<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="stratml_AI_Highlight.xsl"?>
<StrategicPlan xmlns="urn:ISO:std:iso:17469:tech:xsd:stratml_core" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
  <Name>President Trump&apos;s Cyber Strategy for America</Name>
  <Description>Outline the strategic approach for defending the United States and its interests in cyberspace while sustaining technological leadership and economic prosperity.</Description>
  <OtherInformation>Submitter&apos;s Note:  This StratML rendition was compiled from the source by ChatGPT and lightly edited in the form at https://stratml.us/forms/Claude/Part1.html</OtherInformation>
  <StrategicPlanCore>
    <Organization>
      <Name>Executive Office of the President of the United States</Name>
      <Identifier>997247e8-3192-4233-b02e-2880654d9850</Identifier>
      <Description>The organization responsible for coordinating and implementing national cybersecurity policy.</Description>
    </Organization>
    <Vision>
      <Description>Americans live in a secure, prosperous, and free digital world where the United States leads global innovation and cybersecurity.</Description>
      <Identifier>6d5a8152-83fc-4b15-9541-e17f8ebede58</Identifier>
    </Vision>
    <Mission>
      <Description>To defend U.S. interests in cyberspace by disrupting adversaries, securing national systems and infrastructure, fostering innovation, and strengthening partnerships with industry and allies.</Description>
      <Identifier>cbcc105a-e62a-436c-8f22-a1d9af609a15</Identifier>
    </Mission>
    <Value>
      <Name>Freedom</Name>
      <Description>Protect individual liberty, free expression, and openness in cyberspace.</Description>
    </Value>
    <Value>
      <Name>Security</Name>
      <Description>Defend Americans, networks, systems, and infrastructure against cyber threats.</Description>
    </Value>
    <Value>
      <Name>Prosperity</Name>
      <Description>Advance economic growth, affordability, and opportunity through a secure digital environment.</Description>
    </Value>
    <Value>
      <Name>Innovation</Name>
      <Description>Foster rapid technological progress and strengthen American leadership in emerging technologies.</Description>
    </Value>
    <Value>
      <Name>Partnership</Name>
      <Description>Coordinate action with industry, academia, allies, and all levels of government.</Description>
    </Value>
    <Goal>
      <Name>Adversary Behavior</Name>
      <Description>Shape adversary behavior in cyberspace by raising the costs of malicious cyber activity and disrupting hostile cyber operations.</Description>
      <Identifier>d6a92021-574e-4d8e-8d9e-feaf6463ec95</Identifier>
      <SequenceIndicator>1</SequenceIndicator>
      <Objective>
        <Name>Cyber Operations</Name>
        <Description>Deploy defensive and offensive cyber operations to detect, confront, and defeat adversaries before they breach networks and systems.</Description>
        <Identifier>8268d7aa-aa62-4768-a870-c825d2f1780f</Identifier>
        <SequenceIndicator>1.1</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Private Sector Incentives</Name>
        <Description>Create incentives enabling private sector organizations to identify and disrupt adversary networks.</Description>
        <Identifier>a50046a4-0da5-40fe-9d06-27d3a08ceb57</Identifier>
        <SequenceIndicator>1.2</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Authoritarian Technologies</Name>
        <Description>Counter the spread of surveillance technologies used by authoritarian regimes to repress citizens.</Description>
        <Identifier>fc0918c6-aff5-47b9-a7bc-d94fefb266a0</Identifier>
        <SequenceIndicator>1.3</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Cybercrime Infrastructure</Name>
        <Description>Dismantle criminal cyber infrastructure and deny safe haven to cybercriminal networks.</Description>
        <Identifier>fb235ae7-e73f-436b-b099-c595193a0d34</Identifier>
        <SequenceIndicator>1.4</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Allied Cooperation</Name>
        <Description>Coordinate with allies to impose consequences on malicious cyber actors and strengthen collective defense.</Description>
