Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
7 Takeaways from the Executive Order on Improving Cybersecurity
Published:
May 18, 2021

7 Takeaways from the Executive Order on Improving Cybersecurity

By:
Lily Lewis
Share icon
Glitch effectGlitch effectGlitch effect

On May 12, 2021, President Biden signed an Executive Order (EO) to improve U.S. cybersecurity standards and further combat cyber threats against the nation. Though the EO focuses on Federal agencies and their private contractors, it encourages private sector companies to follow the Federal government’s lead—including ambitious measures to augment cybersecurity defenses and align communication.

This EO comes right on the heels of many high-profile and damaging cyberattacks, like the SolarWinds and Microsoft Exchange breaches as well as the recent Colonial Pipeline hack. It’s clear the industry has truly taken this onslaught of incidents as a wake-up call—and official orders from the government are a welcome improvement—but it does bode the question: could it be too little, too late?

Spoiler Alert: Probably. This will be a slow rollout—and we’re already a bit behind the ball. It’s encouraging to see the White House join in the effort to bolster cybersecurity, but it’s one thing to decree these initiatives with Federal backing; it’s another to really put them into action. As an IT service provider, the onus is on you to put these words and recommendations into action.

Top Takeaways from Biden's Executive Order

Here are the seven key takeaways and requirements from the Executive Order that you should know about.

1. Removing barriers to sharing threat information

Blog_CybersecurityEO_Q2-2021_JohnQuote_P5-01

Information sharing parameters between the Federal government and the private sector will change. Contractual barriers will be removed, which means that not only are IT service providers able to share information with the government; they’re required to inform the government whenever a breach that could impact government networks occurs.

Huntress Hot Take: This is probably one of the most impactful elements of this Executive Order. We all know that the cybersecurity community is stronger together—and better communication and information sharing on vulnerabilities, breaches, new nation-state threat groups, etc. will benefit the industry as a whole. 

This particular section also just marks a positive step in transparency between technology vendors and government organizations. And due to its nature, it’s probably not a bad idea to tighten up your incident response plans and/or disaster communication policies. It's better to have those solidified before the government comes knocking at your door or asking questions—plus, it will make for a much more coordinated response.

2. The government will adhere to more secure and modern approaches to cybersecurity

It’s about time, amiright?! It’s great to see the government bring attention to the importance of dynamic security and evolving with the threats around us—and this section specifically outlines a modernization movement to secure cloud services, a zero-trust architecture, multi-factor authentication and encryption. 

But dare I say these are bare minimum standards? It seems like almost every cybersecurity incident happens because of a disregard for security basics—such as a lack of two-factor authentication, weak password policies... the list goes on. As hackers continue to smarten up and evolve their tactics, we need to keep raising the bar and going beyond the basics instead of merely keeping pace. 

This is especially important for the IT service providers who are catering to the small to midsize market. You can bet that the successful techniques hackers use on larger organizations will be used against your clients. But the good news is that your clients are much more agile than the Federal government—so it’s time to have those conversations and enforce these higher standards while the iron is hot. 

3. Improving supply chain security 

The government will require new security standards for software sold to the government, and security data for the software will need to be publicly available. Supply chain security has been a long-standing problem, so it’s nice to see this can isn’t getting kicked further down the road. 

Huntress Hot Take: If you’re an IT provider working on government contracts, you’ll need to make sure you adhere to these new standards. And even if you aren’t, this is an opportunity to take a good look at your own stack and critical software and ensure these security standards are integrated from the ground up. Whether you’re auditing your stack or looking to new vendors, supply chain security should be another checkbox on your list of requirements. 

4. Establishing a Cybersecurity Safety Review Board

The administration will create a new board—which will be staffed by individuals in both the public and private sectors—to investigate major cybersecurity incidents as well as make concrete recommendations for improvement. As a bit of background, this board will be modeled after the National Transportation Safety Board, which is used to investigate airplane crashes and other incidents.

IT service providers should probably hop on this trend too. There’s a lot we can learn from the past (hindsight is always 20/20), so it might be a worthwhile exercise to document the lessons learned from significant cyber incidents—whether it be forming a board or your own or just implementing a better review/debrief process. 

5. Creating a standard playbook for incident response

The EO calls for the creation of a guide for use during a cyber incident to ensure swift action is taken to mitigate damage. The guide will also be made available for those in the private sector to adopt.

