Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Offense, Defense, Big Data

by GTI Editors
November 23, 2015
in Cybersecurity, Operations
Reading Time: 5 mins read
A A
Share on FacebookShare on Twitter

mavIn cyber warfare, as in all warfare, there are two types of players: those on offense and those on defense. While offensive abilities are fairly ubiquitous, defense is another matter entirely. With six hacks since April 2013 targeting OPM and its contractor’s personal information, the need for robust defense strategies for big data protection is clear. It is up to agencies to develop strategies to mitigate vulnerabilities and catch security threats before they occur.

Here, Mav Turner, Director of Product Strategy for Security at SolarWinds, shares how agencies can take a back to basics approach for implementing policies around monitoring and network and application segmentation to improve defensive strategies and protect big data.

Tell us about today’s cyber security landscape and particularly the impact on federal agencies.

Today’s cybersecurity landscape continues to be stormy. The number of attacks continues to rise, but organizations are still lagging in their ability to defend against these attacks. Attacks leveraging known vulnerabilities are still the most successful way to breach an agency and users are not getting the message. The impact on federal agencies is going to continue to be significant. Many federal agencies continue to underestimate the value of the data they have and that the costs to attackers are low, both in terms of real cost and the impact of deterrents.

Although it is important to point out that law enforcement has made noticeable progress in prioritizing, identifying, and pursuing cyber criminals. Federal agencies have been ramping up their cybersecurity efforts for years, but I wouldn’t say that the tide has quite turned in favor of the good guys. The bottom line is that adversaries only need to find one way in, and agencies need to defend all entry points, limit and repair damage caused by breaches, and identify and remove any footholds established by the attackers.

One of the more significant attacks in the federal space were the cyber-attacks on OPM. What were the key takeaways from this incident?

There are several key takeaways from the OPM attacks. The first is that the breach originated through contractor systems, which emphasizes that federal networks and systems are only as secure as their weakest link. Agencies need to pay attention to their supplier chains and segment their networks to reduce access and risk. The second take away involves smart cards. It’s my understanding that the only OPM systems that weren’t compromised were the ones that implemented dual-factor authentication. This has led to stronger enforcement of prior mandates to utilize dual-factor authentication across the board for federal agencies.

Understanding the current landscape we are in today, what advice would you give to agencies that are developing their own cyber warfare defense strategies?

The first thing I’d say to this question is that federal agencies are not on their own here. NIST has been partnered with DOD, the Intelligence Community and the Joint Task Force for years, to develop and provide significant guidance on how to secure their systems. For example, Special Publication 800-53, which defines a process and a risk management framework to guide agencies to increase their security, and Special Publication 800-53a, which defines the controls in detail.

It comes down to three questions:

  • What security controls are needed to mitigate the risk of using IT in the execution of your mission?
  • Have these security controls been implemented?
  • How confident are you that the controls were implemented effectively?

Agencies should have a clear plan encompassing: what to monitor and how; automated software patching; procedures that should be followed in case of a breach; a roadmap for capabilities you would like to add to your team; and more. The plan should address actions needed before, during and after a breach. It should be a “living document,” continually updated as necessary and shared with those who assume any sort of control or management of security protocols.

At SolarWinds, you advocate a “back to the basics” approach to defense strategy. Can you explain the components of a “back to the basics” strategy and give some tips on how agencies can begin implementing this type of strategy?

Agencies need to patch their systems to eliminate risk from known vulnerabilities. They need to continually educate their employees and track progress of employee engagement in preventing attacks. Agencies need to implement dual-factor authentication and eliminate shared passwords, especially for privileged accounts. They need to monitor their networks for threats and breaches and have an incident response plan to contain, eradicate and recover from attacks when they occur.

Anything else to add?

I think we all agree that the only way to completely eliminate vulnerabilities is for systems and networks not be connected. And, since this isn’t feasible, the next best thing is to raise the barrier to entry high enough that the cost to attackers is so high that they go elsewhere. When an attack is successful, we have to be able to detect and respond before the damage is done. The best way to position your agency is to have the right mix of people, process, and technology.

 

 

 

 

Tags: cyber criminalscyber securityCyber Warfarecybersecuritygovernment agenciesITmav turnerOPMsolarwinds

RELATED POSTS

Contributed Articles

What’s Missing from the National Cyber Strategy? Speed, Funding, and Accountability

March 23, 2023
Virtual Technology Briefing
AI & Data

Virtual Technology Briefing Showcases Strategies to Empower Agencies to Do More with Less

March 14, 2023
Contributed Articles

Silent But Deadly: The Cybersecurity Risks of Quiet Quitting

March 9, 2023
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9298 shares
    Share 3719 Tweet 2325
  • Fixed Wireless Access: Communications Infrastructure Podcast for the Public Sector

    72 shares
    Share 29 Tweet 18
  • Laid-off Tech Workers Find Unexpected Opportunities with Federal Government Contractors

    10 shares
    Share 4 Tweet 3

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us