A New Cyber Game Plan Takes Shape
A New Cyber Game Plan Takes Shape
!
!
!
!
P L A N
AN ew A M a p E e
E R G e s S h
CY B ak
T
Introduction
It's not your imagination: The cyber threat
landscape takes a turn for the worse every year.
Ransomware, once seen as slowing, has become
vs.
a persistent threat. Data breaches continue to
occur with alarming frequency. And now cyber
experts are warning about the growing risk of
potentially devastating attacks against non-
! ! traditional technology, such as that used by
! x utilities and other critical infrastructure.
! !
r
the Cybe
Mapping pe
4 Threat La
ndsca
egy
ctive Cyber Strat
A Proa
8 now
Need to K
What You 023 National
10 About th
Cyb ersec
e2
urity Stra
tegy
Is,
t: What It
Zero Trus s
16 It Matter
and Why
$$
5 Ways to rsecurity
$
17 $
$$
$
be
Tackle Cy
e
ddress th
How to A ud-Native Apps
20 Risks of C
lo
22 Agenc
ie
Cyber s Bank on
Innova
tions
24 The Be
s
Agains t Defense
t
Is a St Cyber Threa
rong O t
ffense s
26 Gover
nm
Streng ents Find
th in N
umber
28 How to
I
the We solate
s
akest
Link
30 3 Way
st
Cyber o Bridge th
Workfo e
rce Ga
32 How to
G
Vulner et Ahead o
p
ability n
Manag
34 How to
Lands
Adapt
ement
A High-Level View
4
Non-Traditional
Tech Gets Targeted
Specters of a Cyber War
In April 2022, GAO said the Department
of Homeland Security urgently needed
On Feb. 20, 2022, with the Russian invasion of
to improve the security of the nation’s
Ukraine seen as imminent, New York Gov. Kathy
critical infrastructure, with a focus on the
Hochul said the state was strengthening its
vulnerability of operational technology
cyber defenses against possible Russian state-
(OT) – that is, hardware and software used
sponsored attacks against public institutions
to control industrial equipment. “Water
and critical infrastructure.
treatment facilities, power plants, and other
On Feb. 25, the day after Russian invaded critical infrastructure assets are increasingly
Ukraine, Texas Gov. Greg Abbott directed the connected to computer networks and the
state’s departments of Information Resources internet,” the report states. “Recent cyber
and Public Safety “to use every available incidents targeting pipelines and other
resource to safeguard the state’s critical facilities underscore the need for effective
infrastructure and to assist local governments cybersecurity to protect this infrastructure.”
and school districts with their needs.”
Also in April 2022, CISA warned that “certain
Around the same time, CISA issued an advisory advanced persistent threat actors” have
warning about an Iranian state-sponsored developed the ability to gain access to multiple
threat group known as MuddyWater, which was industrial control systems and related OT that
conducting cyber espionage and other malicious could be used to disrupt critical infrastructure,
cyber operations targeting government and especially in the energy sector.
private-sector organizations worldwide.
A July 2022 report raised similar concerns
MuddyWater was a subordinate element within
about public transportation. A study conducted
the Iranian Ministry of Intelligence and Security,
by the Mineta Transportation Institute and San
according to CISA.
Jose State University noted that public transit
Meanwhile, in March 2022, cybersecurity firm relies on external vendors to deliver services
Mandiant reported that a state-sponsored threat and provide critical technologies. Although
group in China had successfully hacked the advanced technologies have brought many
defenses of six state governments in the United improvements, they also have introduced
States during a 13-month stretch. The group new risks for agencies to mitigate,
exploited a well-known vulnerability called log4j. including ransomware.
In April 2022, two months after the invasion In March 2023, the U.S. Environmental
began, the United States and four other Protection Agency issued a memo urging
countries issued a joint cybersecurity advisory states to include cybersecurity assessments as
warning that Russian state-sponsored cyber part of their regular audits of water systems. In
actors could target critical infrastructure both a press release, EPA noted that a recent survey
within and beyond the region. The joint advisory found that many public water systems “have
provided links to more information about known not adopted basic cybersecurity best practices
threat groups. and are at risk of cyber-attacks.”
