Risk
4/26/2011
05:42 PM
50%
50%

Napolitano Calls Cybersecurity A Shared Responsibility

The Department of Homeland Security secretary stressed the federal government's involvement in securing cyberspace alongside private companies to mitigate threats to critical infrastructure.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
When security company RSA found itself the victim of a cyber attack recently, the Department of Homeland Security (DHS) was there working alongside the company and other law-enforcement agencies to mitigate the threat and ensure that other systems would not be threatened in the same way.

"We took our understanding of the tools, tradecraft, and techniques used by these malicious actors, and converted it into actionable information that … critical infrastructure sectors could use to employ mitigation measures that would lower their risk to the type of attack we saw at RSA," DHS Secretary Janet Napolitano said this week.

The move shows the department is ramping up its involvement with the private sector to secure cyberspace, an effort that is a "shared responsibility" of the federal government and technology companies alike, she said Monday, speaking at the University of California Berkeley College of Engineering. The text of her speech is posted online.

Likening cyberspace to a neighborhood, marketplace, or schoolyard, Napolitano said that the federal government sees it as a "civilian space." This idea informs how the DHS works to protect cyberspace by trying to keep critical infrastructure and its connections to that civilian space safe.

"This is not something we can do by ourselves," she said. "It requires a full range of partners--including other government agencies, the private sector, as well as individual users of the Internet."

To that end, Napolitano said the DHS is currently building a "technical ecosystem" based on its concept of cyberspace as a "distributed, civilian space," and also is creating a policy ecosystem to support that.

"I use the term 'ecosystem' intentionally--because cyberspace is a dynamic, constantly changing, even organic environment," she said. "We cannot treat it as static or self-contained."

The DHS is one of several federal agencies tasked with protecting not only federal cyberspace assets but also the U.S. critical infrastructure that powers the Internet against cyber attacks. To achieve the latter, the agency works closely with the private sector to share information about cyber attacks or potential threats to infrastructure.

The DHS also has been instrumental in setting guidelines for cybersecurity that organizations both inside and outside of government can follow, she said. Last month, the agency released a whitepaper setting out its "technical vision" for cybersecurity based on three principles--automation, interoperability, and authentication--showing how each can be applied to protect cyberspace.

The DHS also recently tested the inaugural National Cyber Incident Response Plan (NCIRP) it's developed during the CyberStorm III national exercise, which simulated a broadscale attack on the nation's critical infrastructure, she said. Cabinet agencies, 11 states, 12 international partners, and 60 private sector companies all participated in the exercise.

Napolitano's talk was part of a university speaking tour she's been doing to educate academia and the next generation of technology professionals on the DHS role in federal cybersecurity. Last month, she spoke at the Massachusetts Institute of Technology and urged scientists and engineers to help the DHS secure cyberspace.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0547
Published: 2015-07-04
The D2CenterstageService.getComments service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0548
Published: 2015-07-04
The D2DownloadService.getDownloadUrls service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0551
Published: 2015-07-04
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop 6.7SP1 before P31, 6.7SP2 before P23, and 6.8 before P01; Documentum Administrator 6.7SP1 before P31, 6.7SP2 before P23, 7.0 before P18, 7.1 before P15, and 7.2 before P01; Documentum Digital Assets Manager 6.5SP6 before P2...

CVE-2015-1966
Published: 2015-07-04
Multiple cross-site scripting (XSS) vulnerabilities in IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before FP17, 6.2.1 before FP9, and 6.2.2 before FP15, as used in Security Access Manager for Mobile and other products, allow remote attackers to inject arbitrary web script or HTML via a crafte...

CVE-2015-2964
Published: 2015-07-04
NAMSHI | JOSE 5.0.0 and earlier allows remote attackers to bypass signature verification via crafted tokens in a JSON Web Tokens (JWT) header.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report