department of homeland security flag

Federal Cybersecurity Agency Prioritizes Addressing Chinese Threats, Improving Election Security

The leader of the Cybersecurity and Infrastructure Agency, which works within DHS, is concerned primarily with risk management, Chinese threats to supply chains and election security.

The Department of Homeland Security’s central cybersecurity agency is focused on addressing the “persistent threat” posed by Chinese hackers, improving election security and defending against ransomware attacking government systems, according to a strategy memo released by the department. 


In his agency’s “strategic intent” document, Christopher Krebs, the director of the Cybersecurity and Infrastructure Security Agency (CISA), said the agency is looking to improve the country’s supply chain risk management when it comes to China. The U.S. has consistently accused Chinese hackers of attempting to compromise American companies and systems, particularly through 5G or other technology. 


Krebs laid out the plans during a speech at Auburn University last week, describing CISA’s principles as “Defend today. Secure tomorrow.” 


“Defending today, we’re working with state and local governments to help protect themselves, to help defend their networks so they’re not tomorrow’s headline,” Krebs said, according to MeriTalk. “The secure tomorrow piece is a little bit different. Securing tomorrow is about, what does the next generation of technology look like, and have we baked in the appropriate security concepts?”


Krebs added that the agency spends “probably 40 to 50 percent” on election security issues as DHS and other departments recognize the threats posed by Russian interference and how to address them. 


“I know what the Russians did in 2016, I know what they tried to do in 2018, I need to know what they’re going to try to do in 2020,” Krebs said, according to The Hill.


Lawmakers have recently battled over election security measures, as Democrats push for legislation that would establish federal standards for states, which are responsible for administering and counting ballots. Senate Majority Leader Mitch McConnell and other Republicans say there is no need to bring election security bills forward, citing improvements that states have made in securing election machines, buying new equipment and other measures. 


But cybersecurity experts continue to sound the alarm over the issue, blaming private companies for selling machines that are not properly secured and counties for buying the equipment out of convenience. Dan Wallach, a Rice University computer science professor who has done extensive research on voting machines, said that vendors sell what local officials want to buy. 


“The vendors appear not to have the self-awareness that it might be a bad thing for our democracy to sell inadequately secure equipment,” Wallach told POLITICO


Krebs said that his priorities are improving risk management strategies across the federal government and working to “increase a defense posture across the civilian government agencies.” Whatever goals he and the department sets, they can only be achieved through better collaboration across federal, state and local governments and partnerships with industry and academic leaders, he said. 


“Whatever we do has to be done together, and in cybersecurity, that is the only way we’re going to get it done,” Krebs said. “It has to be a collective defense approach.”

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3