Agencies Report on Federal Cyber Progress and Outline Long-Term Threats

Lawmakers have explored avenues of action to help and protect the federal government’s virtual networks, primarily through the continued deployment of security software and a strong federal investment to protect sensitive U. S. data. USA

At a hearing hosted by the House Subcommittee on Cyber Security, Infrastructure Protection, and Innovation, witnesses from federal agencies at the forefront of a more powerful federal cybersecurity posture spoke about what their agencies have done and will want to have a secure government network.

“You’ll have to think of cybersecurity as along with all the other types of dangers addressed through organizations and leaders at the highest level,” said Charles Romine, director of the Information Technology Laboratory at the National Institute of Standards and Technology.

The heads of other agencies, adding the Corporate Services Administration and the Infrastructure Security and Cybersecurity Agency, discussed some of their existing ones to implement more powerful zero-trust protocols in federal systems.

David Shive, GSA’s lead data officer, explained that its efforts to modernize replaced legacy software systems will allow federal civilian users to interact with more secure authentication technologies.

“We are also accelerating our adoption of secure cloud facilities by leveraging modern cloud facilities to improve cybersecurity and user experience,” Shive said. and user data, as well as gain broad visibility across the GSA ecosystem with decorated features that leverage automation to manage compliance and respond to threats in real time. “

Shive added that sustained investment is critical to implementing more security and creating a zero-trust architecture within federal networks.

Securing federal agencies through network updating has also been a joint effort between the public and sectors, a key element of one of President Biden’s executive orders on strengthening the country’s cybersecurity defenses.

These strategic relationships aim to assist cybersecurity defenses in the public and private sectors in an effort to resist long-term ransomware attacks. CISA has been tasked with advancing this mission, and Executive Deputy Director Eric Goldstein said collaboration with opposing numbers of private sector generation has helped CISA prevent Russian malware attacks.

“Our purpose at CISA has been to take all the data we can collect from our personal sector partners, our partners operating in Ukraine, PC emergency reaction groups in Eastern Europe, taking that data, distilling it and then sharing it temporarily. as imaginable with our key partners here in the United States, specifically adding the federal agencies of the civilian executive,” he said.

Through those partnerships, CISA can better disseminate notices and warnings to agencies and corporations that oppose Russia-related malware.

Goldstein also noted that as more federal workers use their cell phones to do their jobs, CISA is also implementing cellular asset control security measures on additional federal networks.

“We know that in this new hybrid, even remote, universe in which we live, many federal workers are using their mobile devices for a significant amount of transience jobs and vital process information,” he said.

This contributes to the agencies’ number one purpose of building physically powerful endpoint security in federal device networks. Goldstein said CISA is prioritizing this technique and, through its ongoing diagnostic and mitigation program, will create a new dashboard to make the agency’s hazards more transparent.

“We gain ordinary centralized visibility into threats and hazards that target federal agencies through the expansion of our endpoint detection and reaction functions through the maturation of continuous diagnostics,” he said.

While the board is still in development, Goldstein told Rep. Kathleen Rice, D-N. Y. that more federal organizations seize the opportunity.

“We’re making a pretty remarkable technological improvement across the federal board, which gives us that object-level knowledge,” Goldstein said. “We’re onboarding more agencies at this point every week. “

Beyond existing cyber threats, agencies are also interested in deepening Congressional work on regulating emerging technologies. Romine said NIST plans to manage potential hazards before the mass adoption of new technologies.

“Emerging technologies like the Internet of Things, quantum computing and synthetic intelligence will burden more demanding situations for federal cybersecurity,” he said. project requirements. “

Romine added that as NIST begins to expand its post-quantum cryptography standards, the company and its partners have known several algorithms strong enough to face an attack from a given potentially viable quantum computer.

Help us personalize the particular content for you:

Leave a Comment

Your email address will not be published. Required fields are marked *