5
Ransomware’s Persistent Threat
But the news is not all bad. Early this year, the U.S.
Justice Department announced that the FBI has
hacked the systems of the Hive ransomware group,
which had been responsible for more than 1,500
attacks worldwide. In the process, the FBI captured
more than 300 decryption keys for Hive victims who
had been under attack, and another 1,000 keys for
previous Hive victims.
6
The Cost of Human Folly
7
A Proactive Cyber Strategy
An interview with Kevin E. Greene, Public-Sector
Chief Technology Officer, OpenText Cybersecurity
Government often plays catchup to threat actors Greene said a new OpenText Cybersecurity
rather than tracking their activity early in the attack technology, called cyDNA (available in May
life cycle. But according to Kevin E. Greene with 2023), runs machine-aided analytics on internet
OpenText Cybersecurity, it is time for government backbone traffic and develops adversary genealogy
agencies to become more forward-leaning, especially relationships that identify threat actors and their
considering the new National Cybersecurity Strategy capabilities. Unlike traditional threat intelligence,
(NCS), which underscores the need to disrupt cyDNA tells users what is happening to provide
threat actors. situational awareness around mission threats.
“Part of what the NCS emphasizes is taking a more “We have seen some data from early warning
proactive approach with cyber defense, actively signals at least four hours before an imminent
hunting for early warning signals associated with attack,” Greene said. “That’s enough time to run
threat actor behaviors to adapt and evolve cyber adversary emulation and unleash red/purple teams
defenses to disrupt their campaigns,” he said. to assess cyber defense capabilities against
imminent cyberattacks.”
Early Warning Signals
Unlike indicators of compromise, which are forensic Zero Trust
clues discovered after a cyberattack happens, early If you work from the zero-trust premises of “never
warning signals detect an adversary’s preparations trust, always verify and assume compromise,” it is
before the initial access phase of the attack life cycle. essential to incorporate good identity management
hygiene and visibility into daily operations, Greene
For instance, an agency could use what we call
said. It forces users to pay greater attention to little
global adversary signals and analytics to detect
things because “you can never take subtle notification
reconnaissance activities to gather information threat
alerts for granted,” he explained.
actors use to plan and execute their initial access for
a cyberattack, Greene said. By leveraging mission-specific threat intelligence,
government agencies can take what is considered a
Early warning is “basically creating an inspection
threat-informed defense approach to formalize their
shield looking for signals coming in and out of what
zero-trust strategies and make the right investments
we call a covered space [routable IP addresses]
to mature their zero-trust architecture. But “at the
to detect compromised behaviors and suspicious
center of everything is protecting the sensitive data,
communications to known infrastructure controlled
whether it’s in use, in motion or at rest,” he said.
by threat actors or infrastructure supporting
compromised assets and resources, and using that … For organizations that must do a lot, but with limited
to hunt for these signals in [security information and resources, adopting a proactive cyber stance can
event management], XDR/EDR telemetry and drive be difficult.
better planning [and] repurposing of cyber defenses
“Government is a little risk-averse, but I think we have
to be more resilient against cyberattacks,” he said.
to try new things, because some of the things we’re so
used to are just not keeping pace with threat actors,”
Greene said.
8
9
What You Need to Know
About the 2023 National
Cybersecurity Strategy
When the Biden administration released its eagerly awaited National Cybersecurity Strategy (NCS) in
March 2023, the big news was its requirements for potentially increased regulatory oversight and for the private
sector to step up.
One major goal of the strategy is to shift responsibility for security away from individuals and small
organizations — including state, local, tribal and territorial governments — to those “most capable and best-
positioned…to make our digital ecosystem secure and resilient.” That’s primarily the federal government and
cloud and infrastructure vendors.
But government has plenty to do under the new guidelines. For starters, NCS calls for accelerating
modernization, specifically transitioning from legacy systems to the cloud and speeding up adoption of
zero trust.
