Representative Ro Khanna (D-Calif.) recently introduced cybersecurity legislation that would, “mandate Congress [to] direct OMB to require cybersecurity training for federal employees and include information on the risks of Internet of Things (IoT) devices…”
On the surface, this seems like a great idea. Rep. Khanna represents a district in the heart of Silicon Valley, so if there’s anyone who knows and understands the threat landscape facing federal agencies, it’s him. Also, since people are one of the largest vulnerabilities facing federal agencies, it makes sense that Rep. Khanna would want to require cybersecurity and cyber hygiene training.
But is this an effective way to solve the problem, or just window dressing? I would argue it’s the latter – and it’s certainly not the first piece of cybersecurity legislation intended to solve this problem.
The “Promoting Good Cyber Hygiene Act of 2017” (H.R.3010) was introduced in the House of Representatives years ago. That bill would require the National Institute of Standards and Technology (NIST) to, “…provide for the identification and documentation of best practices for cyber hygiene…” Much like Rep. Khanna’s bill, it will only function to give the illusion that the government is doing something to make itself more secure.
Where did this cybersecurity legislation go wrong? Let’s dive in…
To continue reading, please fill out the form below.
Why recent cybersecurity legislation is just window dressing


Don Maclean
Serving as the Chief Cyber Security Technologist at DLT, Don is responsible for formulating and executing DLT’s cyber security portfolio strategy. Within the cyber security community, Don is a leader and mentor, frequently participating in programs such as the DoS Cyber Online Learning sessions and serving as an active member of the Cloud Security Alliance.
Next Article