2026 Futuriom 50: Highlights →Explore

Last Friday, the White House released President Trump’s Cyber Strategy for America, the most assertive presidential cybersecurity posture statement I’ve read in my career. It names adversaries directly. It treats offensive cyber operations as a legitimate instrument of national power. And it says something that needed to be said for a long time: the private sector isn’t a bystander in this fight, it’s a principal.

I mean that praise sincerely. The strategy’s six pillars, from shaping adversary behavior to building the cyber workforce, reflect a maturity of thinking that has been absent from federal cyber policy for years. The emphasis on removing burdensome regulation while raising the bar on actual security outcomes is the right balance. The explicit call to modernize federal networks and accelerate cloud adoption is overdue.

This week, dozens of cybersecurity CEOs will publish blogs that say exactly what I just said. They’ll applaud the strategy, quote their favorite pillar, and pivot to why their company was already doing it. You’ll read those blogs, nod politely, and forget them by Thursday.

I’d rather talk about what the strategy doesn’t say. Because what it misses may matter more than what it gets right.

The Surface Nobody’s Defending

Pillar Three calls for modernizing federal networks through zero-trust architecture and cloud transition. Pillar Four calls for securing critical infrastructure, energy grids, financial systems, and hospitals. Both pillars assume something that isn’t true: that once we move to the cloud, the network connecting those workloads is somehow already secure.

It isn’t.

The cloud network, the east-west traffic between workloads, applications, and services inside AWS, Azure, GCP, and OCI, is the largest unguarded attack surface in enterprise infrastructure today. We spent three decades building sophisticated perimeter defenses for on-premise networks. Then we migrated everything to the cloud and left the network layer between workloads essentially unmonitored, unsegmented, and unenforced.

We locked the front door and moved everything to a building with no walls.

This is the architectural reality of every major enterprise and federal agency running in the cloud right now. The strategy calls for zero trust, and that’s the right framework. But zero trust has been implemented almost entirely at the identity and access layer, verifying who gets in. Almost nobody is verifying what happens once they’re inside the network.

AI Agents Just Made This Urgent

This brings me to the strategy’s most forward-looking section. Pillar Five calls for sustaining American superiority in emerging technology, and it specifically names two things: securing the AI technology stack and promoting the secure deployment of agentic AI.

That language is significant. The White House is acknowledging that AI agents — autonomous software that can discover, decide, and act without human intervention — are coming to enterprise networks at scale. What the strategy doesn’t address is where those agents actually operate.

Their primary activity is traversing the cloud network to access the workloads and data needed to fulfill their objective. Moving laterally between workloads at machine speed, discovering resources, making API calls, and taking autonomous action across the very network layer that nobody is watching.

This is the collision the strategy doesn’t name: Pillar Three’s push to modernize into the cloud and Pillar Five’s embrace of agentic AI converge at the same place: the cloud network. The strategy treats them as separate priorities. In practice, they are the same problem.

And it’s not just malicious agents we need to worry about. The majority of enterprises deploying AI agents for legitimate business purposes, automating workflows, managing infrastructure, processing data, are sending autonomous software across cloud networks with little to no inspection, or segmentation, or governance. The attack surface isn’t just from adversaries. It’s from our own innovation outpacing our security architecture.

What I’ve Seen in Washington

I’ve spent the past several months engaging with policy leaders in Washington on this exact issue, meeting with White House officials, working with CISA through the Next Gen Coalition, and engaging with Congressional leaders who are drafting legislation on cloud network infrastructure security.

What I’ve learned is that the people shaping national cyber policy deeply understand endpoint security, identity management, and zero trust access. They’ve been well-briefed by an industry that excels at those layers. But the cloud network layer is new territory for most of them, because the industry hasn’t been talking about it.

That’s not a criticism, it’s a gap that the private sector has a responsibility to close. My job when I’m in Washington isn’t to sell a product. It’s to make sure the people writing these policies understand where the actual attack surface is. Because policy that doesn’t account for the cloud network is policy that protects the perimeter of a building that no longer exists.

Three Things This Strategy Needs Next

The Cyber Strategy for America is a strong foundation. Here’s how I believe it should be extended:

First, cloud network security standards. Pillar Three’s call for zero-trust architecture needs specific guidance on securing lateral traffic inside multicloud environments. The current zero-trust frameworks focus almost entirely on north-south traffic: who gets in and out. We need equivalent standards for east-west traffic: what moves between workloads once inside.

Second, AI agent traffic visibility. Pillar Five should mandate that enterprises can observe and govern how AI agents move across their cloud networks before those agents are deployed at scale. You cannot secure what you cannot see, and right now, most organizations have zero visibility into autonomous agent behavior at the network layer.