Specifics of implementation won’t be available until later this year, but here are some ways each pillar may affect
you. The key takeaway is that you’ll be collaborating, coordinating and sharing information with other agencies,
the private sector and even international allies as never before.
Big Picture
Soundbite
“Next-generation interconnectivity is collapsing the boundary
between the digital and physical worlds, and exposing some of
our most essential systems to disruptions.” “Our goal is a
defensible, resilient
The strategy is designed to drive what it calls two
digital ecosystem
fundamental shifts:
where it is costlier to
• Rebalance the responsibility to defend cyberspace. In attack systems than
short, individual users have been left to their own devices, defend them, where
making them weak links that malicious actors can exploit to sensitive or private
access larger organizations. information is secure
and protected, and
• Realign incentives to favor long-term investments. The where neither incidents
idea is to find “points of leverage,” or areas where small nor errors cascade
investments or “minimally invasive actions” could get into catastrophic,
everyone working toward building for “future resilience.” systemic consequences."
10
Pillar 1: This pillar raises the minimum cybersecurity requirements in critical
sectors, such as energy, nuclear, water, aviation and some high-priority
Defend Critical manufacturing, whether public or privately owned.
Infrastructure Agencies, especially Sector Risk Management Agencies (SRMAs),
will need to coordinate more tightly with CISA and operators of critical
infrastructure systems and assets.
11
Pillar 2:
Disrupt and Dismantle
Threat Actors Big Picture
This pillar is about undertaking large-scale “Our efforts will require greater
efforts to attack the attackers. This means collaboration by public and private sector
using all the tools of federal government — partners to improve intelligence sharing,
from law enforcement to diplomacy — to go execute disruption campaigns at scale, deny
after malicious cyber actors. adversaries use of U.S.-based infrastructure,
and thwart global ransomware campaigns.”
• Share more and share quickly. Information sharing with the private sector
is a common practice, but it needs to happen at a greater scale and in a
timelier fashion.
12
Pillar 3: The focus here is carrot and stick — using federal
buying power and regulations to push vendors
Shape Market Forces toward best practices. This pillar is the core of NSC’s
to Drive Security commitment to shifting responsibility for breaches
and their consequences away from individuals and
and Resilience small organizations and onto the private sector.
• Create accountability around data. The plan calls for legislation that provides
Key clear limits on how data can be used and how it should be protected.
Tactics
• Create accountability around software. The plan also calls for legislation
to establish liability for vendors developing products or services that are
not secure.
• Use the power of the purse (1). Through infrastructure-related grants programs,
the federal government can stipulate the adoption of sound cybersecurity
design, development and practices.
• Use the power of the purse (2). In the same way, good cybersecurity can be
enforced through the procurement process.
13
Pillar 4: A resilient future demands an upgrade
from the no-longer-reliable past. The
Invest in a Resilient Future structure of the internet is getting
old, and everything built on top of it is
subject to its underlying vulnerabilities.
• Secure clean energy. Many emerging clean energy solutions rely on automated,
interconnected systems that are vulnerable to attack unless security solutions
are developed.
• Secure digital identities. Many data breaches and fraud cases are possible because
there is no foundation for creating strong, verifiable digital identities for use in
online transactions. The federal government should support efforts to fill that gap.
• Build the cyber workforce. There are hundreds of thousands of unfilled cyber
positions across the public and private sectors — and that’s just in the United
States. NCS calls for the development of a National Cyber Workforce and Education
Strategy that draws on lessons learned and best practices from other countries.
14
Pillar 5: Forge Big Picture
International Partnerships
“To counter common threats, preserve and
to Pursue Shared Goals reinforce global Internet freedom, protect
against transnational digital repression, and
In addition to Pillar 2’s emphasis on using build toward a shared digital ecosystem that
international ties to thwart cyberattacks, NCS is more inherently resilient and defensible,
is intended to forge a cyberspace community the United States will work to scale the
that expects and rewards responsible behavior emerging model of collaboration by national
and makes it both isolating and expensive for cybersecurity stakeholders to cooperate
states to engage in hostile cyberactivity. with the international community.”
