Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


// // //
10:00 AM
Shawn Henry
Shawn Henry
Connect Directly
E-Mail vvv

Bolstering Our Nation's Defenses Against Cybersecurity Attacks

Shawn Henry, former Executive Assistant Director of the FBI and current CrowdStrike president of services and CSO, shares the top three cybersecurity priorities that the Biden administration needs to address.

For the cybersecurity community at large, 2020 was one of the most active years in recent memory. The COVID-19 pandemic provided the perfect nesting ground for social engineering attacks from e-crime actors and targeted intrusions from nation-state adversaries. In fact, the number of intrusions that CrowdStrike detected in the first half of 2020 quickly surpassed the number of intrusions observed throughout all of 2019. In both the private and public sectors, attack surfaces grew exponentially as entire organizations and agencies moved to remote work. Often, government agencies were in the crosshairs of state-sponsored adversaries, who were incentivized to infiltrate networks to steal valuable data on vaccine research and government response plans to the pandemic.

Unfortunately, we cannot turn back the clock, and adversaries are continuing to advance their tactics, techniques, and procedures (TTPs), becoming increasingly brazen and stealthy. In the wake of recent events, one thing is abundantly clear — defending against breaches in the evolving threat landscape is of the utmost importance to national security. The Biden administration must make cybersecurity a clear-cut priority. Strategy should include further deterring nation-state adversaries, establishing a national cybersecurity lead quickly, and opening communication between private and public sectors to successfully secure our nation's critical assets.

Related Content:

What a Federal Data Privacy Law Would Mean for Consumers

Special Report: How Data Breaches Affect the Enterprise

New From The Edge: How to Build a Resilient IoT Framework

1. Deter Nation-State Intrusions
The first step to averting nation-state threats against the United States is recognizing their true intent and motivation. According to CrowdStrike's "2021 Global Threat Report," threat actors from China, Russia, Iran, North Korea, India, Pakistan, and Vietnam pursued objectives this year that were related to strategic national security and espionage priorities dictated by their respective states. For example, in the past year, nation-state adversaries performed devastating attacks on supply chains, COVID-19 research facilities, and more without any immediate repercussions. Attribution of adversaries, when done correctly, can be a powerful deterrence tool. Similar to how the FBI profiles a criminal, we must understand the various adversary groups and their practices, tradecraft, and TTPs to get a clear picture of how to stop them.

Recently, the Biden administration has taken action against some of the more active threat actors through the indictments of three North Korean government officials. A more proactive approach must be taken to defend our government and global critical infrastructure against malicious activity. This proactive approach starts with clearly and publicly defining boundaries through cybersecurity policy, regulations, and sanctions that provide immediate consequences for campaigns waged against the United States. Without deterrents like these, threat actors will become increasingly active, with attempts to breach the election system, disseminate misinformation, and target our nation's critical infrastructure.

2. Establish a Cyber Executive
To lay the foundation for an effective national cybersecurity strategy, the Biden administration has taken the important first step of appointing a deputy national security adviser in charge of cyber and emerging technology. Anne Neuberger will be responsible for upholding a standard of federal security practices and priorities that will properly safeguard our government from malicious threat actors. While this appointment is necessary, it's just the first step, as the administration must establish a dedicated cybersecurity executive.

This cabinet-level position should have responsibility and authorization to coordinate this issue across all federal government agencies. The cybersecurity executive would oversee policy, budget, and the implementation and execution of a comprehensive national cybersecurity strategy to protect and defend the US public and private sectors. It will be vital for the cybersecurity executive to coordinate with the national security adviser, with a direct line to the president to keep cybersecurity highlighted as a significant national security priority.

The cybersecurity executive must be an advocate for the cutting-edge technology required to detect and prevent sophisticated adversary capabilities, moving quickly from outdated legacy technology and towards technology that provides near-real-time visibility and speed to remediation. The cybersecurity executive must also embrace modern approaches to cybersecurity, exploring threat hunting, zero trust, and extended detection and response (XDR) models to help government agencies stay one step ahead of evolving threats. These strategies and others must be coordinated across government agencies, with policies and processes consistently applied strategically and efficiently.

3. Increase Collaboration Between Private and Public Sectors
Along the lines of increased coordination across government agencies, there needs to be more actionable intelligence sharing between the public and private sectors. During the recent supply chain attacks, threat actors exploited limitations in outdated authentication architecture to gain access to both private and public sector organizations downstream. Visibility into activity in those processes was greatly limited, which allowed the threat actors to move undetected for an extended period of time.

Private-sector cybersecurity companies are responsible for driving cybersecurity innovation through cloud adoption, zero-trust models, and other means, and they have the in-depth intelligence and experience from the front lines that provides invaluable insights for organizations to protect themselves. Absent effective lines of communication between the two sectors, critical intelligence to both defend networks and identify and disrupt our adversaries will be lost. One cannot properly take a risk-informed approach to defense, one that goes beyond technology to a more holistic strategy including people, process, and technology without actionable intelligence. The adversaries, too, operate in perpetuity, unhindered, without a deterrence strategy that requires actionable intelligence for attribution.

Cyberattacks from nation-state adversaries and cybercriminals have become a prominent threat to our nation's security and infrastructure. As the cybersecurity landscape evolves, threat actors will continue to find new, advanced ways of breaching government networks to claim their victory. Bolstering our national security strategy with priorities such as these will allow us to take more proactive and immediate actions against our foes.

Shawn Henry serves as the president of CrowdStrike services, leading a world-class team of cybersecurity professionals in investigating and mitigating targeted attacks on corporate and government globally. Shawn's work includes educating boards of directors and executives of ... View Full Bio
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The Promise and Reality of Cloud Security
Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises. The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-01-31
In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. Therefore, the paramete...
PUBLISHED: 2023-01-31
ubireader_extract_files is vulnerable to path traversal when run against specifically crafted UBIFS files, allowing the attacker to overwrite files outside of the extraction directory (provided the process has write access to that file or directory). This is due to the fact that a node name (dent_no...
PUBLISHED: 2023-01-31
A path traversal vulnerability affects jefferson's JFFS2 filesystem extractor. By crafting malicious JFFS2 files, attackers could force jefferson to write outside of the extraction directory.This issue affects jefferson: before 0.4.1.
PUBLISHED: 2023-01-31
A path traversal vulnerability affects yaffshiv YAFFS filesystem extractor. By crafting a malicious YAFFS file, an attacker could force yaffshiv to write outside of the extraction directory. This issue affects yaffshiv up to version 0.1 included, which is the most recent at time of publication.
PUBLISHED: 2023-01-31
Incorrect Authorization vulnerability in Apache Software Foundation Apache IoTDB.This issue affects the iotdb-web-workbench component from 0.13.0 before 0.13.3. iotdb-web-workbench is an optional component of IoTDB, providing a web console of the database. This problem is fixed from version 0.13.3 o...