        <Identifier>91ce8a5b-48e5-498e-abe4-f9e42a73ba5b</Identifier>
        <SequenceIndicator>1.5</SequenceIndicator>
      </Objective>
    </Goal>
    <Goal>
      <Name>Cyber Regulation</Name>
      <Description>Promote efficient cybersecurity regulation that supports security while enabling innovation.</Description>
      <Identifier>0bb9cc4d-be21-403d-acca-8c9f1285b0c1</Identifier>
      <SequenceIndicator>2</SequenceIndicator>
      <Objective>
        <Name>Regulatory Streamlining</Name>
        <Description>Reduce compliance burdens and streamline cybersecurity regulations.</Description>
        <Identifier>97251980-852f-423d-b691-270b6f792a3a</Identifier>
        <SequenceIndicator>2.1</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Liability Alignment</Name>
        <Description>Align liability frameworks to encourage effective cybersecurity practices.</Description>
        <Identifier>20df70e1-1194-4b28-945f-c4fe6eafecee</Identifier>
        <SequenceIndicator>2.2</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Data Privacy</Name>
        <Description>Protect the privacy rights of Americans and safeguard American data.</Description>
        <Identifier>e331557f-555c-4703-888c-66694a777e87</Identifier>
        <SequenceIndicator>2.3</SequenceIndicator>
      </Objective>
    </Goal>
    <Goal>
      <Name>Federal Network Security</Name>
      <Description>Modernize and secure federal government information systems.</Description>
      <Identifier>f38e30fd-f42b-4a73-8ac1-63d69c3880f7</Identifier>
      <SequenceIndicator>3</SequenceIndicator>
      <Objective>
        <Name>System Modernization</Name>
        <Description>Accelerate modernization of federal information systems through cloud adoption and improved cybersecurity practices.</Description>
        <Identifier>70d6ba04-f542-4f58-b4c3-6d188b94fdfc</Identifier>
        <SequenceIndicator>3.1</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Post-Quantum Cryptography</Name>
        <Description>Implement post-quantum cryptography and zero-trust architecture across federal networks.</Description>
        <Identifier>b5626a99-c563-49fe-97c3-c3fad41e0643</Identifier>
        <SequenceIndicator>3.2</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Network Defense</Name>
        <Description>Deploy advanced technologies and teams to detect malicious actors on federal networks.</Description>
        <Identifier>96e70c8f-8efd-41e4-82ed-2644e37498be</Identifier>
        <SequenceIndicator>3.3</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>AI Cybersecurity</Name>
        <Description>Adopt AI-enabled cybersecurity solutions to defend federal systems.</Description>
        <Identifier>706e7585-5560-4f43-bd3c-e465676a7d85</Identifier>
        <SequenceIndicator>3.4</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Technology Procurement</Name>
        <Description>Modernize procurement to enable acquisition of advanced cybersecurity technologies.</Description>
        <Identifier>410592a7-242e-4db9-9749-9282dbfc911e</Identifier>
        <SequenceIndicator>3.5</SequenceIndicator>
      </Objective>
    </Goal>
    <Goal>
      <Name>Critical Infrastructure Security</Name>
      <Description>Strengthen the cybersecurity and resilience of America&apos;s critical infrastructure.</Description>
      <Identifier>9bc08663-ab38-418b-905e-137de06f17a3</Identifier>
      <SequenceIndicator>4</SequenceIndicator>
      <Objective>
        <Name>Infrastructure Protection</Name>
        <Description>Identify and prioritize critical infrastructure sectors for cybersecurity protection.</Description>
        <Identifier>2cb297cb-caeb-4ef2-a421-dc7b386009b6</Identifier>
        <SequenceIndicator>4.1</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Supply Chain Security</Name>
        <Description>Secure operational and information technology supply chains.</Description>
        <Identifier>30942723-5467-4637-a420-f5212d3fdb59</Identifier>
        <SequenceIndicator>4.2</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Vendor Independence</Name>
        <Description>Reduce reliance on adversary vendors and promote trusted technologies.</Description>
        <Identifier>5842eb90-ac7f-4fef-b5dd-07cd85da35de</Identifier>