• Build coalitions. Global internet freedom requires global solutions. The United States
Key plans to build on and extend existing mechanisms (e.g., the Quadrilateral Security
Tactics Dialogue) for collaborating across borders to respond to malicious activity.
• Give a helping hand. U.S. cyber officials can help other countries respond to and
recover from significant cyberattacks. The administration will establish policies for
determining when such assistance is in the national interest.
• Reinforce global norms. When state-sponsored attacks occur, the global community,
with leadership from the United States, should respond, both in terms of statements
of condemnation and “meaningful consequences.”
Soundbite Conclusion
The United States will pursue these Not all changes will happen quickly; NCS has a decade-long
goals “while recognizing the need timeline. Plus, several of its provisions — notably, increased
to work with partners to thwart the regulation of private players and funding — call for
dark vision for the future of the legislative action. The divided Congress almost guarantees
Internet that the [People’s Republic compromise and possible blocking of some key points.
of China] and other autocratic Nonetheless, this strategy provides the blueprint for a
governments promote.” stronger, more resilient and more secure digital future.
15
Zero Trust: What It Is, and Why It Matters
Traditionally, organizations took a moat-and-castle But it’s critical. “Incremental improvements will not
approach to network security: Anything within a give us the security we need,” said the Administration
network’s perimeter was deemed safe, while external in a May 2021 executive order. “Instead, the Federal
infrastructure and activity raised Government needs to make bold changes and
cybersecurity concerns. significant investments in order to defend the vital
institutions that underpin the American way of life.”
But that approach has proven costly and insufficient
as cyber criminals devise new schemes to invade “A transition to a ‘zero trust’ approach to security,”
our networks and traditional on-premises systems the EO continued, “provides a defensible architecture
become more scattered and diffuse. for this new environment.”
So, the federal government, some local governments Zero trust vs.
and much of the private sector now are transitioning perimeter-based security
to a zero-trust architecture. It essentially turns
Zero-trust security
traditional cybersecurity on its head.
Source: TechTarget
16
5 Ways to Tackle Cybersecurity
Cybersecurity is a perpetual battle. As soon as
agencies shore up their defenses, a new type of
attack arises. But the 2021 Executive Order on
Improving the Nation’s Cybersecurity has done much
to give the good guys an edge. In addition to making
“prevention, detection, assessment, and remediation
of cyber incidents…a top priority and essential to
national and economic security,” the order calls for
specific actions, including implementing zero-trust
architectures, removing barriers to threat information
sharing and improving threat detection.
17
2. Artificial Intelligence
Since OpenAI’s launch of ChatGPT in November 2022,
talk about AI has been at an all-time high, but AI in
general has a role to play in cybersecurity because
of its ability to pick out patterns — and anomalies —
faster than humans can.
18
4. Backups
In today’s hyper-digital world, backups
almost seem archaic, but they still
play an important role, particularly in
recovery from cyberattacks, said Gerald Caron, CIO
and Assistant Inspector General for IT at the U.S.
Department of Health and Human Services’ Office of
the Inspector General.
19
How to Address the
Risks of Cloud-Native Apps
An interview with Benjy Portnoy, Vice President, Global Solution Architects, Aqua Security
Fill the Knowledge Gap To address the complexity of this environment, Aqua
Agencies need their security teams to have both created a Cloud Native Application and Protection
the knowledge and the tools to secure cloud-native Platform (CNAPP). Aqua's platform stops cloud-native
applications, said Portnoy. For example, what are attacks from code to cloud and back, identifying risks
serverless functions, and what are the ramifications early in the application lifecycle while protecting
for application security? What are common causes of production workloads from attack.
Kubernetes misconfigurations, and how can they be "Our platform was built to help organizations address
exploited by malicious actors? the risks and gain visibility into the threats they face
But agencies also need their developers to throughout the entire application lifecycle, ensuring
understand the risks involved and how to mitigate that security teams understand the context of an
them during the development process. attack so they can priotitize and remediate the
highest risks to the business," Portnoy said.
