Loading...

Cybersecurity Experts Point to More Investment Needed in Detection, Response

October 14, 2021 by Victoria Turner
Cybersecurity Experts Point to More Investment Needed in Detection, Response
Sen. Angus King, I-Maine.

WASHINGTON — If everyone were to employ proper cyber hygiene like multi-factor authentication or not clicking on links in phishing emails, more than 85% of cyberattacks would be prevented, said Sen. Angus King, I-Maine, Thursday. 

“The best hack is the one that doesn’t happen,” King said during the U.S. Chamber of Commerce event on the intersection of energy and cybersecurity as part of its EnergyInnovates series. 

Employers should implement the “trust but verify” admonition from the Reagan administration era by giving a three-strikes-you’re-out type of approach to employees who fail to realize the importance of proper cyber hygiene. 

The federal government must implement a similar approach when it comes to nation-states and adversaries attacking the U.S. networks, by establishing a declaratory deterrent policy to make adversaries “pay a price,” as the risks are “too great.” And the risks are even greater if the attacks target systemically important critical infrastructure, or SICI, like energy. 

“We understand as electricity providers, look, it’s in our DNA, that we are the backbone of the nation’s economy,” said Tom Fanning, CEO of Southern Company. “If those electrons don’t flow, we’re in deep trouble,” he added, noting that the second-largest American utility company gets attacked millions of times every day. 

But the U.S. investments have primarily focused on enterprise information technology for threat prevention, which is only part of the solution, said Robert Lee, CEO and founder of Dragos. The nation needs to be investing just as heavily, if not more, in operations technology to detect cyber threats. Operations technology is control systems that allow the provision of critical services like water, energy, oil and gas manufacturing, he explained, and this is what “makes critical infrastructure critical.” 

In the Solar Winds attack, he pointed out, the focus was on the enterprise information technology but the virus also compromised their operations technology. The adversary actually “had remote access to gas turbine equipment and software across the world in very critical infrastructure,” he said. 

“By the time you see [a cyber threat] bubbling up on the pond, there’s been a lot of activity below the surface to get there,” Lee said. And the threats we are seeing are not “as bad as you want to imagine…but far worse than you realize,” he said as he pointed to a recent cyberattack in February on a water treatment plant in Oldsmar, Florida, “where the adversary actually tried to poison the water system and hurt people.”

Many solutions are prevention-based, he explained, which is good, but systems are becoming more connected through the global digital transformation which has led to better, more efficient services and systems, but also “introduces attack vectors” through this accelerated connectivity. 

In the Cyberspace Solarium Commission report, Fanning pointed out, they “chose to use the word collaborate” instead of cooperate. 

“We have an obligation to work with [each other] to illuminate this battlefield in a real-time fashion so that we can deal with the threats before [they] manifest themselves as problems on our networks,” Fanning said, and strengthen both the physical and cyber defenses in SICI. 

To this means, Fanning pointed to “three legs to the stool.” First, private sector participation “among friends and foes alike” towards cyberspace standards, followed by private sector collaboration with the federal government.

And lastly, Fanning said, arming those who will hold the bad actors accountable “with the tools necessary to defend this nation’s ability to have a safe economy, keep our citizens safe and to protect our ability to see, to listen and to defend ourselves.”

Victoria can be reached at victoria@thewellnews.com.

In The News

Health

Voting

Cybersecurity

September 16, 2022
by Dan McCue
FEC Clears Path for Warren to Spend Campaign Funds on Cybersecurity

WASHINGTON — Sen. Elizabeth Warren, D-Mass., can use campaign funds to pay for the cost of reasonable cybersecurity measures to... Read More

WASHINGTON — Sen. Elizabeth Warren, D-Mass., can use campaign funds to pay for the cost of reasonable cybersecurity measures to protect her home network, the Federal Election Commission announced on Friday. The decision came in response to an advisory opinion request on behalf of Warren Democrats... Read More

September 9, 2022
by Madeline Hughes
CISA Looking to Change Cybercrime Reporting Rules

WASHINGTON — As cybercrimes are on the rise, the Cybersecurity and Infrastructure Security Agency is asking people, businesses and other... Read More

WASHINGTON — As cybercrimes are on the rise, the Cybersecurity and Infrastructure Security Agency is asking people, businesses and other organizations for feedback on what its new reporting rules should look like. The agency released the eight-page request for information Friday asking people how the agency... Read More

July 13, 2022
by Madeline Hughes
Atlantic Council Offers New Approach to Cybersecurity  

WASHINGTON — The Atlantic Council outlined Tuesday how the U.S. government and businesses can work together to protect the nation’s... Read More

WASHINGTON — The Atlantic Council outlined Tuesday how the U.S. government and businesses can work together to protect the nation’s power grid from cyberattacks. The United States’ power grid is increasingly reliant on digital technology and the internet. This is especially true as the country moves... Read More

July 6, 2022
by Reece Nations
National Computer Forensics Institute Reauthorization Critical to Security

HOOVER, Ala. — As the National Computer Forensics Institute comes up for congressional reauthorization, forensics and cybersecurity experts told The... Read More

HOOVER, Ala. — As the National Computer Forensics Institute comes up for congressional reauthorization, forensics and cybersecurity experts told The Well News how the institute’s standardized curriculum is critical to contemporary law enforcement activities. Having a centralized hub for preparing police for handling incidents related to... Read More

May 18, 2022
by Dan McCue
Federal Agencies Told to Act Quickly to Turn Back Cyberthreat

WASHINGTON — The entity charged with protecting federal agencies from bad cyber actors issued a rare emergency directive Thursday, warning... Read More

WASHINGTON — The entity charged with protecting federal agencies from bad cyber actors issued a rare emergency directive Thursday, warning they should quickly take steps to protect themselves from vulnerabilities found in VMware. VMware is a cloud computing and virtualization technology company headquartered in Palo Alto,... Read More

May 6, 2022
by Madeline Hughes
Cybercrime Tracking Bill Signed Into Law

WASHINGTON — The Department of Justice can now get a handle on the number of cybercrimes happening in the U.S.... Read More

WASHINGTON — The Department of Justice can now get a handle on the number of cybercrimes happening in the U.S. after President Joe Biden signed a bill into law Thursday granting the department the ability to track crimes that have become increasingly prevalent in recent years.... Read More

News From The Well