Comments about the State of the Union
From the present annals of recent history, we have a law on the books.
§ 1030 Federal Computer Hacking – Under 18 U.S.C. § 1030, federal computer hacking charges can be filed as either a misdemeanor or felony offense. The decision will normally depend on the circumstances of the case, primary motivation of the conduct, and the level of harm it caused.
Yet we imagine a different world, where there are calm business transactions and no stolen data or identities. We are optimistic for seeing this future, defending our critical infrastructure. As the Equifax, Anthem, Marriot and Office of Personnel Management breaches demonstrated was if there is a computer in your business or at home, you are a cybersecurity target.
Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released a study.
Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization
Of the myriad lessons spanning 16k words, the lessons demonstrate one glaring lesson: the organization’s staff require continuous training, support and resources to implement secure software configurations and detect malicious activity. Simply, the staff requires continuous training. An excerpt of this report is below:
-
The assessed organization had insufficient technical controls to prevent and detect malicious activity. The organization relied too heavily on host-based endpoint detection and response (EDR) solutions and did not implement sufficient network layer protections.
-
The organization’s staff require continuous training, support, and resources to implement secure software configurations and detect malicious activity. Staff need to continuously enhance their technical competency, gain additional institutional knowledge of their systems, and ensure they are provided sufficient resources by management to have the conditions to succeed in protecting their networks.
-
The organization’s leadership minimized the business risk of known attack vectors for the organization. Leadership deprioritized the treatment of a vulnerability their own cybersecurity team identified, and in their risk-based decision-making, miscalculated the potential impact and likelihood of its exploitation.