"How do we foster that collaboration between
security teams and the developers to ensure that the
entire application lifecycle has the relevant processes
and security controls in place?" he said.
20
21
Agencies Bank Cyber Accelerators
The goal is to help organizations get out of reactive
on Cyber
mode, in which they play catch-up with malicious
actors. Automation makes it possible for security
teams to identify and adapt to potential threats and
22
Advancing the State of the Art Worrying About Quantum
CISA is spearheading the development of numerous NCS identifies quantum computing as a
cyber automation solutions. Here are some of its high-priority concern.
flagship projects:
Quantum computing uses subatomic particles to run
• The Cyber Analytics and Data System (CADS), a massive number of calculations in parallel. “This
highlighted in the Biden administration’s fiscal means quantum computing may revolutionize our
2024 budget request, is intended to help security ability to solve problems that are hard to address with
teams make more effective use of advanced even the largest supercomputers,” according to the
analytics to identify, detect and prevent or U.S. Department of Energy’s primer on the topic.
mitigate emerging threats, according to a budget
All that compute power has cyber experts worried.
document. CADS will provide tools for ingesting
Traditional encryption techniques essentially are
and integrating cyber-related data, as well as for
just difficult math problems. But future quantum
coordinating and automating the analysis of
computers might not find them so difficult,
that data.
QuantumXchange explains.
• The CISA Advanced Analytics Platform for
NCS calls for the federal government to plan a
Machine Learning (CAP-M) (formerly known
transition to quantum-resistant cryptography
as CyLab) is a virtual collaborative research
environments and to determine how to ensure
environment in which CISA’s cyber experts can
cryptography’s continued evolution.
test ideas for using data to tackle cybersecurity
problems. CAP-M can run on-premises and on
A Double-Edged Sword
a multi-cloud platform. CISA will share lessons
Cyber experts have similar worries about AI and ML.
learned from its research with partners across
Although this technology will play a critical role in
government, industry and academia.
strengthening cybersecurity, it doubtless will also fuel
• The Advanced Data Analytics and Machine efforts to crack those defenses.
Learning Technologies Program is focused on
For example, cyber criminals are expected to use
using data to assess risks across cyber, physical
emerging AI-based chatbot solutions to devise
and blended cyber-physical environments
much more convincing phishing emails, leading
— a major concern when it comes to critical
more unsuspecting users to click on malicious links,
infrastructure. As part of its mission, the program
according to a report from the Center for Security and
is intended to build the foundation for using AI.
Emerging Technology.
Activities include developing representative
datasets for AI training, providing computational “Cybersecurity is a constant battle between attackers
testing capabilities and assessing emerging and defenders who try to leverage advances in
analytic tools. technology to gain an advantage,” the researchers
wrote. “Progress in those technologies can tip the
scales in favor of either offense or defense, and it is
not always clear beforehand which side will benefit
more.”
23
The Best Defense Against Cyber
Threats Is a Strong Offense
An interview with Marty DeConcilis, Vice President,
Federal Sales and Engineering, Fidelis Cybersecurity
In today’s highly contested cyber environments, “Real-time insight is essential to quickly detect and
agencies must be faster and smarter than even the investigate threats and prevent sessions that violate
most sophisticated adversary. Retroactive analysis policies,” said DeConcilis. “You need deep, contextual
and periodic scans aren’t enough. And even with the analysis of data movement in real time to spot and
best tools, you must assume that attackers will — or stop risks.”
already did — find their way in. Only a proactive cyber
defense will help you stop attackers early enough Outmaneuver the Attackers
in the kill chain so that threats don’t become costly Post-breach technologies that put you back in control
incidents. In other words, you need to put your cyber of your environment, including deception and active
defenders back on the offensive. threat detection, are imperative to cyber resilience.
Deception technology changes the attack surface and
“A proactive cyber defense is essential to winning lures attackers into a contained area of your network.
the war against cyber threats,” said Marty DeConcilis Active threat detection works in conjunction with
of Fidelis Cybersecurity. "The first step is to fully DLP and deception to correlate alerts and provide
understand your environment, so that you can be strong, actionable conclusions about active threats.
prepared to detect, distract and defeat whatever This means fewer false positives and faster response
comes next." times.
Here are three strategies for proactive cyber defense. “With deception in place, defenders can hunt, detect
and defend with great speed and confidence. And
Understand Your Cyber Terrain active threat detection provides high-confidence
You must understand your environment better than
conclusions about attacks, including attack stages
your attacker. That means having visibility into all
and the tactics, techniques and protocols in use,”
traffic, and ongoing risk prioritization. Only then can
DeConcilis said. “Together, these solutions help stop
you identify potential attack vectors, isolate issues
active threats and prevent re-engagement.”
and resolve problems before they escalate.
Fidelis Elevate is an eXtended Detection and
“Once you have automated systems that continuously
Response (XDR) platform designed for proactive
discover, analyze and map your cyber terrain, you
cyber defense. It automates security operations
can put that intelligence to use and stay ahead of
across traditional network architectures and extends
adversaries,” DeConcilis said.
seamless security controls into the cloud, across all
network ports and protocols, and out to endpoints.
Follow the Data
Addressing cyber threats requires strong data loss With patented Deep Session Inspection and in-line
prevention (DLP). But in today’s hyper-connected decryption, Fidelis Elevate catches DLP risks other
environments, traditional DLP can’t keep up. True data tools miss, providing content with rich context.
protection requires a continuous understanding of Fidelis Elevate includes built-in deception and game-
data access and movement throughout your network changing active threat detection. This platform
— which is called network DLP. delivers cyber resilience that gives defenders
strategic advantages over evolving threats.
24
25
Governments CISA Coordinates
a National Effort
Find Strength The federal government has collaborated with state
governments on cybersecurity over the years. But the
in Numbers
National Defense Authorization Act (NDAA) of 2021
institutionalized those efforts by creating a network
of state coordinators under CISA’s purview.
26
DHS Extends States Create Cyber Fleets
Funding to Local Agencies Federal support and direction are essential, but states
Federal efforts also can help spur collaboration also need to run their own cyber defense vessels.
within states. That’s the hope for the State and Local
In February 2022, New York Gov. Kathy Hochul
Cybersecurity Grant Program and Tribal Cybersecurity
established the Joint Security Operations Center
Grant Program, as part of the Bipartisan
(JSOC) to unite local, state and federal response
Infrastructure Law.
efforts and data collection. It includes businesses that
With a historic $1 billion, the program funds agencies operate critical infrastructure, plus DHS, Emergency
for four years to address risks and strengthen Services, the New York State Police, the Metropolitan
security, particularly for critical infrastructure. CISA Transportation Authority, the Port Authority of New
and the Federal Emergency Management Agency will York and New Jersey, and other entities.
approve state plans, with committees comprised of
Qualified personnel from across New York staff JSOC,
cybersecurity representatives from counties, cities,
which is headquartered in Brooklyn, both in person
towns, public education and public health. States are
and virtually. Officials expect the center’s central
required to distribute at least 80% of the funding
view of threat data to make it easier to detect and
to local and rural communities and 3% to tribal
respond to emerging threats and to accelerate
governments, for new and existing programs.
remediation efforts.
At a 2022 conference of the National Association of
Other states, such as Illinois, North Carolina and Utah,
State Chief Information Officers, state participants
have established similar task forces that include their
were asked what a successful State and Local Cyber
state’s emergency management agencies, police, the
Grant Program would look like. One of the hallmarks of
National Guard and infrastructure partners.
a good program, they said, was that it would “[break]
down barriers between state and local government Cyber Care
and foster 'an inertia of collaboration'."
on the Global Landscape
But a holistic approach needs to go beyond the
public sector.
27
How to Isolate
the Weakest Link
An interview with Mike Rider, Senior Solutions Engineer, Menlo Security
If you think about it, there’s a fundamental disconnect Agencies can take a nuanced approach to restrict
between the concept of zero trust and the approach browsing. Some websites might be blocked fully, and
traditional security technology takes. others might be accessible, but in view-only mode.
Menlo Security’s solution enables agencies to create
As employees browse the internet or open email,
granular polices that define who can access what type
legacy solutions scan the content for potential threats
of file in what mode.
before allowing access. That’s not zero trust. That’s
“innocent until proven guilty.” Security at Speed
If you take zero trust seriously, you will treat all Of course, if airport security worked the same way, no
content as if it’s malicious, whether you detect a one would make their flight. But that’s not a problem
threat or not. with isolation technology, said Rider.
That’s the mindset behind isolation technology, said For example, when the Defense Department (DoD)
Mike Rider of Menlo Security, which provides browser- adopted browser isolation, users saw a 50% reduction
and email-based isolation solutions. in load times of web content, according to the Defense
Information Systems Agency.
“With isolation, our default approach is that all
content is malicious, and we treat it as such (i.e., That’s because under its old approach, security scans
never trust it),” Rider said. “Never let the end user happened at the department’s internet access points,
have access to it, but instead, always deliver to them which led to bandwidth congestion. Moving security to
a safe, sanitized version.” the cloud eliminated those chokepoints.
Browser isolation routes web traffic through a cloud- With isolation technology, “users can freely navigate
based remote browser where all content can be the web and make mistakes, which they will do,
activated in a safe environment. If nothing malicious without bringing risky content into an organization,”
is present, the content is passed on to the end user. Rider said.
28
Data Sheet
Cloud Security
Platform
Powered by an
Isolation Core™
Three things to know:
Empowering organizations with While recent work-from-anywhere
the essential Internet security policies have created more flexibility for
the world’s workers, they have also led
platform they need to eliminate to increased security vulnerabilities, as
threats and protect productivity. the browser is still the most common
attack vector.
to Bridge
layoffs at major tech firms — but salary remains a
stumbling block.
Workforce Gap
especially to younger workers.
Engineers $104K
$98K
30
Seek Talent Early and Often Grow Your Own
Accelerate your hiring pipeline and tap into it early. Finally, there’s the option of developing your own
That means internship, fellowship and other programs internal tech pipeline. Employers — both public and
that catch workers early in their careers, or even while private — have drastically reduced what they spend on
they’re still in training. training since 2000. That needs to change.
One such program is the Office of Personnel Developing good training programs can open your
Management (OPM)’s CyberCorps “Scholarship for options. You can bring in new hires who have the
Service,” which recruits young professionals in IT, potential to learn needed skills once on board, rather
industrial controls, and security for federal, state, local, than hold out for people already trained. And use
tribal and territorial governments. The scholarships, vendors’ professional services to train employees on
for up to three years of undergraduate or graduate specific technologies and applications.
study, require recipients to work in government for the
Taking advantage of the Federal Rotational Cyber
same number of years that they received the aid.
Workforce Program, under which cyber employees
Cities and states reach out to local institutions in work at other agencies for six months to a year, can
various ways. For instance, Kansas City, Missouri works help tech staff learn new skills.
with local universities by hiring graduate students to
You can also think of “rotations” to the private sector
help with city projects, and the students can stay on
as a way to upgrade skills. According to NSF’s Gardner,
after graduation if they choose. Washington, D.C., has
younger tech workers are unlikely to stay with the
a pilot program that trains inmates for Amazon Web
same employer for their whole career, so they might
Services Certified Cloud Practitioner certification,
not stay in a government job for life. But you can
giving them a chance at better jobs when they’re
entice them to return to government after time in the
released. The key is to be creative and take advantage
private sector by promoting a workplace that meets
of local resources.
their needs for flexibility and work-life balance.
You can also reduce barriers in the hiring process —
“Talent that we want is going to learn skills in different
for instance, by adopting OPM’s 45-day hiring model
places,” Gardner said. “We say the best employee
and replacing academic requirements with skills-
is one that can go from one agency to another, and
based ones. For federal agencies seeking cyber talent,
the best employee [now] is one that can go out of
OPM has the Cybersecurity Hiring Resource Hub,
government into industry and later come back in.”
which brings together information on incentives and
expedited application processes.
