department of homeland security flag

Federal Cybersecurity Agency Prioritizes Addressing Chinese Threats, Improving Election Security

The leader of the Cybersecurity and Infrastructure Agency, which works within DHS, is concerned primarily with risk management, Chinese threats to supply chains and election security.

The Department of Homeland Security’s central cybersecurity agency is focused on addressing the “persistent threat” posed by Chinese hackers, improving election security and defending against ransomware attacking government systems, according to a strategy memo released by the department. 


In his agency’s “strategic intent” document, Christopher Krebs, the director of the Cybersecurity and Infrastructure Security Agency (CISA), said the agency is looking to improve the country’s supply chain risk management when it comes to China. The U.S. has consistently accused Chinese hackers of attempting to compromise American companies and systems, particularly through 5G or other technology. 


Krebs laid out the plans during a speech at Auburn University last week, describing CISA’s principles as “Defend today. Secure tomorrow.” 


“Defending today, we’re working with state and local governments to help protect themselves, to help defend their networks so they’re not tomorrow’s headline,” Krebs said, according to MeriTalk. “The secure tomorrow piece is a little bit different. Securing tomorrow is about, what does the next generation of technology look like, and have we baked in the appropriate security concepts?”


Krebs added that the agency spends “probably 40 to 50 percent” on election security issues as DHS and other departments recognize the threats posed by Russian interference and how to address them. 


“I know what the Russians did in 2016, I know what they tried to do in 2018, I need to know what they’re going to try to do in 2020,” Krebs said, according to The Hill.


Lawmakers have recently battled over election security measures, as Democrats push for legislation that would establish federal standards for states, which are responsible for administering and counting ballots. Senate Majority Leader Mitch McConnell and other Republicans say there is no need to bring election security bills forward, citing improvements that states have made in securing election machines, buying new equipment and other measures. 


But cybersecurity experts continue to sound the alarm over the issue, blaming private companies for selling machines that are not properly secured and counties for buying the equipment out of convenience. Dan Wallach, a Rice University computer science professor who has done extensive research on voting machines, said that vendors sell what local officials want to buy. 


“The vendors appear not to have the self-awareness that it might be a bad thing for our democracy to sell inadequately secure equipment,” Wallach told POLITICO


Krebs said that his priorities are improving risk management strategies across the federal government and working to “increase a defense posture across the civilian government agencies.” Whatever goals he and the department sets, they can only be achieved through better collaboration across federal, state and local governments and partnerships with industry and academic leaders, he said. 


“Whatever we do has to be done together, and in cybersecurity, that is the only way we’re going to get it done,” Krebs said. “It has to be a collective defense approach.”

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3