Huntress Hot Take: You can’t wait until you’re compromised to figure out how you’re going to respond. That’s why we created this Incident Response Tabletop-in-a-Box—to help you go through the motions and test your incident response proficiency before it’s too late. 

6. Improving detection and response

The government will implement endpoint detection and response (EDR) for all federal networks… which is music to our ears! EDR ensures malicious activity can be monitored and that threats can be quickly identified—and that’s so important given how hackers are easily evading preventive security measures.

I won’t harp on this one too much, but at minimum, this is a perfect conversation starter for convincing clients of the need for protection beyond antivirus and other basics. If “proactive detection, cyber threat hunting, containment and remediation” are important enough terms to be penned on the President’s desk, it’s absolutely worth incorporating into your clients’ cybersecurity strategies.

7. Improving investigation and remediation

The EO calls for improving the ability to detect malicious cyber activity on federal networks by enabling a government-wide endpoint detection and response system and improved information sharing within the Federal government. It also sets forth cybersecurity event log requirements for federal departments and agencies to better detect and prevent intrusions as well as to determine the scope of incidents that have occurred. 

Client Conversation Starters

It’s not every day that you have an opportunity to take a major news headline and bring it to your clients’ backyard. Whether clients come to you for questions or you're looking to start an upsell conversation, here are some talking points to discuss the EO’s relevance with your clients:

  • “If hackers can get SolarWinds, Microsoft Exchange, and even the Colonial Pipeline, they can get you. And they want to! Take DarkSide for example. They're running for the hills because of their ties to the high-profile pipeline hack…but you are a low-profile target. Hackers know your weak points, and they know that if they succeed, the attack will fly under the radar.”
  • “If there's one thing that this Executive Order makes clear, it's that layered security is more important than ever. President Biden specifically calls out the need for endpoint detection and response—but that’s hardly a new strategy. The government simply hasn't adopted it yet, but you should. We can’t take three years to secure ourselves against today’s threats. To be more proactive with your security, let's layer up and ensure we have those detection and response capabilities in place before the dominoes begin to fall.”
  • “The simple truth is that you can’t afford not to invest in cybersecurity. When your systems go down, costs will add up. Investing in the right security solution today means that you’re saving yourself time and money in the long run.”

Recommended Reading and Resources

For more information regarding the EO, check out these resources:

  • The White House, Executive Order on Improving the Nation’s Cybersecurity
  • Axios, Biden issues executive order following mounting cyberattacks
  • Security Magazine, President Biden signs executive order to strengthen U.S. cybersecurity defenses
  • The Hill, Krebs on Biden's cybersecurity executive order: 'It's a really ambitious plan'

 Want to chat with an expert on this? Our team is here to help. Get in touch if you have any questions.

Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • What the OpenAI Court Order Means for Cybersecurity and Privacy

    Learn what the OpenAI lawsuit and court order mean for data privacy, cybersecurity, and the future of AI innovation.
  • The Health Sector is Under Attack. But You Can Fight Back.

    Healthcare organizations are facing cyber threats at an alarming rate, and as the U.S. Department of Health and Human Services (HHS) introduces new measures for cybersecurity, it’s also time for small- and mid-sized organizations to be proactive in their defense.
  • A Wake-Up Call for Healthcare Cybersecurity

    Discover how the Health Infrastructure Security and Accountability Act aims to enforce stricter cybersecurity standards across the healthcare sector.
  • What Rising Supply Chain Attacks Mean for Cybersecurity Ecosystems

    Learn how supply chain attacks and shifting trust are reshaping the software supply chain, and what enterprises must do to strengthen resilience.
  • Top Takeaways from hack_it 2021

    A recap of hack_it 2021, a virtual security training event packed with interactive exercises, malware analysis, hacking workshops and more.
  • Top 4 Tips for Cybersecurity Awareness Month

    In honor of National Cybersecurity Awareness Month, here are four critical tips to help you take both your cybersecurity hygiene and knowledge up a notch.
  • Recap: Navigating the NIST Cybersecurity Framework

    If you follow the NIST cybersecurity framework, you'll ensure that your money is spent on the right areas to build an effective defense strategy.
  • Balancing the Scales of Cybersecurity and Insurance

    As the importance of cybersecurity insurance grows, we examine how insurance policies have influenced cybersecurity stacks and visa versa.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy