Estonian Free PressEstonian Free Press
  • National Security
    • United States
    • United Kingdom
    • Europe
    • Estonia
    • Latvia
    • Lithuania
    • Moldova
    • Poland
    • Russia
    • Ukraine
  • Counterterrorism
  • Cybersecurity
  • Intelligence

Subscribe to Updates

Get the latest National Security News directly to your inbox.

What's Hot

Partygate cover-up? Accusers ‘out of their minds’, says Boris Johnson

February 1, 2023

Filat îi dă un sfat lui Dragalin: Nu este normal să umble prin studiouri

February 1, 2023

Grosu, despre vinderea terenurilor companiilor străine: E o minciună

February 1, 2023
Facebook Twitter Instagram
  • Privacy Policy
  • Terms and Conditions
  • Contact
Wednesday, February 1
Estonian Free PressEstonian Free Press
  • National Security
    • United States
    • United Kingdom
    • Europe
    • Estonia
    • Latvia
    • Lithuania
    • Moldova
    • Poland
    • Russia
    • Ukraine
  • Counterterrorism
  • Cybersecurity
  • Intelligence
en English
en Englishet Estonianlv Latvianlt Lithuanianpl Polishro Romanianru Russianuk Ukrainian
Trending
  • Partygate cover-up? Accusers ‘out of their minds’, says Boris Johnson
  • Filat îi dă un sfat lui Dragalin: Nu este normal să umble prin studiouri
  • Grosu, despre vinderea terenurilor companiilor străine: E o minciună
  • Japan’s Wheeled Vehicle Programmes Race for the Finish Line
  • Protection Racket
  • American Rheinmetall and GM Defense Contracted for the US Army’s Common Tactical Truck Programme
  • CEC prezintă numărul de alegători înscriși în Registru la 1 februarie
  • Austria’s far-right Freedom Party regains national momentum
Subscribe
Facebook Twitter Instagram
Estonian Free PressEstonian Free Press
Home » You Can’t Protect What You Don’t Know: The Future of Information Sharing

You Can’t Protect What You Don’t Know: The Future of Information Sharing

October 7, 20224 Mins Read Cybersecurity
Share
Facebook Twitter LinkedIn Pinterest Email

Cybersecurity is about being one step ahead of attackers. But how is that possible without information?

One of the holes in the federal government’s cybersecurity posture was the lack of a formal information sharing process between agencies. It’s not unique to government, as the private sector has been battling its own issue with information sharing. However, the government has taken concrete steps recently to rectify the situation.

In March, President Joe Biden signed the Cyber Incident Reporting for Critical Infrastructure Act into law, which was included in an omnibus appropriations bill. With the specter of high-profile cyber-attacks on critical infrastructure and concern of retaliation in the wake of Russia’s invasion of Ukraine, the House and Senate approved the legislation after similar bills had failed in recent years.

The legislation creates two new reporting obligations for critical infrastructure. First, certain cyber incidents must be reported to the Cybersecurity and Infrastructure Security Agency (CISA) of the U.S. Department of Homeland Security (DHS) within 72 hours. Second, any ransomware payments must be reported in a similar manner within 24 hours. The Act also expands the reporting obligations of covered entities and CISA’s role with respect to cyber reporting initiatives, the rulemaking process, and information sharing among federal agencies.

While it’s too early to evaluate how these obligations will change information sharing, it’s a promising sign that we’re moving in that direction. It’s important because it will allow a broader viewpoint for all agencies to understand and identify all attack vectors.

One of the first laws in cybersecurity is that you need to know your assets. Simply put, you can’t protect what you don’t know about it. Without insight into your assets and where attacks are coming from, cyber leaders are flying blind in terms of figuring out how to best protect their critical information from current and future attacks.

With information sharing, it becomes easier for agency leaders to respond in more effective ways. This information will help in putting the missing puzzle pieces together so the attack patterns are readily visible, and leaders can understand what is being targeted and the commonalities between attacks. If one agency in Virginia, as an example, is under attack, that information being shared with other agencies that conduct similar business would be invaluable in preparing for and anticipating future attacks.

This is not a new concept, and we’ve seen information sharing become more prominent in industry, particularly on Wall Street. The Securities and Exchange Commission (SEC) passed a rule for investors that publicly traded companies have to share information about incidents like ransomware, so other companies are aware and can prepare for similar attacks. The SEC did this because they want to protect the average investor, because they deserve to know if a company is being breached repeatedly and paying out ransomware.

As we look to the future of cybersecurity, there is consensus among experts that the rate and sophistication of attacks will only increase. We’ve already seen the impacts of the COVID-19 pandemic on cybersecurity, as more employees working from more remote locations opened up a whole new avenue for cyber-attacks.

There is no one-size-fits-all approach for cyber, so these capabilities need to span the full gamut of what agencies need. This includes building cyber programs, supporting cyber information sharing between agencies, engineering new cyber tools, and enabling world-class cyber operations by utilizing automation and orchestration techniques.

The cyber attacks are going to continue; there is no getting around that. Thus, it becomes incumbent on agency leaders to ensure their cyber policies are updated and prepared for anything that may come their way. Still, this process does not succeed without information.

The path forward for cybersecurity across federal agencies is lined by information sharing. That knowledge on previous attacks, including their origin and breadth, will allow all agencies to continuously update and modernize their cyber posture to prevent future attacks.

Cybersecurity is always a work in progress because the attackers are constantly improving and evolving their methods. Federal agencies need to be improving and evolving in response. Information sharing is vital to making that happen.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email

Articles Liés

EU Council moves to adjust product lifecycle, reporting in new cybersecurity law

January 31, 2023 Cybersecurity

EU countries seek way out of impasse on sovereignty requirements for cloud services

January 30, 2023 Cybersecurity

Joint Cyber Defense Collaborative Announces 2023 Planning Agenda

January 27, 2023 Cybersecurity

CISA, NSA, and MS-ISAC Release Advisory on the Malicious Use of RMM Software

January 27, 2023 Cybersecurity

Mayorkas and European Union Commissioner for Internal Market Breton Meet on Cyber Resilience Cooperation

January 27, 2023 Cybersecurity

Coast Guard Releases New Guide to Help Maritime Cybersecurity Assessments

January 27, 2023 Cybersecurity
Don't Miss
Moldova

Filat îi dă un sfat lui Dragalin: Nu este normal să umble prin studiouri

By woe whFebruary 1, 20230

Vlad filat s-a arătat indignat de obiceiul unor procurori și judecători de a da curs…

Grosu, despre vinderea terenurilor companiilor străine: E o minciună

February 1, 2023

Japan’s Wheeled Vehicle Programmes Race for the Finish Line

February 1, 2023

Protection Racket

February 1, 2023
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Our Picks

CEC prezintă numărul de alegători înscriși în Registru la 1 februarie

February 1, 2023

Austria’s far-right Freedom Party regains national momentum

February 1, 2023

Boris Johnson criticises Rishi Sunak decision not to give Ukraine fighter jets

February 1, 2023

No 10 ‘knew about Raab bullying claims’ as three top civil servants give evidence

February 1, 2023

Subscribe to Updates

Get the latest National Security News directly to your inbox.

© 2023 Estonian Free Press. All rights reserved.
  • Privacy Policy
  • Terms and Conditions
  • Contact

Type above and press Enter to search. Press Esc to cancel.