Policy Document Series · Issue 48 · Safety & Security
Cybersecurity
Defending the Digital Infrastructure

Cybersecurity is national security. State actors, ransomware criminals, and infrastructure attacks escalate every year while our defenses are fragmented across dozens of agencies with no unified strategy. Colonial Pipeline shut down fuel to 17 states. Change Healthcare disrupted a third of all US healthcare claims. This is not hypothetical. This is happening now.

3,205Data breaches in 2023 — a record high
$4.45MAverage cost of a data breach (IBM 2023)
500K+Unfilled cybersecurity jobs in the United States
17States affected by Colonial Pipeline ransomware
Contents
Section 01

Executive Summary

The United States faces escalating cyber threats from nation-state actors, ransomware criminal enterprises, and infrastructure attacks. Current defenses are fragmented across dozens of agencies with no unified mandatory standards. The CGP will establish mandatory cybersecurity standards for critical infrastructure, a 72-hour federal breach notification standard, CISA fully funded as the lead civilian agency, election security with paper ballots, and a 500,000-job workforce pipeline.

Eight pillars of national cybersecurity: Mandatory standards. 72-hour breach notification. CISA empowered. Election security. Ransomware response. Workforce pipeline. Critical infrastructure protection. Supply chain security.

Section 02

The Problem

The United States faces escalating cyber threats from China (Volt Typhoon, Salt Typhoon), Russia (SolarWinds, Colonial Pipeline), North Korea (cryptocurrency theft), and Iran (critical infrastructure probes), as well as ransomware enterprises generating billions in illicit revenue annually. These threats target energy grids, water systems, hospitals, financial networks, election infrastructure, and the defense industrial base.

Federal cybersecurity authority is fragmented across CISA, NSA, FBI, DOD Cyber Command, SEC, HHS, DOE, EPA, and dozens of sector-specific agencies. There is no single federal standard for critical infrastructure cybersecurity. Fifty states have 50 different breach notification laws with different timelines, definitions, and requirements.

Colonial Pipeline (2021) shut down the largest fuel pipeline on the East Coast, affecting 17 states. Change Healthcare (2024) disrupted claims processing for one-third of all US healthcare transactions. SolarWinds (2020) compromised nine federal agencies through a supply chain breach undetected for months. Over 500,000 cybersecurity positions are unfilled.

The cybersecurity workforce gap is a national security crisis. Over 500,000 positions unfilled. Federal agencies routinely lose talent to the private sector. The pipeline from education to cybersecurity careers is inadequate.

Sources: ITRC — idtheftcenter.org · CISA — cisa.gov · CyberSeek — cyberseek.org

Section 03

How We Got Here

Fragmented Federal Authority

Cybersecurity responsibility is spread across dozens of agencies with overlapping mandates and no unified command. CISA was created in 2018 but remains underfunded and lacks enforcement authority over private sector infrastructure. The NIST Cybersecurity Framework is voluntary.

The CIRCIA Act (2022)

The Cyber Incident Reporting for Critical Infrastructure Act mandated reporting rules, but CISA’s final rule is still being implemented. Meanwhile, 50 states maintain 50 different breach notification laws.

The Private Sector Gap

Critical infrastructure — energy, water, healthcare, finance — is overwhelmingly privately owned. Without mandatory standards, the most vulnerable systems remain the most exposed. Small water utilities, rural hospitals, and municipal governments cannot afford enterprise cybersecurity on their own.

Section 04

What Other Countries Do

CountryModelKey Features
IsraelNational Cyber DirectorateCentralized authority, mandatory standards, public-private partnership. #1 per-capita cybersecurity industry in the world.
EstoniaDigital-first government99% of government services digital and secured. Rebuilt after 2007 Russian cyberattacks. Mandatory cybersecurity standards.
European UnionNIS2 DirectiveMandatory cybersecurity standards for essential services. 24-hour breach notification for critical sectors.
AustraliaCritical Infrastructure Act 2022Mandatory reporting. Government assistance powers. 72-hour breach notification for critical infrastructure.
United StatesFragmented across dozens of agenciesMostly voluntary standards. 50 state breach laws. CISA underfunded. 500K+ unfilled positions. 3,205 breaches in 2023.
Section 05

