CISA Needs to be ‘Quarterback’ of U.S. Cybersecurity, Rep. Katko Says
Recent cyberattacks on U.S. federal systems point to the need to make the Cybersecurity and Infrastructure Agency the “centralizing authority system” for the nation, said Rep. John Katko, R-N.Y., during a fireside chat at the State of Net Conference.
That said, Katko went on to say he doesn’t believe CISA should take authority away from other agencies, rather that it should serve as an advising “quarterback” in the “.gov realm.”
The New York Republican went on to describe his “five pillars” of cybersecurity this way:
· Centralizing authority under the CISA to move away from the government’s current fragmented approach to addressing the issue;
· Gaining a deeper understanding of third-party cyber risks and the extent of their impact;
· Crafting a better process for the certification of vendors once this third-party risk is identified;
· Implementing stronger software assurance practices to ensure that systems are not vulnerable while updating; and
· Getting tougher. Katko suggests the U.S. “whack the hell out” of the bad actors that commit these attacks through actions like indictments or sanctions.
“There needs to be very serious consequences from an economic standpoint,” he said, adding that even the potential for offensive cyber capabilities could be utilized in certain situations “if the powers that be deemed them necessary.”
Pointing out the “gigantic disparity” between how much capital bad actors – such as China and Russia – invest in their offensive cyber capabilities versus the “mere fraction” by comparison the U.S. spends on its defensive capabilities, Katko said the government must do more by “beefing it up and making sure we have a cyber director” to act as the authoritative figurehead for cybersecurity.
“Until we start leveling the playing field, we are going to have a hard time trying to keep our systems safe going forward,” Katko said.
“We definitely made progress with CISA in the last administration, but it is still not anywhere near where it needs to be,” he said, noting the need for more funding for CISA to receive the necessary tools and resources.
“Gone are the days where [cybersecurity’s mission] was to just get a patch to fix a cyber vulnerability … it is not about just fixing your patches anymore. It is interwoven with every fabric of our business and every fabric of our society from medicine to our homes … everything is tied to the internet,” he added.
Katko authored eight measures in the recently enacted National Defense Authorization Act for Fiscal Year 2021 addressing six key issues from cybersecurity to two measures to better tackle mental health care, noting in a statement that the security breach of Texas-based software developer SolarWinds by Russian hackers “underscores our nation’s cyber vulnerabilities.”
The six provisions tackling these vulnerabilities incorporate recommendations from the Cybersecurity Solarium Commission.
These include reinvigorating the Cybersecurity and Infrastructure Agency by:
· Requiring the Department of Homeland Security to conduct a review the CISA’s fulfillment of missions and best practices recommendations through the Strengthening CISA Act of 2020;
· Stabilizing the CISA director and assistant director positions to boost guidance and long-term strategies; establishing a committee composed of industry representatives to advise the agency and the DHS;
· Conducting of joint cyber planning for public-private cooperation and planning; and
· Requiring a strategic implementation plan of a national Domain-based Authentication, Reporting and Conformance standard for US-based email providers by the head of the DHS.
The last two measures seek to expand mental health care for service members and rural communities through the Military Mental Health Stigma Reduction Act and the Seeding Rural Resilience Act, particularly in light of the novel coronavirus pandemic.
Katko further explained that the pandemic has “metastasized” the cybersecurity problem due to nationwide remote work, particularly that of government employees, and other virtual programs dealing with highly sensitive personal data such as telehealth and telemedicine initiatives.
“All those things are here to stay,” he said, adding that understanding that the “SolarWinds debacle” is “symptomatic of a much larger problem.”
The full text of the 2021 NDAA can be found here.
In The News
WASHINGTON (AP) — Jolted by a sweeping hack that may have revealed government and corporate secrets to Russia, U.S. officials are scrambling to reinforce the nation's cyber defenses and recognizing that an agency created two years ago to protect America's networks and infrastructure lacks the money,... Read More
WASHINGTON -- Cybersecurity experts suggested to a congressional committee Wednesday that lawmakers act quickly to address growing threats from hackers. They mentioned the SolarWinds computer infiltration by the Russians last year and a hacker’s attempt to poison a Florida municipal water supply last week as examples.... Read More
ST. PETERSBURG, Fla. (AP) — A hacker's botched attempt to poison the water supply of a small Florida city is raising alarms about just how vulnerable the nation's water systems may be to attacks by more sophisticated intruders. Treatment plants are typically cash-strapped, and lack the... Read More
WASHINGTON — Dramatic changes in the workforce and service delivery have posed unique security challenges over the last year. Evolving technologies are accommodating training and remote work, but new cybersecurity threats continue to emerge. In the last few years, directives have required federal agencies to take... Read More
Recent cyberattacks on U.S. federal systems point to the need to make the Cybersecurity and Infrastructure Agency the "centralizing authority system" for the nation, said Rep. John Katko, R-N.Y., during a fireside chat at the State of Net Conference. That said, Katko went on to say... Read More
WASHINGTON (AP) — The elite Russian hackers who gained access to computer systems of federal agencies last year didn't bother trying to break one by one into the networks of each department. Instead, they got inside by sneaking malicious code into a software update pushed out to thousands... Read More