Trump Signs Cybercrime Executive Order

cybercrime executive order
Photo by Freepik

President Donald Trump has signed a cybercrime executive order directing federal agencies to enhance efforts against cyber-enabled fraud and transnational criminal organizations (TCOs).  This action calls for interagency coordination for the review and improvement of operational, technical, and regulatory frameworks to combat cyber-enabled crime.

Agencies Involved with Cybercrime Executive Order 

This executive order, signed on March 6, 2026, calls upon the National Coordination Center (NCC) to create an operational cell to facilitate involvement between governmental agencies and the private sector.  The Attorney General has been tasked with prioritizing prosecutions of scam centers and cybercrimes.  The Attorney General is also to submit recommendations for establishment of a Victims Restoration Program that will oversee the return of stolen funds to victims.

The Secretary of State has been ordered to work with foreign governments on enforcement actions against TCOs.  It further empowers the Department of State to impose sanctions, limitations on foreign aid, visa restrictions, and expulsion of complicit officials to further the United States efforts against cyber threats.

The executive order further calls upon the Secretary of Homeland Security to develop and provide training, technical assistance, and resilience building for cybersecurity to state and local governments and agencies.  It also directs Administration officials to conduct a review of potential tools and actions to be used against those responsible for scam centers.

Cyber Strategy for America

In conjunction with the cybercrime executive order, the Cyber Strategy for America outlines six policy pillars to guide the administration’s approach to cybersecurity:

  1. Shape Adversary Behavior: Deploy offensive and defensive cyber operations.
  2. Promote Common Sense Regulation: Streamline regulations to reduce compliance burdens.
  3. Modernize Federal Networks: Enhance security across government systems.
  4. Secure Critical Infrastructure: Protect essential services like energy and finance.
  5. Sustain Technological Superiority: Invest in emerging technologies.
  6. Build Cyber Talent: Develop a skilled workforce for cybersecurity.

The strategy emphasizes collaboration between government and the private sector to enhance cybersecurity capabilities. It aims to detect and confront threats before they penetrate U.S. systems, while also addressing the challenges posed by authoritarian surveillance technologies and cybercrime.

This comprehensive approach is designed to fortify the nation’s defenses against evolving cyber threats and ensure a robust response to adversaries in the digital landscape.  It addresses emerging threats such as ransomware attacks and nation-state cyber operations. It addresses the need for proactive measures to protect essential sectors like energy, healthcare, and telecommunications.

Long Term Goals for US Cybersecurity

The Cybercrime Executive Order and the Cyber Strategy for America initiative endeavor to defend US interests in cyberspace.  These efforts are targeted at protect US technologies, critical infrastructures, government agencies, US citizens now and in the future.  Organizations should monitor these developments in their risk and opportunity assessments.  

Businesses today are facing growing pressure to adapt to cybersecurity challenges for organizations in 2026. This will be especially the case for small and mid size businesses because of limited budgets, a lack of qualified personnel, and the complexity of standards.  Any relief generated by the current administration would be greatly welcomed by all.

CVG Strategy Cybersecurity Consultants

 CVG Strategy can provide guidance and help your organization understand and implement contractually required NIST standards and CMMC.  We are dedicated to helping small businesses navigate federal regulations and contract requirements for Quality Management, CybersecurityExport Compliance, and Test and Evaluation. We can help you meet your information security management system goals.  CVG Strategy QMS experts can provide the training required to understand and engage in a ISMS and make it meet desired objectives.

Identify CUI Areas with CVG Strategy Signs

CVG Strategy provides signs to identify areas containing CUI and export controlled items. These signs should be posted at all facility entrances where access controlled or export controlled articles and technology are present.

Jamie Hamilton

Share this post

Secret Link