Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/10/2019
10:00 AM
Todd Weller
Todd Weller
Commentary
50%
50%

How We Collectively Can Improve Cyber Resilience

Three steps you can take, based on Department of Homeland Security priorities.

At the 2019 RSA Conference earlier this year, Chris Krebs, director of the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA), outlined several key priorities the agency is focused on for protecting US critical infrastructure. The US government is at the forefront when it comes to cybersecurity trends, so being aware of its focus can help private sector organizations improve cyber situational awareness and reduce risk.

Protecting Networks and Data from Nation-State Actors
CISA watches the usual suspects: Russia, China, Iran, and North Korea. Its key focus here is supply chain risk and minimizing the government's attack surface by keeping what it views to be risky vendors' equipment and applications out of US critical infrastructure networks.

In 2018, the US government banned technology from Russia-based Kaspersky Labs. With a heavy focus on China and 5G, it is now heavily focused on Huawei. Overall, the government is concerned that technology equipment from perceived risky foreign vendors could be used for malicious purposes.

Another area of focus is foreign VPN applications and, specifically, China-based applications from Dolphin, Opera, and Yandex.

Collective Cyber Defense
Krebs also discussed the importance of "collective cyber defense." A key issue here is that we can't fight the cyber battle alone. He indicated that multiple stakeholders have some piece of information about what's going on — whether that's a specific threat; tactics, techniques, and procedures; and/or vulnerabilities. It is critical that threat information is shared in a timely and practical way, and it's hard to get the maximum effect if this information is sitting in a limited number of hands.

On a broad basis, with collective cyber defense, CISA is refining its Automated Indicator Sharing (AIS) program to include more context and specificity in order to provide more value-added threat intelligence to the private sector. 

Election security is another area in which CISA is facilitating collective defense. CISA facilitated the signing up over 1,400 local jurisdictions to the recently formed Elections Infrastructure ISAC in just a nine-month period. CISA also facilitated the deployment of intrusion detection and prevention sensors, with these now covering 90% of elections infrastructure (based on votes cast), up from 32% in 2016.

Key Takeaways
Based on CISA's focus, there are three key things that private sector organizations can do to improve their cyber operations:

1. Increase your focus on supply chain and third-party risk. Third-party risk is a key area in security, and many large security organizations have established dedicated organizations in this area. All organizations should make moves to assess and manage this risk. This includes risks related to technology platforms that are powering your business as well as risks related to the various third-party entities with which you do business.

2. Revisit some basics regarding attack surface reduction. One easy step is to limit the use of technology from "questionable" vendors. Revisit the "who" and "what" is on your network and "whether" they should be on there. For example, if you aren't doing business with Russia, don't allow traffic from Russia on your network. Of course, given the global nature of business and computing, that's not that easy for many companies, but advanced filtering capabilities like dynamic whitelisting can allow you to block traffic from a country by default while allowing access from trusted sources, such as Office 365, Amazon Web Services, content delivery networks, etc.

3. Expand your usage of threat intelligence and information sharing to benefit from collective defense.Today's cyber threat environment requires a broader view of attacker activity than any one entity or cybersecurity vendor can provide. Expanding your use of threat intelligence can improve your cyber situational awareness and reduce risk. Easy steps here range from incorporating high-quality open source threat intelligence sources to joining DHS's AIS program to consuming and sharing threat information with industry peers through sharing communities (information-sharing and analysis centers and organizations).

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Todd Weller, Chief Strategy Officer at Bandura, works with large organizations in acting on their threat intelligence to prevent future attacks. He brings over 20 years of cybersecurity industry experience with a unique blend of operational and hands-on proficiency. He ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Windows 10 Migration: Getting It Right
Kevin Alexandra, Principal Solutions Engineer at BeyondTrust,  5/15/2019
Baltimore Ransomware Attack Takes Strange Twist
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/14/2019
When Older Windows Systems Won't Die
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12184
PUBLISHED: 2019-05-19
There is XSS in browser/components/MarkdownPreview.js in BoostIO Boostnote 0.11.15 via a label named flowchart, sequence, gallery, or chart, as demonstrated by a crafted SRC attribute of an IFRAME element, a different vulnerability than CVE-2019-12136.
CVE-2019-12173
PUBLISHED: 2019-05-18
MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.
CVE-2019-12172
PUBLISHED: 2019-05-17
Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
CVE-2019-12168
PUBLISHED: 2019-05-17
Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen.
CVE-2019-12170
PUBLISHED: 2019-05-17
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PH...