31
How to Get Ahead on
Vulnerability Management
An interview with Bill Harrod, Chief Technology Officer, Public Sector, Ivanti
At some point, security becomes all about the math. Change the Equation
Every device you connect to the network becomes Back in the days when networks had a relatively
another potential security vulnerability. And the more stable number of devices, the security team tended to
vulnerabilities you have, the harder it is to sort out keep tabs on vulnerabilities using a spreadsheet. But
what to tackle and when. with the proliferation of connected devices, “trying
to manage it with a spreadsheet is just a losing
That's always been the case. What's new is how the proposition,” Harrod said.
devices have proliferated over the last several years,
in large part because of remote and now hybrid work. Here are three areas in which automation can change
the equation:
“Think about it: There are, maybe, several hundred
thousand potential vulnerabilities on a network,” • Identifying and assessing devices and other IT
said Bill Harrod at Ivanti, which provides risk-based assets in real time, including all hardware and
vulnerability management solutions. “Where do you software on premises, in the cloud and at the edge
go first? How do you do the patching to keep up with • Correlating that inventory with threat intelligence
zero-day attacks and critical security vulnerabilities?” and other security data to prioritize
remediation efforts
Map Your Threat Landscape
The first step toward answering that question is to • Testing, deploying and validating patches, and
identify those vulnerabilities. ensuring that patch deployments have minimal
impact on your employees and system workloads
It's not enough to know what devices are on the
network. You also need insight into the status of Keep the Employee in Mind
every device: Is it compliant with your security If security had one objective — to protect systems and
policies? What software does it run, and exactly data — you could just lock users out of the network
what components are part of that software? Is that and call it a day. But the real goal, said Harrod, is to
software up to date on its patches? Have security “make it as easy as possible for people to do their
controls been altered? And so on. jobs and be secure at the same time.”
The next step is to understand the risk involved. Every In fact, he said, a 2022 survey by Ivanti found that
misconfigured system, outdated software or missing 40% of respondents would consider changing jobs if
patch represents a vulnerability. But to what extent they couldn’t access the tools they need, such as a
is that vulnerability likely to be exploited, and what mobile device.
damage might be done?
Ivanti provides risk-based vulnerability management
That discovery process must be continuous as new and related tools that enable organizations to provide
devices are connected, the status of existing devices that user experience without compromising security,
changes (e.g., new patches must be applied or Harrod said.
software must be updated) and new threats emerge.
32
Ensure peace of mind,
everywhere your
business works.
Our security solutions provide the highest
barrier you can get against threats,
giving you the power to protect your
business—everywhere.
Ivanti Discovery
www.ivanti.com
33
!
Automate. Given both the volume and velocity of tasks, there's no way that cyber experts can keep pace with
threats without automation.
Build the cyber workforce. Build it every which way: Recruit young talent, upskill existing staff and hire seasoned
professionals. Whatever it takes.
Keep tabs on CISA. The cyber agency is spearheading the development of advanced cyber strategies and
solutions. Follow its lead wherever possible.
Don't go it alone. Collaborate with other agencies or organizations to build cyber intelligence and develop cyber
best practices.
Get serious about zero trust. Zero trust has become a bit of a buzz word, but it remains one of the best
approaches to securing applications and data.
Secure non-traditional tech. Any device that's hooked up to the internet is at risk. The problem is that many IoT-
type devices do not come with security features, leaving your network vulnerable.
34
About GovLoop
GovLoop’s mission is to inspire public sector
professionals by serving as the knowledge
network for government. GovLoop connects
more than 300,000 members, fostering cross-
government collaboration, solving common
problems and advancing government careers.
GovLoop is headquartered in Washington, D.C.,
with a team of dedicated professionals who
share a commitment to the public sector.
Thank You
Thank you to Aqua Security, Fidelis
Cybersecurity, Ivanti, Menlo Security, and
OpenText Cybersecurity for their support
of this valuable resource for public
sector professionals.
Authors
John Monroe, Director of Content
Designer
Marc Tom, Junior Graphic Designer