목차
Title page 1
Contents 3
I. Introduction and summary 4
II. The cybersecurity challenge: Unsafe code and insecure architectures 6
Unsafe code 6
Zero trust challenges 6
III. Cybersecurity technology road map: Scaling resilience through safe coding and ZTAs 8
Safe coding 8
ZTAs: Creating an operational and near-term road map for rapid implementation and sustainment 11
Regional resilience districts and ZTAs 13
Financial support 14
IV. Conclusion 16
About the authors 16
Appendix: The cybersecurity challenge: Adversaries 17
China 17
Russia 17
Iran 17
North Korea 17
Criminal organizations 17
Endnotes 19
