NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
December 12, 2024

Chevron Doctrine’s Fall: The Catalyst Cybersecurity Needed?

Jack Danahy Jack Danahy

Cybersecurity regulations like the HIPAA Privacy Rule and the GLBA’s CFR Part 314 have long served as guideposts, providing much-needed direction in a complex landscape. These rules were made possible by the Chevron Doctrine, a framework that allowed agencies to interpret ambiguous laws and establish standards. However, on June 28, 2024, the Supreme Court overturned this doctrine, ushering in an era of uncertainty—but also an opportunity to redefine how we approach cybersecurity regulation with clarity and purpose.

The side of a building

Description automatically generated

Today’s cybersecurity regulations are piecemeal and largely reactive, often placing undue burdens on businesses without creating motivation or incentives for identifying and addressing root causes. Worse, individual organizations with charters that involve multiple areas of cybersecurity concern can find themselves subject to multiple, sometimes conflicting, cybersecurity expectations. A recurring example is higher education: universities must juggle cybersecurity demands and priorities from the FTC, HHS, and the payment card industry, because they broker financial relationships, handle student and staff healthcare data, and accept credit card payments across multiple departments. This means that they need to comply with a matrix of controls, reporting, and audits, while managing their core, critical, mission of providing education within a safe environment. The result is a tangled web of conflicting rules, forcing more attention and investment in compliance, and less focus and resources for real security.

The speed of advancement in technology and threat makes it obvious why Congress hasn’t kept pace or provided clearer guidance. Today, as we look ahead, the challenge of defining rules with appropriate statutory authority is finally on the table in a way that may allow our industry to cut the Gordian cybersecurity knot created through the past 30 years of tech, threat, and countermeasure recommendations. Finally, we have the opportunity for a new, bold, actionable approach—one akin to the sea-change in food safety that followed the 1906 Pure Food and Drug Act, which revolutionized safety standards in the meatpacking industry following public outcries and irresistible momentum for change.

Imagine a framework for cybersecurity that was as robust on internetworking as the FDA has become for our food and pharmaceutical suppliers. We’d see:

  • Meaningful standards for secure software development and supply chain management.
  • Certifications to assure and announce product and service security.
  • Intelligent assignment of liability to hold creators of software accountable. 

In this new system, exploits and breaches, along with their costs, could be more clearly assigned to the appropriate parties. Victims of criminals exploiting insecure software or misconfigured utilities, like hospitals or small businesses, would not be villainized, and instead, would be incentivized to choose only secure products and proven reliable service providers. More substantial and informed legislation would move our disclosure from blaming these victims to educating them on trustworthy providers and encouraging vendors to prioritize cybersecurity through market differentiation on these lines.

This clarity would transform the technology industry, enabling businesses to innovate safely and consumers to trust the technology they depend on. Unlike the world of the last century, cybersecurity is now foundational to our lives—just like safe food, clean water, and reliable transportation. With a new, evergreen, and consistent standard of care, we can move beyond the current patchwork of rules to a system that rewards diligence and punishes negligence with one voice.

The end of the Chevron Doctrine is a wake-up call—and perhaps, the catalyst we need to build a better, safer digital world.

Have questions about the impact of these regulatory changes on your organization? Don’t hesitate to reach out—we’re here to help.

Want more insights like this? Subscribe to our blog for the latest updates, expert perspectives, and actionable guidance to navigate the evolving cybersecurity landscape.

Subscribe now

Included Topics

  • Industry Insights
Jack Danahy
Jack Danahy

Jack (he/him) is the Vice President of Strategy & Strategic Services at NuHarbor Security where he spearheads the research and development of the unified security service platform, striving to simplify cybersecurity for all organizations. Prior to joining NuHarbor Security, Jack founded three successful security software companies that were acquired by Watchguard Technologies, IBM, and Alert Logic, and has received 12 patents for his security innovations. Jack is a sought-after cybersecurity speaker and writer; his insights and opinions have been featured in prestigious publications such as Forbes, Fortune, the New York Times, and the Washington Post, solidifying his influence and expertise.

Related Posts

2 min read
Mastering the Art of Cybersecurity Communication: 6 Questions Every Leader Must Answer
Read More
4 min read
Beyond the Platform: How Integration Strengthens Cybersecurity
Read More
Industry Insights 3 min read
Cybersecurity Podcast: The Top 10 Pwned Episodes of 2023
Pwned Podcast Logo with
Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.