Top US cyber leaders will headline the 2025 Aspen Cyber Summit on November 18.
Help us celebrate a decade of dialogue and action. Register now to join us in Washington, DC.
Top US cyber leaders will headline the 2025 Aspen Cyber Summit on November 18.
Help us celebrate a decade of dialogue and action. Register now to join us in Washington, DC.
Don’t Forget the Cyber Fundamentals
Workstream
Topic
Share
Imagine a future where every phishing attempt is thwarted before it reaches your inbox. Local police have cyber-forensics units on call 24/7, and nation-state intrusions trigger instant, coordinated responses that safeguard our economy, our power grid, and our trust in each other. That is the goal of an effective cybersecurity strategy: a cyberspace governed not by fear or threats, but by shared responsibility, layered defenses, and a relentless focus on resilience and recovery.
Getting there is possible, but in our renewed efforts to achieve these goals, it must be done carefully. As we increase our focus on offensive operations to address the most sophisticated nation-state actors, we must not take our eye off the cyber fundamentals needed to deter the criminal networks that target the general population for financial gain.
To move forward effectively, we must organize our strategy around three pillars—Prevent, Respond, and Recover. The same pillars are used throughout the world to address this issue by leveraging a common framework. Prevent means hardening systems and closing the doors that invite cybercrime. Response means deploying rapid, scalable action when breaches occur. Recover means restoring services, rebuilding trust, and learning lessons to strengthen future defenses.
These distinctions matter. By grouping all cyber threats under the same umbrella and relying on militarized metaphors, we’ve muddled our response and neglected the specific strengths of our civil institutions. All three pillars are critical for tackling the root causes of cyber harm:
The bright side is that there are straightforward policies that policymakers can implement now to address these issues. Here’s what they need to do:
From toll-tag scams and fake delivery texts to phishing and credential harvesting, cybercrime has become the digital equivalent of shoplifting—mass-market, low-sophistication, high-volume scams that erode public trust and impose a constant burden on individuals and businesses. The strategy for tackling these crimes should include:
Organized criminal networks and nation state proxies conduct sophisticated ransomware campaigns, leverage malware toolkits, and exploit known vulnerabilities. The consequences can be crippling—shutting down hospitals, paralyzing pipelines, and draining billions from the global economy.
The strategy here should include:
When breaches are orchestrated by nation-states—through espionage, sabotage, or intellectual property theft—we’re in the domain of national security.
These stealthy, long-term campaigns use zero-days, stolen credentials, and advanced malware to penetrate critical infrastructure, defense contractors, elections, and supply chains. Even more than the others, addressing APTs requires a sophisticated national-level strategy.
To support this model, Congress must invest in modernizing local and federal law enforcement, updating cybercrime statutes, building public-private reporting pipelines, and clarifying the roles and responsibilities at every level of government. Our goal is not just to prevent breaches—but to establish rule of law in the digital domain.
Cyberspace is not just a battlefield. It is our commerce center, our town square, and increasingly, the infrastructure of our lives. It deserves the same layered protections, shared accountability, and citizen-facing services we apply in the physical world.
The time has come to move beyond war metaphors and build a governance model rooted in the cyber fundamentals—one that addresses street-level scams, organized crime syndicates, and nation-state aggression with the right tools, the right people, and the right mission.
This piece is part of Aspen Digital’s Playing Offense project, which tackles how lawmakers and industry leaders alike should think about offensive cyber operations, including both the risks and opportunities.
The views represented herein are those of the author(s) and do not necessarily reflect the views of the Aspen Institute, its programs, staff, volunteers, participants, or its trustees.