Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

Policy Group Calls for Public-Private Cyber-Defense Program

The proposed National Cyber Response Network would link federal agencies, companies, and local governments, allowing collaboration during a cyberattack.

Creating plausible scenarios of cyberattacks launched by nations such as China or Iran, or by domestic terrorists and hacktivists, a policy group has concluded that too many roadblocks hinder the effective response to a major attack on US government agencies or private industry. 

In a report published last week, the New York Cyber Task Force (NYCTF) — a group of policy makers, private industry, and consultants — recommended that the United States create a National Cyber Response Network, linking together existing government and industry groups into collaborative network that could speed response to any attack. The task force, sponsored by Columbia University's School of International and Public Affairs (SIPA), brings together government cyber experts, policymakers, and private industry professionals to address the national cybersecurity challenges that the United States will face in the future.

Related Content:

Cyberspace Solarium Commission Slams US Cybersecurity Readiness

Special Report: How IT Security Organizations Are Attacking the Cybersecurity Problem

New From The Edge: Cybercrime 'Help Wanted': Job Hunting on the Dark Web

The group concluded that the US is not prepared to effectively respond to a national cyber crisis, says Gregory Rattray, the executive director of the NYCTF and co-founder and partner at cyber consultancy Next Peak.

"We need to make ourselves more resilient," he says. "We know, in terms of policy, that we have to break down a lot of barriers for the private sector to work with the government, and both sides need to really invest in cyber in a serious way."

The report notes that interconnected devices and machine learning are becoming pervasive, with broadband Internet delivered from space, next-generation cellular networks, and artificial intelligence all being integrated into society's technological fabric. In a previous study published by the group, they focused on technologies and policies that could benefit cyber defenders. 

The latest report, published on Feb. 26, outlines the challenges that remain, created four scenarios of possible disruptive attacks, and outlined five recommendations, including the creation of the National Cyber Response Network (NCRN) managed by an agency that will be designated by the cabinet-level National Cyber Director. 

A number of recent attacks underscore the need for such an effort, from the massive supply chain compromise involving SolarWinds software to the relatively unsophisticated water-treatment plant hack, says Rattray.

"If we are going to withstand a cyberattack, we are going to have to invest an order of magnitude more in all the things that are necessary to be able to respond as a nation — both private sector and public — when an adversary unleashes what is clearly technically possible," he says. "If the Russians sent a disruptive command using the access that they had through the SolarWinds software, stuff would have crumbled all over the place."

The New York Cyber Task Force created four scenarios and created exercises to test the potential responses. The scenarios included Iran attacking local critical infrastructure to increase pressure on US policymakers, China hobbling technology industries, and domestic protestors using disruptive attacks. An important contribution of the NYCTF was testing some of the core recommendations of the Cyberspace Solarium Commission, particularly those that focused on public-private collaboration. 

"The fact that the task force's rigorous process validated those recommendations only further reinforces the critical importance of improving how the US government works with the private sector on shared cyber threats," Erica Borghard, senior fellow with the New American Engagement Initiative at the Atlantic Council's Scowcroft Center for Strategy and Security, said in a statement issued with the report. "It also demonstrates the urgency of nominating a National Cyber Director and empowering that position to be the focal point within the Federal government for collaboration with the private sector."

The United States also needs to take a more aggressive approach to undermining the capabilities of attackers before those capabilities are used in an attack, Rattray says. The ability of adversaries to attack the national and commercial infrastructures without resistance needs to change, he says. 

"The Solarium Commission, if you read their recommendations on the offensive side of things, they get it right," he says. "We need to use our ability to move outside of our own cyberspace to make it hard to attack us. We need to disrupt the setup and execution of an adversary's ability to put us at risk. That is different than proactively attacking others."

The report assumes a slow international escalation of tensions in cyberspace. For companies hoping that nations will develop some international treaty setting norms for cyberspace, it's time to face reality, Rattray says.

"If you are a defender, you have to assume that norms are not going to save you," he says. "That, if the US irritates an adversary, and you are a US company ... some adversaries might come after you as a way of forcing the hand of the United States."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-14
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could allow unauthorized access to the driver's device object.
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could cause systems to experience a blue screen error.