The National Cyber Strategy for America: 3 takeaways for government security leaders

tomasz-zielonka-jhswx1S60qk-unsplash.jpg

In the White House’s March 2026 “Cyber Strategy for America,” the directive for the US government to lean heavily into innovative AI-driven cybersecurity couldn’t be more clear. The strategy outlines six pillars that will shape future cybersecurity priorities and funding for federal, state and local, and Tribal agencies.

As government leaders think about how to incorporate the six pillars into their own agency strategies, we recommend a thoughtful approach that balances speed and innovation with proven solutions that have been successfully and broadly implemented across government.

As an open source, AI-powered platform, Elastic’s leading security technology combined with our history of partnerships across government make us equipped to help agency leaders deliver quickly on these cybersecurity pillars, particularly for the following three areas: 

  1. Modern security technology with fewer barriers to entry

  2. Integrated agentic AI and generative AI

  3. Unified visibility across IT and OT environments

1. Modern security technology with fewer barriers to entry

We will work to adopt AI-powered cybersecurity solutions to defend federal networks and deter intrusions at scale. Working across the government to modernize and create competitive procurement processes, we will remove barriers to entry so that the government can buy and use the best technology.

Pillar 3; Modernize and Secure Federal Government Networks

Modern cybersecurity strategy depends on the ability to ingest, organize, and operationalize all data, regardless of its type or foundation. This is the heart of the Elasticsearch Platform, which can make sense of all data types at scale and in real time, across agencies. Elastic Security — built on the rich search and AI foundation of the Elasticsearch Platform — combines SIEM, XDR, and cloud security. Elastic Security can detect and remediate cyber threats across an agency’s entire data ecosystem, resulting in a 90% reduction in security events and incidents. 

For over a decade, Elastic has been partnering with the US federal government to lower barriers of entry to buying and using Elastic. As highlighted in the strategy, a priority for the US is building a comprehensive approach that leverages all layers of government: “We will galvanize the role of state, local, Tribal, and territorial authorities as a complement to — not a substitute for — our national cybersecurity efforts.” 

Elastic has laid the groundwork for large-scale standardization and simplified procurement via the Cybersecurity Infrastructure and Security Agency’s (CISA) Continuous Diagnostics and Mitigation (CDM) dashboard, CISA’s SIEM-as-a-Service (SIEMaaS), and our partnership with General Services Administration’s (GSA) OneGov program.

  • CDM dashboard: The CDM dashboard, operated by CISA, centralizes data from over 100 civilian agencies. Powered by Elastic, the CDM dashboard can index structured, unstructured, and semi-structured data when ingested without moving that data from its original location with each agency. As a result, the CDM dashboard provides a comprehensive look into cross-agency data that enables CISA and federal agencies to detect hidden threats and respond quickly.
  • SIEM-as-a-Service: Elastic’s AI-driven SIEM is the technological foundation for  CISA’s new SIEMaaS offering, which aims to standardize cybersecurity data collection across federal agencies, enable real-time threat detection and incident response — all in an effort to strengthen the nation’s security posture with a coordinated, AI-powered approach.
  • GSA’s OneGov program: Elastic’s partnership with GSA’s OneGov program offers all Elastic solutions at discounts up to 60% while significantly streamlining the procurement process.

To go deeper into security for government, explore the Cybersecurity guide for public sector: Securing data and assets in the AI era.

2. Integrated agentic AI and generative AI

We will swiftly implement AI-enabled cyber tools to detect, divert, and deceive threat actors. We will rapidly adopt and promote agentic AI in ways that securely scale network defense and disruption.

Pillar 5; Sustain Superiority in Critical and Emerging Technologies

Elastic’s modern SIEM solution leverages the latest generative AI and agentic AI technologies to accelerate threat detection, investigation, and security operations center (SOC) optimization at scale. A few notable AI features that are making a difference in government missions right now:

  • Cyber alert triage: Cyber alert triage uses large language models (LLMs) to triage, analyze, and correlate security alerts, reducing analyst alert fatigue and enabling SOC teams to prioritize the most critical threats. 
  • Chat-based interaction: Built on generative AI, Elastic AI Assistant enables security analysts to ask questions of their data in natural language and immediately receive contextual guidance on threats, alerts, and remediation.
  • Simplified SIEM migration: For organizations that want to switch from a legacy SIEM to Elastic’s SIEM, the Automatic Import and Automatic Migration tools can make the switch easy. Using generative AI and semantic search, Elastic can automatically map and translate existing detection rules without needing to rewrite them manually.

AI accelerates time to detection and provides essential contextual information, but it also facilitates efficient SOC operations, especially in the face of limited resources. The strategy’s sixth pillar, Building Talent and Capacity, prioritizes education and training in cyber technologies. Using AI-driven technology, security analysts can spend time honing their strategic skills instead of manually correlating security data and sifting through non-urgent alerts.

An Enterprise Strategy Group report found that organizations using Elastic Security were able to reclaim 74% of full-time security employees' hours, allowing for more strategic initiatives.

3. Unified visibility across IT and OT environments

We will identify, prioritize, and harden America’s critical infrastructure and secure its supply chains, including defense critical infrastructure and adjacent vendors, private companies, networks, and services — such as the energy grid, financial and telecommunication systems, data centers, water utilities, and hospitals — securing information and operational technology supply chains.

Pillar 4; Secure Critical Infrastructure

Elastic’s ability to ingest, organize, analyze, and operationalize all data types, stored in any environment, enables government agencies to access a holistic view of both IT and OT infrastructure. Other point solutions require manual correlation between data types and systems, increasing risk of hidden threats and operational error.

Elastic’s open source platform is designed to integrate with your current ecosystem, pulling in all data for a holistic view — giving teams the foundation to implement Zero Trust Architectures, end-to-end anomaly detection, AI, and more. A few capabilities that differentiate Elastic in this space include:

  • Affordable log storage and compliance: Federal agencies are required to comply with OMB M-21-31, which ensures accessibility to historical security logs for a period of time. Elastic’s data tiering structure and Elasticsearch logsdb index mode enable agencies to choose how to store logs based on how often they need to access them, reducing costs and strengthening compliance.
  • Open standards: In addition to being open source technology, Elastic supports a growing list of the most popular Cloud Native Computing Foundation (CNCF) projects from Kubernetes to OpenTelemetry. These integrations reduce vendor lock-in and tool sprawl by enabling agencies to standardize common data structures and technology. 
  • AI-assisted logging: Streams uses AI to automatically parse and organize logs and implement proactive event detection, saving teams time and reducing investigation complexity.

Join our team and government leaders at the Elastic Public Sector Summit on March 19 in Washington, DC. Our conversations with government will dive into cybersecurity, AI adoption across government, and how government agencies can best leverage AI-powered solutions for mission success. See you there!

The release and timing of any features or functionality described in this post remain at Elastic's sole discretion. Any features or functionality not currently available may not be delivered on time or at all.

In this blog post, we may have used or referred to third party generative AI tools, which are owned and operated by their respective owners. Elastic does not have any control over the third party tools and we have no responsibility or liability for their content, operation or use, nor for any loss or damage that may arise from your use of such tools. Please exercise caution when using AI tools with personal, sensitive or confidential information. Any data you submit may be used for AI training or other purposes. There is no guarantee that information you provide will be kept secure or confidential. You should familiarize yourself with the privacy practices and terms of use of any generative AI tools prior to use. 

Elastic, Elasticsearch, and associated marks are trademarks, logos or registered trademarks of Elasticsearch B.V. in the United States and other countries. All other company and product names are trademarks, logos or registered trademarks of their respective owners.