Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

// // //
4/14/2021
10:00 AM
Shawn Henry
Shawn Henry
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv

Bolstering Our Nation's Defenses Against Cybersecurity Attacks

Shawn Henry, former Executive Assistant Director of the FBI and current CrowdStrike president of services and CSO, shares the top three cybersecurity priorities that the Biden administration needs to address.

For the cybersecurity community at large, 2020 was one of the most active years in recent memory. The COVID-19 pandemic provided the perfect nesting ground for social engineering attacks from e-crime actors and targeted intrusions from nation-state adversaries. In fact, the number of intrusions that CrowdStrike detected in the first half of 2020 quickly surpassed the number of intrusions observed throughout all of 2019. In both the private and public sectors, attack surfaces grew exponentially as entire organizations and agencies moved to remote work. Often, government agencies were in the crosshairs of state-sponsored adversaries, who were incentivized to infiltrate networks to steal valuable data on vaccine research and government response plans to the pandemic.

Unfortunately, we cannot turn back the clock, and adversaries are continuing to advance their tactics, techniques, and procedures (TTPs), becoming increasingly brazen and stealthy. In the wake of recent events, one thing is abundantly clear — defending against breaches in the evolving threat landscape is of the utmost importance to national security. The Biden administration must make cybersecurity a clear-cut priority. Strategy should include further deterring nation-state adversaries, establishing a national cybersecurity lead quickly, and opening communication between private and public sectors to successfully secure our nation's critical assets.

Related Content:

What a Federal Data Privacy Law Would Mean for Consumers

Special Report: How Data Breaches Affect the Enterprise

New From The Edge: How to Build a Resilient IoT Framework

1. Deter Nation-State Intrusions
The first step to averting nation-state threats against the United States is recognizing their true intent and motivation. According to CrowdStrike's "2021 Global Threat Report," threat actors from China, Russia, Iran, North Korea, India, Pakistan, and Vietnam pursued objectives this year that were related to strategic national security and espionage priorities dictated by their respective states. For example, in the past year, nation-state adversaries performed devastating attacks on supply chains, COVID-19 research facilities, and more without any immediate repercussions. Attribution of adversaries, when done correctly, can be a powerful deterrence tool. Similar to how the FBI profiles a criminal, we must understand the various adversary groups and their practices, tradecraft, and TTPs to get a clear picture of how to stop them.

Recently, the Biden administration has taken action against some of the more active threat actors through the indictments of three North Korean government officials. A more proactive approach must be taken to defend our government and global critical infrastructure against malicious activity. This proactive approach starts with clearly and publicly defining boundaries through cybersecurity policy, regulations, and sanctions that provide immediate consequences for campaigns waged against the United States. Without deterrents like these, threat actors will become increasingly active, with attempts to breach the election system, disseminate misinformation, and target our nation's critical infrastructure.

2. Establish a Cyber Executive
To lay the foundation for an effective national cybersecurity strategy, the Biden administration has taken the important first step of appointing a deputy national security adviser in charge of cyber and emerging technology. Anne Neuberger will be responsible for upholding a standard of federal security practices and priorities that will properly safeguard our government from malicious threat actors. While this appointment is necessary, it's just the first step, as the administration must establish a dedicated cybersecurity executive.

This cabinet-level position should have responsibility and authorization to coordinate this issue across all federal government agencies. The cybersecurity executive would oversee policy, budget, and the implementation and execution of a comprehensive national cybersecurity strategy to protect and defend the US public and private sectors. It will be vital for the cybersecurity executive to coordinate with the national security adviser, with a direct line to the president to keep cybersecurity highlighted as a significant national security priority.

The cybersecurity executive must be an advocate for the cutting-edge technology required to detect and prevent sophisticated adversary capabilities, moving quickly from outdated legacy technology and towards technology that provides near-real-time visibility and speed to remediation. The cybersecurity executive must also embrace modern approaches to cybersecurity, exploring threat hunting, zero trust, and extended detection and response (XDR) models to help government agencies stay one step ahead of evolving threats. These strategies and others must be coordinated across government agencies, with policies and processes consistently applied strategically and efficiently.

3. Increase Collaboration Between Private and Public Sectors
Along the lines of increased coordination across government agencies, there needs to be more actionable intelligence sharing between the public and private sectors. During the recent supply chain attacks, threat actors exploited limitations in outdated authentication architecture to gain access to both private and public sector organizations downstream. Visibility into activity in those processes was greatly limited, which allowed the threat actors to move undetected for an extended period of time.

Private-sector cybersecurity companies are responsible for driving cybersecurity innovation through cloud adoption, zero-trust models, and other means, and they have the in-depth intelligence and experience from the front lines that provides invaluable insights for organizations to protect themselves. Absent effective lines of communication between the two sectors, critical intelligence to both defend networks and identify and disrupt our adversaries will be lost. One cannot properly take a risk-informed approach to defense, one that goes beyond technology to a more holistic strategy including people, process, and technology without actionable intelligence. The adversaries, too, operate in perpetuity, unhindered, without a deterrence strategy that requires actionable intelligence for attribution.

Cyberattacks from nation-state adversaries and cybercriminals have become a prominent threat to our nation's security and infrastructure. As the cybersecurity landscape evolves, threat actors will continue to find new, advanced ways of breaching government networks to claim their victory. Bolstering our national security strategy with priorities such as these will allow us to take more proactive and immediate actions against our foes.

Shawn Henry serves as the president of CrowdStrike services, leading a world-class team of cybersecurity professionals in investigating and mitigating targeted attacks on corporate and government globally. Shawn's work includes educating boards of directors and executives of ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.