recommended reading

The Changing Face of Infrastructure Cyber Threats

chuyuss/Shutterstock.com

ARCHIVES

By Jake Olcott February 27, 2017

recent posts

Jake Olcott is vice president of business development at BitSight, which provides companies with objective, evidence-based security ratings. He has previously worked as legal adviser to the Senate Commerce, Science and Transportation Committee on cybersecurity and staff director for the House Homeland Security Committee’s Subcommittee on Emerging Threats, Cybersecurity, Science and Technology.

On Jan. 31, President Donald Trump met with cybersecurity experts at the White House to discuss his plans to strengthen the government’s ability to safeguard its computer networks. Though an expected executive order outlining Trump’s approach has not been signed yet, among the details Trump shared with reporters was that he would require all federal agencies to update their information technology systems and, working with utilities and other private industries, shore up protection of the electrical grid and other critical infrastructure.

In focusing attention on the security of critical infrastructure, Trump is correctly reacting to a growing number of attacks in recent years on energy, water and transportation systems. From a ransomware attack against San Francisco’s municipal transportation authority to charges that seven men with links to the Iranian government hacked into a small dam in New York, malicious attackers are increasingly expanding beyond traditional targets such as banks, retailers and government agencies and going after essential infrastructure.

» Get the best federal technology news and ideas delivered right to your inbox. Sign up here.

If it aims to take a holistic and leading-edge view of the nation’s cybersecurity posture, the administration would be wise to broaden our classic understanding of critical infrastructure to include not only key physical assets but also the critical third-party technology providers that provide essential services to infrastructure owners and operators.

In recent years, more and more organizations are relying on cloud and other third-party service providers to run their operations or manage sensitive data. An attack on one of these outsourced infrastructure providers could have a calamitous ripple effect for businesses and their customers.

Therefore, it’s crucial for government cybersecurity policymakers to consider the full range of what constitutes critical infrastructure today and how, working with the private sector, it can encourage advanced cybersecurity practices.

An a-ha moment about the significance of the threat to internet infrastructure came on Oct. 21, 2016, when dozens of websites including PayPal, Twitter, Amazon, Spotify, Yelp and CNN were intermittently knocked offline after the Dyn attack.

The assault on the lesser-known company, whose servers translate domain names into numeric addresses to allow web pages to be fetched, illustrated how little understood the growing and evolving infrastructure security threat can be. 

If the attack on Dyn had such a powerful effect, imagine the repercussions of a takedown at a larger service provider like Amazon Web Services or Microsoft Azure.

In a sign of how fast the cybersecurity landscape is changing, even the realization that the cyber threat to traditional infrastructure is increasing is still a somewhat recent development.

There has been a flurry of activity lately to address the risk to traditional infrastructure—for example a Feb. 1 hearing by the House Energy and Commerce Committee on the “electricity sector’s efforts to respond to cybersecurity threats.”

But equal attention urgently needs to be paid to protecting a wider range of infrastructure, from cloud services to election systems.

We’re unlikely to see additional regulation, not only because the Trump administration is averse to regulation, but because it’s already been accepted doctrine in Washington for several years that more rules aren’t the answer to better cybersecurity.

Nevertheless, the government still plays an important role in motivating companies to adopt smart cybersecurity practices, especially in crucial industries such as financial services. That can be through better information sharing and sensible, surgical regulation-tightening such as encouraging companies to make sure they’re not sitting ducks for attacks through the third parties they do business with. Perhaps most importantly, government can demonstrate strong leadership by strengthening its own third party risk management programs.

There’s been good work happening within the government on this front, and there’s no reason to think that will change under the new administration. Meanwhile, private industry needs to keep stepping up its own efforts to make companies are well protected in today’s complex cybersecurity landscape.

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.