Our Policy — Eight Pillars

Pillar 1 — FlagshipMandatory Cybersecurity Standards for Critical Infrastructure
  • Enforceable minimum standards for energy, water, healthcare, finance, and elections
  • Compliance assistance for under-resourced entities — penalties for negligence
  • NIST CSF as the technical baseline; CISA sets and enforces sector-specific requirements
Pillar 272-Hour Federal Breach Notification
  • Single federal standard overriding 50 state patchwork laws
  • Notify CISA and affected individuals within 72 hours of a significant breach
  • Clear definitions, consistent timelines, real enforcement
Pillar 3CISA Fully Funded and Empowered
  • Lead civilian cybersecurity agency with adequate staffing and competitive salaries
  • Authority to coordinate incident response across sectors
  • CISA as the CDC of cybersecurity — the authoritative federal response agency
Pillar 4Election Security
  • Mandatory paper ballot backups for every voting jurisdiction
  • No internet-connected voting machines — post-election risk-limiting audits required
  • Federal funding for election infrastructure modernization
Pillar 5Ransomware Response
  • Federal ban on government ransom payments at all levels
  • Ransomware response fund for critical infrastructure victims
  • International cooperation on prosecution and disruption of ransomware operations
Pillar 6Cybersecurity Workforce Pipeline — 500,000 Jobs
  • Federal scholarship-for-service programs expanded — full tuition for federal service commitment
  • Community college cybersecurity tracks funded with industry certifications
  • Diversity pipeline programs — many roles do not require four-year degrees
Pillar 7Critical Infrastructure Protection
  • Mandatory security standards with federal compliance assistance for under-resourced entities
  • Small water utilities, rural hospitals, municipal governments get support
  • The most vulnerable systems cannot be the weakest links
Pillar 8Supply Chain Security
  • Evidence-based restrictions on high-risk foreign components in critical infrastructure
  • Software bill of materials (SBOM) requirements for government procurement
  • Secure development lifecycle standards — no more SolarWinds-style compromises
Section 06

How We Pay For It

Cybersecurity investment is a fraction of the cost of the attacks it prevents. Colonial Pipeline alone cost $4.4M in ransom and billions in economic disruption. The Change Healthcare breach disrupted a third of US healthcare claims.

PolicyFiscal PositionMechanism
CISA full fundingSignificant investmentCompetitive salaries, staffing, technology — offset by reduced incident costs
Workforce pipeline$2–3B/yearScholarships, community college programs, diversity initiatives — creates $120K median-salary careers
Critical infrastructure complianceFederal assistanceGrants for under-resourced entities; penalties fund enforcement
Election securityModerateFederal grants for infrastructure modernization; paper ballot requirements
Breach notification standardMinimalRegulatory — replaces 50 state laws with one federal standard

The cost of inaction: $4.45M average per breach. 3,205 breaches in 2023. 17 states without fuel from one ransomware attack. One-third of healthcare claims disrupted by a single breach. Cybersecurity investment is not optional — the attacks are happening now.

Section 07

Implementation Timeline

Phase 1 — Year 1
Standards and Notification
72-hour federal breach notification standard enacted. CISA funding increased immediately. Mandatory cybersecurity standards rulemaking initiated for critical infrastructure sectors. Election security mandates issued for upcoming elections.
Phase 2 — Years 1–3
Enforcement and Workforce
Critical infrastructure standards finalized and enforced. Workforce pipeline programs launched — scholarship-for-service and community college tracks. Ransomware response fund established. Supply chain security requirements for government procurement.
Phase 3 — Years 3–5
Full Implementation
All critical infrastructure sectors under mandatory standards. CISA fully staffed and operational as lead civilian agency. 100,000+ cybersecurity positions filled through pipeline programs. International ransomware cooperation frameworks operational.
Phase 4 — Years 5–10
Maturation
500,000 cybersecurity workforce gap substantially closed. Continuous improvement of standards based on evolving threats. Full paper ballot backup for every jurisdiction. Supply chain security integrated across government procurement.
Section 08

Addressing Counterarguments

“Mandatory standards will burden small businesses.”
Standards apply to critical infrastructure operators, not all businesses. Under-resourced entities — small water utilities, rural hospitals — receive federal compliance assistance. The alternative is leaving the most vulnerable systems completely unprotected, which is the current situation.
“Banning ransom payments will leave victims without options.”
The ban applies to government entities. A ransomware response fund helps victims recover without paying. Paying ransoms funds criminal enterprises and incentivizes more attacks. Every ransom paid makes the next attack more likely.
“The government cannot keep pace with cyber threats.”
Israel’s National Cyber Directorate, Estonia’s digital government, and the EU’s NIS2 Directive demonstrate that government can lead effective cybersecurity. The issue is not whether government can do this — it is whether we fund it and give it authority. CISA with real resources and enforcement power can be the CDC of cybersecurity.
“Paper ballots are a step backward.”
Paper ballots are a step toward security. Every cybersecurity expert agrees that a verifiable paper trail is the gold standard for election integrity. Digital convenience means nothing if the results can be manipulated. Post-election audits require something to audit.
Section 09

Key Statistics

StatisticFigureSource
Data breaches in 20233,205 — record highITRC Annual Report
Average breach cost$4.45 millionIBM 2023
Unfilled cybersecurity jobs500,000+CyberSeek / NIST
States affected by Colonial Pipeline17DOJ
Healthcare claims disrupted (Change Healthcare)~1/3 of all US claimsHHS
Federal agencies compromised (SolarWinds)9CISA
State breach notification laws50 different lawsNCSL
CGP breach notification standard72 hours — one federal ruleCGP policy
Median cybersecurity salary$120,000BLS / CyberSeek
“Every hospital locked out by ransomware is a patient who cannot get care. Every water system breached is a community at risk. Every election database targeted is democracy under attack. Cybersecurity is not an IT problem. It is a national security imperative.”
— The Common Good Party
Paid for by The Common Good Party (thecommongoodparty.com) and not authorized by any candidate or candidate's committee.