Third, public-private cloud security coalitions. Pillar One’s offensive posture requires real-time threat intelligence sharing. Today, that sharing happens primarily at the endpoint and perimeter. We need intelligence sharing at the cloud network layer, where the next generation of attacks — and the next generation of enterprise AI — actually operates.

An Invitation, Not a Critique

I want to be clear: this is the strongest cybersecurity posture statement from any administration I’ve seen. The strategic intent is right. The tone is right. The emphasis on private sector partnership is exactly what this moment requires.

What I’m offering isn’t criticism, but a commitment. The cloud network is where American enterprise and government infrastructure actually lives now, and it’s the surface that adversaries — and our own AI agents — will increasingly exploit. The strategy tells us what to defend. Let’s make sure we’re defending the right surface.

I look forward to continuing the work in Washington to help close this gap — not as a vendor, but as a builder who understands where the walls need to go.

Learn more about implementing zero trust with Practical Takeaways from NSA’s Zero Trust Guidance.

Explore the Architectural Divide in modern cloud security and how AI is widening it.

Frequently Asked Questions

President Trump's Cyber Strategy for America is the White House's latest presidential cybersecurity posture statement, released in March 2026. It outlines six pillars for strengthening national cybersecurity, including shaping adversary behavior, modernizing federal networks through [zero-trust architecture](https://aviatrix.ai/solutions/initiatives/zero-trust/) and cloud adoption, securing critical infrastructure, promoting emerging technologies like [agentic AI](https://aviatrix.ai/solutions/initiatives/agenticai/), and building the cyber workforce. The strategy is notable for directly naming adversaries, treating offensive cyber operations as a legitimate instrument of national power, and positioning the private sector as a principal partner — not a bystander — in national cyber defense.
While the White House Cyber Strategy emphasizes zero trust architecture and cloud modernization, it does not address the security of the cloud network layer — the east-west traffic moving laterally between workloads, applications, and services inside multicloud environments such as AWS, Azure, GCP, and OCI. Most zero trust implementations today focus on identity and access (who gets in), but very few organizations monitor, segment, or enforce security on what happens inside the network once access is granted. This makes the cloud network the largest unguarded attack surface in enterprise and federal infrastructure today.
Pillar Five of President Trump's Cyber Strategy calls for sustaining American superiority in emerging technology, specifically naming the need to secure the AI technology stack and promote the secure deployment of agentic AI. The strategy acknowledges that autonomous AI agents — software that can discover, decide, and act without human intervention — are coming to enterprise networks at scale. However, the strategy does not address the fact that AI agents traverse the cloud network layer, moving laterally between workloads at machine speed, which creates urgent new security challenges that current frameworks are not designed to handle.
The White House Cyber Strategy's pillars on federal network modernization (Pillar Three) and agentic AI deployment (Pillar Five) both converge at the cloud network layer. As federal agencies and enterprises migrate to the cloud and deploy autonomous AI agents, the lateral network traffic between workloads becomes the primary operating environment — and the primary attack surface. Without specific security standards for east-west cloud traffic, the strategy effectively protects the perimeter of an architecture that no longer exists, leaving the interior of cloud environments unmonitored, unsegmented, and vulnerable to both adversaries and ungoverned AI agent behavior.
The blog recommends three extensions to strengthen the White House Cyber Strategy. First, cloud network security standards — expanding zero-trust guidance to include lateral (east-west) traffic inside multicloud environments, not just perimeter (north-south) access controls. Second, AI agent traffic visibility — mandating that enterprises can observe and govern how AI agents move across cloud networks before deploying them at scale. Third, public-private cloud security coalitions — extending real-time threat intelligence sharing beyond endpoints and perimeters to include the cloud network layer, where next-generation attacks and enterprise AI actually operate.
The White House Cyber Strategy explicitly names the private sector as a principal partner in national cyber defense, calling for reduced regulatory burden while raising the bar on actual security outcomes. It also calls for securing critical infrastructure — including energy grids, financial systems, and hospitals — through modernized network architecture and cloud adoption. However, for private sector organizations and critical infrastructure operators already running in multicloud environments, the strategy's current guidance does not account for the cloud network layer, which means enterprises must go beyond the strategy's existing framework to fully protect the environments where their workloads, data, and AI agents actually operate.
Doug Merritt
Doug Merritt

CEO

Doug Merritt is Chairman, Chief Executive Officer, and President of Aviatrix. Most recently, Doug served as Splunk President and CEO from 2015 to 2021. During his tenure as CEO, Doug led the transformation of Splunk from an on premise, perpetual license software company with the equivalent of $220 million in Annual Recurring Revenue (ARR), to a cloud-based SaaS company with ARR of $3.12 billion.

PODCAST

Altitude

Secure The Connections Between Your Clouds and Cloud Workloads

Leverage a security fabric to meet compliance and reduce cost, risk, and complexity.

Cta pattren Image