Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

Policy Group Calls for Public-Private Cyber-Defense Program

The proposed National Cyber Response Network would link federal agencies, companies, and local governments, allowing collaboration during a cyberattack.

Creating plausible scenarios of cyberattacks launched by nations such as China or Iran, or by domestic terrorists and hacktivists, a policy group has concluded that too many roadblocks hinder the effective response to a major attack on US government agencies or private industry. 

In a report published last week, the New York Cyber Task Force (NYCTF) — a group of policy makers, private industry, and consultants — recommended that the United States create a National Cyber Response Network, linking together existing government and industry groups into collaborative network that could speed response to any attack. The task force, sponsored by Columbia University's School of International and Public Affairs (SIPA), brings together government cyber experts, policymakers, and private industry professionals to address the national cybersecurity challenges that the United States will face in the future.

Related Content:

Cyberspace Solarium Commission Slams US Cybersecurity Readiness

Special Report: How IT Security Organizations Are Attacking the Cybersecurity Problem

New From The Edge: Cybercrime 'Help Wanted': Job Hunting on the Dark Web

The group concluded that the US is not prepared to effectively respond to a national cyber crisis, says Gregory Rattray, the executive director of the NYCTF and co-founder and partner at cyber consultancy Next Peak.

"We need to make ourselves more resilient," he says. "We know, in terms of policy, that we have to break down a lot of barriers for the private sector to work with the government, and both sides need to really invest in cyber in a serious way."

The report notes that interconnected devices and machine learning are becoming pervasive, with broadband Internet delivered from space, next-generation cellular networks, and artificial intelligence all being integrated into society's technological fabric. In a previous study published by the group, they focused on technologies and policies that could benefit cyber defenders. 

The latest report, published on Feb. 26, outlines the challenges that remain, created four scenarios of possible disruptive attacks, and outlined five recommendations, including the creation of the National Cyber Response Network (NCRN) managed by an agency that will be designated by the cabinet-level National Cyber Director. 

A number of recent attacks underscore the need for such an effort, from the massive supply chain compromise involving SolarWinds software to the relatively unsophisticated water-treatment plant hack, says Rattray.

"If we are going to withstand a cyberattack, we are going to have to invest an order of magnitude more in all the things that are necessary to be able to respond as a nation — both private sector and public — when an adversary unleashes what is clearly technically possible," he says. "If the Russians sent a disruptive command using the access that they had through the SolarWinds software, stuff would have crumbled all over the place."

The New York Cyber Task Force created four scenarios and created exercises to test the potential responses. The scenarios included Iran attacking local critical infrastructure to increase pressure on US policymakers, China hobbling technology industries, and domestic protestors using disruptive attacks. An important contribution of the NYCTF was testing some of the core recommendations of the Cyberspace Solarium Commission, particularly those that focused on public-private collaboration. 

"The fact that the task force's rigorous process validated those recommendations only further reinforces the critical importance of improving how the US government works with the private sector on shared cyber threats," Erica Borghard, senior fellow with the New American Engagement Initiative at the Atlantic Council's Scowcroft Center for Strategy and Security, said in a statement issued with the report. "It also demonstrates the urgency of nominating a National Cyber Director and empowering that position to be the focal point within the Federal government for collaboration with the private sector."

The United States also needs to take a more aggressive approach to undermining the capabilities of attackers before those capabilities are used in an attack, Rattray says. The ability of adversaries to attack the national and commercial infrastructures without resistance needs to change, he says. 

"The Solarium Commission, if you read their recommendations on the offensive side of things, they get it right," he says. "We need to use our ability to move outside of our own cyberspace to make it hard to attack us. We need to disrupt the setup and execution of an adversary's ability to put us at risk. That is different than proactively attacking others."

The report assumes a slow international escalation of tensions in cyberspace. For companies hoping that nations will develop some international treaty setting norms for cyberspace, it's time to face reality, Rattray says.

"If you are a defender, you have to assume that norms are not going to save you," he says. "That, if the US irritates an adversary, and you are a US company ... some adversaries might come after you as a way of forcing the hand of the United States."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: click on all the semaphores 
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-22
Bad validation logic in the Dart SDK versions prior to 2.12.3 allow an attacker to use an XSS attack via DOM clobbering. The validation logic in dart:html for creating DOM nodes from text did not sanitize properly when it came across template tags.
PUBLISHED: 2021-04-22
FusionAuth fusionauth-samlv2 before 0.5.4 allows XXE attacks via a forged AuthnRequest or LogoutRequest because parseFromBytes uses javax.xml.parsers.DocumentBuilderFactory unsafely.
PUBLISHED: 2021-04-22
Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.
PUBLISHED: 2021-04-22
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. Its AbuseFilterCheckMatch API reveals suppressed edits and usernames to unprivileged users through the iteration of crafted AbuseFilter rules.
PUBLISHED: 2021-04-22
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. A MediaWiki user who is partially blocked or was unsuccessfully blocked could bypass AbuseFilter and have their edits completed.