Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Federal Cybersecurity Action Needed In 2015

by GTI Editors
February 17, 2015
in Cybersecurity
Reading Time: 4 mins read
A A
Share on FacebookShare on Twitter

Just as the news broke that Anthem Inc., the second-largest health insurance company in the United States, suffered a massive data breach – some 80 million people – Michael Daniel, Special Assistant to the President and cybersecurity coordinator in the Executive Office of the President, had a far-ranging online conversation on cybersecurity issues with Bloomberg Government.

“It’s obviously quite concerning that we would have another intrusion of this size following 2013, which some people have called the Year of the Hack,” Daniel said.

This breach, along with the other highly publicized losses of the past year or so – Target, Home Depot, and Sony, to name just a few – highlight the need for federal legislation to address cybersecurity, he said, but no one should be surprised it is taking so long.

“Look, for instance, at the evolution of Goldwater-Nichols,” the law that reorganized the Defense Department, he said. That law came about after the “failed hostage rescue attempt in 1980, [but] the legislation passed in 1986, and it was arguably less complex than cybersecurity. So the fact that it’s taking so long … shouldn’t be surprising.”

The need for federal action, from congressional legislation to Executive Branch directives, is growing rapidly, Daniel said.

“The threat landscape is getting worse, broader, more sophisticated, more dangerous. We keep connecting more stuff to the Internet, [now we’re] talking about the Internet of Things, there’s more devices connected to the Internet than people on the planet,” he said. And the attacks are getting “more sophisticated – not just the technology, but [their] organizational capacity.”

Equally alarming is that attackers “are willing to cross lines they didn’t before,” he added.

Even though the threat landscape is getting worse, the obstacles to cybersecurity legislation are formidable.

For instance, there is the challenge of information sharing – whether between companies and federal agencies, federal and state agencies, law enforcement and intelligence, and so on.

Daniel said the government does not want personally identifiable information (PII) to be shared, but does want to know IP addresses, which malware is appearing, and the signatures of attacks, to name a few.

Another problem with information sharing is the issue of corporate liability.

“In spite of all the hacks, companies are concerned about reputation, branding issues, lawsuits,” Daniel said. While the companies might like the broadest possible protection from liability, the Administration is looking for targeted protections.

“You have to give companies enough assurances that they’re willing to share more” information, he said. “At the same time, we can’t introduce [protections] where we’re encouraging underinvestment in cybersecurity, because that would be the totally wrong outcome.”

Another obstacle to cybersecurity legislation is the fact that there are many different kinds of attackers, including nation-states. Daniel said that cyberspace is such a new environment, it will take time to come up with a shared understanding of acceptable practices.

“Go back to the Cold War, everybody knew the Soviet Union was spying on the United States, and we were spying on the Soviet Union … [but] we weren’t bombing,” he said. “If we caught their spies we’d kick them out of the country” and vice versa, “but [we] weren’t blowing up each other’s infrastructure.

“Nation-states are going to use cyberspace to pursue their foreign policy goals; that shouldn’t surprise anyone,” he said. “But it does mean we should come up with rules of the road to limit escalatory behavior” and allow commerce. This is why getting cybersecurity policy and legislation is so important, because it’s fundamental to both domestic and foreign policy, he said.

It has been relatively uncommon for the government to attribute cyber attacks to particular nation-states, Daniel said, though it doesn’t mean agencies aren’t pursuing perpetrators aggressively.

The Sony attack was different because of three factors, Daniel said.

“One was its destructive nature – not just theft, but a destructive attack that did significant damage to Sony. It was a coercive attack … and, while not critical infrastructure, it was an attack on one of our core values, freedom of speech,” he said. “We didn’t want to hand out a playbook on how to suppress speech in the United States.”

Daniel said one important aspect of cybersecurity is trying to understand the underlying business model driving attacks. In the Anthem attack, for instance, what is valuable about the information that was stolen, and how can it be used?

“With high-impact records like that, we have to do a much better job of encrypting data at rest, so even if it’s taken it can’t be used,” he said.

 

 

Tags: Anthem data breachcybersecurityCybersecurity Legislationdata breachMichael Daniel

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5387 shares
    Share 2155 Tweet 1347
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    87 shares
    Share 35 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us