Presidential Executive Order: “Collect and Preserve” Incident Data. Is this the Catalyst for Cybersecurity’s Black Box?

P resident Biden’s Executive Order (EO) on Improving the Nation’s Cybersecurity defines a solid path forward for the Federal government and its suppliers to address systemic problems in defending cyberspace. The EO calls on suppliers to “collect and preserve data, information, and reporting relevant to cybersecurity event prevention, detection, response, and investigation,” in effect, calling on government agencies and suppliers to deploy black boxes for cybersecurity. Rather than see this as an onerous requirement, it is worth remembering how the FAA’s requirement for all commercial aircraft to carry black boxes with flight data recorders dramatically improved aviation safety and security. A similar outcome is possible for cybersecurity.

In 1967 the U.S. government required commercial aircraft to carry a black box that contained a cockpit voice recorder and a flight data recorder. Black boxes helped the government and aviation industry piece together aviation events ranging from near misses to crashes. The requirement drove important safety and security improvements, benefiting the aviation industry and the flying public. Given the rash of debilitating cyberattacks — from nation-state actors and criminal organizations — the Federal government, its suppliers and private sector companies should embrace the concept.

Cloud-Based Black Boxes

The Cloud has enabled security vendors and companies to easily integrate and automate data from disparate security tools and threat intelligence sources. Companies rely on these capabilities given the flexibility to securely manage intelligence from detection systems and external threat intelligence sources. For example, today companies integrate and automate data from internal security tools such as Spunk ES, QRadar, and ServiceNow with open source and proprietary intelligence feeds. Fusion in the Cloud reduces the mean time to detect and respond to events, and reduces analyst cycles.

So, how does this relate to the EO and black boxes? The data — event alerts, case management tickets and threat intelligence — are ingested and reside in secure, cloud-based repositories. TruSTAR refers to repositories as enclaves. Enclaves give a company a holistic understanding of its cyber intelligence. Security tools can automatically recall and connect past events with new alerts. Companies can leverage no-code intelligence workflow capabilities to enrich events, automatically updating security applications with high-priority events.

Enclaves, it turns out, can support the requirement under the EO to “collect and preserve” incident data, similar to black boxes. As discussed in the Cloud Security Alliance’s Cloud-based, Intelligent Ecosystems whitepaper, enclaves fulfill an operational need within companies for a living “cyber memory,” updated in real-time with event data to ensure continuity of knowledge. However, in an incident, enclaves address the need to “collect and preserve” incident-related information, as called for in the President’s EO. Data stored within enclaves is encrypted with permission-based access controls.

Enclaves can fulfill other elements of the executive order, including reducing the barriers to information sharing. For example, cloud-based enclaves allow for seamless exchanges of information, and include natural language processing to redact proprietary or personally identifiable information. Today, several sharing organizations, such as the IT-ISAC and RH-ISAC, leverage TruSTAR’s enclaves to exchange event information. In addition, enclaves could support the National Cyber Safety Review Board established under the EO to investigate significant incidents.

Perhaps most exciting is the potential long-term benefit of creating a collective memory of cyber events. Holistic analysis of event data across enclaves will expose patterns heretofore unknown. Analysis of data across several enclaves can reveal previously unknown connections between events or success strategies. For example, in the federal government’s case, one agency may successfully identify or thwart a problem while another falters. A data-centric approach to analyzing data across enclaves will foster successful defense strategies as much as it would expose failures.

TruSTAR was founded to prevent intelligence failures in cyberspace. Cyberspace represents a far more complex problem than counter-terrorism given the pace and volume of attacks and dependence on information systems. Cyberspace is society’s lifeblood and Achilles Heel. A data-centric approach to integrating and automating security data and removing technical barriers to information sharing is critical. The President’s EO is a significant step in the right direction to not only help prevent cyber 9-11s, but advance our overall cybersecurity strategies.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.