive. The report mentioned seizing fifteen billion dollars from scammers, it’s a lot of money, and obliterating Iranian nuclear infrastructure, which is relevant to the now. What else is going on here? So the message is clear. American power will finally stand up in cyberspace. They are unveiling and embarrassing online espionage and propaganda, exposing the enemy. And the government’s being unusually aggressive for the US federal government. What happens to businesses now? So the the danger is they become targets for retaliation. That’s why the strategy emphasizes resilience, the the drum we bang every week, Tova. If you aren’t using CTEM to manage your exposure, you’re a sitting duck when the steepest and most terrible price is being handed out globally. So let’s shift here a little bit to talk about the now. Why are we introducing this now? And I want to talk about this from two aspects. First, let’s talk about the business aspect. You know, the strategy explicitly mentioned to the boardroom, proving cyber resilience to the board has been a measurability problem for decades, and one we usually talk about in the commercial sphere, not in the federal space. Why bring the board in now? Well, cyber is now key to president Trump’s actions to ensure America leads the world in finance, innovation, and manufacturing. It’s no longer an IT issue. It’s now very much a national security issue. And not just national security, but national reputation. So what you’re saying is that SafeBreach isn’t just about security, it’s about business continuity. Exactly. To unleash innovation and accelerate economic growth, again, quote the report, you need a defensible and resilient network. You can’t innovate if you’re afraid of being blind and uncomprehending during an attack. Now let’s talk about another aspect of the why now. You know, we’ve seen a lot of developments with CISA, a lot of turnover. We had a crisis back in September. How does this new mandate I wouldn’t say regulation but how does this new document relate to everything that’s going on behind the scenes with CISA? So this is something that’s happening as we speak. We’re going to see it rolling out over this year. There’s been changes in executive management, some people clearly have decided their contributions come to an end. It’s difficult to second guess, but what we do have is a focus on the importance of cyber security, the importance of offensive security, and the importance this is reflected around the world from from to the USA to Japan to Hong Kong the importance of continual testing and validation of real critical live production systems. No more lab testing. It’s still there, but back to the, you know, a checklist won’t save you. Testing in a lab isn’t good enough anymore. The whole drive here globally is towards actually testing your production systems and kicking the enemy out or closing the door before they get a chance to get in. So in the end, this new set of principles concludes that president Trump has created a new era in cyberspace. What are your final thoughts, Adrian? It’s an era of validation. The strategy says our resolve is absolute. SafeBreach’s mission to provide continuous automated validation of every security control is the only way to meet the strategy’s requirement to detect, confront, and defeat threats before they get to the breach. Okay. Thanks, Adrian, and thank you for bringing this to our attention. Now for our listeners, the twenty twenty six strategy isn’t just a document. It’s your new road map, and we’ll be exploring it further this year. SafeBreach are here to help you drive this strategy forward. But until next time, stay safe. Stay safe with SafeBreach. The cyber resilience brief is the SafeBreach podcast. Executive produced by Adrian Culley and Tova Devoren. Music produced by Sar Dressner. Hosted, edited, and compiled on Riverside. For more about SafeBreach and how you can validate your security controls across your entire IT infrastructure, visit us at w w w dot safe beach dot com. That’s w w w dot s a f e b r e a c h dot com.
Subscribe on Your Preferred Platform
In This Episode
The U.S. released one of the most aggressive cyber strategies in decades—signaling a major shift from reactive defense to proactive cyber resilience.
In the latest episode, Tova Dvorin and Adrian Culley break down what it means for security leaders.
Key highlights include:
- A stronger national security posture in cyberspace
- Moving beyond compliance checklists to continuous threat exposure management (CTEM)
- Greater focus on Zero Trust, AI-driven defense, and proactive security