        <SequenceIndicator>4.3</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Incident Recovery</Name>
        <Description>Strengthen capabilities to recover quickly from cyber incidents.</Description>
        <Identifier>b3f5b13c-4585-4643-86a5-292266912672</Identifier>
        <SequenceIndicator>4.4</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Subnational Coordination</Name>
        <Description>Engage state, local, Tribal, and territorial authorities in cybersecurity efforts.</Description>
        <Identifier>9a003978-be17-473f-b763-e5f37f454975</Identifier>
        <SequenceIndicator>4.5</SequenceIndicator>
      </Objective>
    </Goal>
    <Goal>
      <Name>Technology Superiority</Name>
      <Description>Maintain U.S. leadership in critical and emerging technologies.</Description>
      <Identifier>f1a7568a-5a19-406f-aa67-2c661b3c8d18</Identifier>
      <SequenceIndicator>5</SequenceIndicator>
      <Objective>
        <Name>Secure Innovation</Name>
        <Description>Develop secure technologies and supply chains that protect user privacy.</Description>
        <Identifier>c5aeb489-da58-4ab4-905f-041481d9d095</Identifier>
        <SequenceIndicator>5.1</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Quantum Security</Name>
        <Description>Promote adoption of post-quantum cryptography and secure quantum technologies.</Description>
        <Identifier>4db5f037-511a-4274-bf40-c2df6d4edd0d</Identifier>
        <SequenceIndicator>5.2</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>AI Security</Name>
        <Description>Secure the artificial intelligence technology stack including infrastructure and models.</Description>
        <Identifier>a79e9217-abb2-49ed-8a16-1fb01e43bbf1</Identifier>
        <SequenceIndicator>5.3</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>AI Cyber Tools</Name>
        <Description>Deploy AI-enabled cyber tools to detect and disrupt cyber threats.</Description>
        <Identifier>c25c9530-0d96-455e-9c2c-b8f9cecb6c72</Identifier>
        <SequenceIndicator>5.4</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>AI Diplomacy</Name>
        <Description>Promote international norms ensuring artificial intelligence supports innovation and stability.</Description>
        <Identifier>782d55b5-44f6-4e4a-ba95-5654716e8862</Identifier>
        <SequenceIndicator>5.5</SequenceIndicator>
      </Objective>
    </Goal>
    <Goal>
      <Name>Cyber Workforce</Name>
      <Description>Develop and sustain a highly skilled cybersecurity workforce.</Description>
      <Identifier>7e4bede9-6856-4a46-8998-0dc0e5e166d4</Identifier>
      <SequenceIndicator>6</SequenceIndicator>
      <Objective>
        <Name>Talent Pipeline</Name>
        <Description>Develop education and training pathways for future cybersecurity professionals.</Description>
        <Identifier>23237645-c7ea-41ac-860f-324d4556cebd</Identifier>
        <SequenceIndicator>6.1</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Workforce Training</Name>
        <Description>Expand training programs for the existing cybersecurity workforce.</Description>
        <Identifier>7fb16303-0bfd-483c-ae20-7e81cfb0540f</Identifier>
        <SequenceIndicator>6.2</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Cross-Sector Alignment</Name>
        <Description>Align incentives among industry, academia, and government to build cyber talent.</Description>
        <Identifier>2f8a7e64-6c1d-494e-afb4-ecaf12a740bf</Identifier>
        <SequenceIndicator>6.3</SequenceIndicator>
      </Objective>
      <Objective>
        <Name>Recruitment</Name>
        <Description>Recruit new talent to design and deploy advanced cybersecurity technologies.</Description>
        <Identifier>28d7c978-d757-4139-a777-0ef972c2c657</Identifier>
        <SequenceIndicator>6.4</SequenceIndicator>
      </Objective>
    </Goal>
  </StrategicPlanCore>
  <AdministrativeInformation>
    <PublicationDate>2026-03-10</PublicationDate>
    <Source>https://www.whitehouse.gov/wp-content/uploads/2026/03/President-Trumps-Cyber-Strategy-for-America.pdf</Source>
    <Submitter>
      <GivenName>Owen</GivenName>
      <Surname>Ambur</Surname>
      <EmailAddress>Owen.Ambur@verizon.net</EmailAddress>
    </Submitter>
  </AdministrativeInformation>
</StrategicPlan>