The New Era of Cyber Risk Governance

The New Era of Cyber Risk Governance

What's next for agencies under the new executive order?

Over the past few years, the U.S. has seen a devastating wave of high-profile security breaches, both in the government and corporate sectors. A report by Privacy Rights Clearinghouse revealed that federal and state government agencies publicly disclosed a total of 203 data breaches over the past five years.

In all, the breaches resulted in nearly 47 million records being stolen, exposed or otherwise compromised. While these figures are significantly less than those reported in the private sector, the issue lies in the type of sensitive information involved in government breaches, and the critical implications of that information falling into the wrong hands. The Justice Department’s recent announcement that Russian cyber terrorists were responsible for the Yahoo breach also sheds new light on the growing magnitude of cyber terrorist activity in the U.S.— and the harsh financial and legal impacts it can have on agency heads and stakeholders.

The growing concerns on cybersecurity haven’t fallen from focus in the executive branch, who, since the Obama Administration, has been casting light on the underlying issues behind the increased cyber vulnerability in the federal realm. The Trump Administration feels, “the executive branch has for too long accepted antiquated and difficult to defend IT and information systems.” Last week, President Trump signed the long-awaited Cybersecurity of Federal Networks Executive Order, which requires all federal government agencies to begin running risk management, reporting, and recovery programs under the NIST Cyber Security Framework (CSF) in hopes to better protect the government from cyber attacks. Under the mandates, agency heads will now be held responsible for damaging data loss during future cyber attacks to their departments.

This executive order marks a dramatic cultural shift in way the federal government looks at cyber security. The key differences between this EO and the actions that the Obama administration took fall in two categories: 1) never has an executive order required all federal agencies to apply NIST’s CSF to their entire organization, and 2) there has never been a mandate that requires agencies to build a comprehensive risk and mitigation report for their organization and then report to the president of the Department of Homeland Security and the director of the Office of Management and Budget. Currently, all federal agencies have their own cybersecurity processes in place to protect their own systems. However, critical information is leaking on a constant basis, and it’s becoming more and more apparent that this is an internal failure and the fault of a serious disconnect between risk assessment at an IT level and the ability to translate the highly technical insights to overall business risk.

Trump’s order mandates that the security of federal agencies has to be controlled on an enterprise level. Instead of building security protocols for specific systems, all people, processes, and policies within the agency must be analyzed and reported. As cybersecurity continues its shift from a strictly IT function to a business function, the federal government is facing conflicting opinions on how best to standardize risk management and reporting processes. The problem is, there is no “one size fits all” solution to preventing cyber risk, which begs the question of whether or not this order will be enough to set a successful framework that can be applied across all agencies – and to adequately protect the entire government network as an autonomous unit.

One of the main critiques against the order is it it may not be comprehensive enough to incite any notable changes and improvements in risk management practices in the government sector. But the executive order’s requirements that agencies meet the hundreds of control points of the NIST CSF means that cyber risk governance is the goal, rather than IT compliance. Drilling down too deep into the choices of technologies and compliance with technical standards is not what is being demanded, and doing so would miss the stated goal of providing an overview of each agency’s cyber risk. But how can the government ensure that agencies are implementing a cyber-conscious culture that encourages the mitigation of risk from the top-down?

The EO directs government action in three key areas under a mandated 90-day deadline: (1) assessing and improving each federal department’s cybersecurity posture; (2) enhancing the nation’s critical infrastructure; and (3) ensuring sure that “the Internet remains open, interoperable, reliable, and secure.” Meeting these criteria is a massive undertaking for federal agencies, who also have an incredible number of third-party networks, contractors/vendors, and employees that now require examination. Not to mention that the stringent deadline is a huge lift for an order that requires a cultural shift down to the DNA level of how agencies view cyber risk.

An undertaking this substantial means significant amounts of automation will be mandatory in order to be compliant, and do so fast. Getting the job done within this timeframe using traditional means of risk assessment and governance will undoubtedly prove challenging. Gone are the days where checking off protocols on a spreadsheet and presenting convoluted statistics and recommendations to agency heads will be enough to effectively mitigate cyber risk. Agencies must now be able to report on their risk in a manner that can be understood by all stakeholders and used to assess the cyber maturity of the government network on a portfolio view – and do so in a timeframe that was once thought impossible. Investing in automated tools that will streamline cyber risk governance and mandatory reporting processes will be an advantage for agencies that do not wish to incur the penalties associated with non-compliance of this new EO. But achieving these mandates will also be an agency-wide effort that requires involvement at all levels to ensure that everyone at an agency – from entry-level to the C-suite – is equipped to identify, assess, and mitigate risk.

The executive order is a step in the right direction for combatting the outbreak of detrimental breaches in the government sector, and points to a positive shift in the way we as a nation are addressing cybersecurity, but that does not mean it will be an easy adjustment. The impacts of the order await to be seen, but one thing we know for certain is that federal agencies will be fighting an uphill battle if they fail to acknowledge risk governance as a team sport and integral piece of an agency’s overall culture and business function.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West: Day 2

    What a great show ISC West 2024 has been so far. The second day on Thursday was as busy or even more hectic than the first. Remember to keep tabs on our Live From ISC West page for news and updates from the show floor at the Sands Expo, because there’s more news coming out than anyone could be expected to keep track of. Read Now

    • Industry Events
    • ISC West
  • A Unique Perspective on ISC West 2024

    Navigating a tradeshow post-knee surgery can be quite the endeavor, but utilizing an electric scooter adds an interesting twist to the experience. While it may initially feel like a limitation, it actually provides a unique perspective on traversing through the bustling crowds and expansive exhibition halls. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3