04:40 PM

Why Cybersecurity Partnerships Matter

The public and private sectors must collaborate in new ways to ward off dangerous threats to critical systems and IT infrastructure.

Cybersecurity Codified

Lawmakers have been tilting at that windmill for years. A comprehensive bill, the Protecting Cyberspace as a National Asset Act of 2010, is working its way through Congress. The bill would give the president authority to institute measures to protect telecommunications networks, the electric grid, financial systems, and other critical control systems in the event of a national emergency. Such presidential authority would be temporary, limited to 30-day increments, but broad, and critics complain that the legislation contains an "Internet kill switch." The senators behind the bill refute that characterization, but the controversy speaks to the sensitivity around government influence over systems and networks used by the public. Other pending legislation with implications for business are the International Cyberspace and Cybersecurity Coordination Act and the Cybersecurity Enhancement Act.

Not surprisingly, the tech industry and many businesses would rather see such changes driven by incentives than by new rules and regulations. A coalition of industry groups--the Business Software Alliance, Center for Democracy and Technology, Internet Security Alliance, TechAmerica, and U.S. Chamber of Commerce--recently released a report that argued for letting companies voluntarily adopt best practices in cybersecurity rather than have them mandated by government.

"There is concern that new policy initiatives may consider replacing the current model with an alternate system more reliant on government mandates directed at the private sector," the white paper states. "This change of direction would both undermine the progress that has been made and hinder efforts to achieve lasting success." The report presents recommendations in seven areas, including information sharing and incident management, to advance cybersecurity through public-private partnerships.

One trend that could directly lead to more secure public IT infrastructure is the government's push into cloud computing. Federal CIO Vivek Kundra is calling on federal agencies to make increased use of software as a service and other cloud services, but before that happens, those services must meet federal security requirements. That presents a tremendous opportunity for the government to leverage its buying power to prompt cloud service providers to establish more attack-proof and resilient data centers and processes. Businesses and consumers stand to benefit from any such improvements, since they tap into the same cloud infrastructure.

Business and government IT and security pros must seize such opportunities because the threats are growing in number and severity. Information sharing has been an important first step, but it's what happens next that will make or break efforts to develop a more robust computing infrastructure.

Erik Bataller is senior security consultant with Chicago-based risk management consultancy Neohapsis. Write to us at [email protected].

Continue to the sidebar:
How Wall Street Works With The Feds

4 of 4
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.