department of homeland security flag

Federal Cybersecurity Agency Prioritizes Addressing Chinese Threats, Improving Election Security

The leader of the Cybersecurity and Infrastructure Agency, which works within DHS, is concerned primarily with risk management, Chinese threats to supply chains and election security.

The Department of Homeland Security’s central cybersecurity agency is focused on addressing the “persistent threat” posed by Chinese hackers, improving election security and defending against ransomware attacking government systems, according to a strategy memo released by the department. 


In his agency’s “strategic intent” document, Christopher Krebs, the director of the Cybersecurity and Infrastructure Security Agency (CISA), said the agency is looking to improve the country’s supply chain risk management when it comes to China. The U.S. has consistently accused Chinese hackers of attempting to compromise American companies and systems, particularly through 5G or other technology. 


Krebs laid out the plans during a speech at Auburn University last week, describing CISA’s principles as “Defend today. Secure tomorrow.” 


“Defending today, we’re working with state and local governments to help protect themselves, to help defend their networks so they’re not tomorrow’s headline,” Krebs said, according to MeriTalk. “The secure tomorrow piece is a little bit different. Securing tomorrow is about, what does the next generation of technology look like, and have we baked in the appropriate security concepts?”


Krebs added that the agency spends “probably 40 to 50 percent” on election security issues as DHS and other departments recognize the threats posed by Russian interference and how to address them. 


“I know what the Russians did in 2016, I know what they tried to do in 2018, I need to know what they’re going to try to do in 2020,” Krebs said, according to The Hill.


Lawmakers have recently battled over election security measures, as Democrats push for legislation that would establish federal standards for states, which are responsible for administering and counting ballots. Senate Majority Leader Mitch McConnell and other Republicans say there is no need to bring election security bills forward, citing improvements that states have made in securing election machines, buying new equipment and other measures. 


But cybersecurity experts continue to sound the alarm over the issue, blaming private companies for selling machines that are not properly secured and counties for buying the equipment out of convenience. Dan Wallach, a Rice University computer science professor who has done extensive research on voting machines, said that vendors sell what local officials want to buy. 


“The vendors appear not to have the self-awareness that it might be a bad thing for our democracy to sell inadequately secure equipment,” Wallach told POLITICO


Krebs said that his priorities are improving risk management strategies across the federal government and working to “increase a defense posture across the civilian government agencies.” Whatever goals he and the department sets, they can only be achieved through better collaboration across federal, state and local governments and partnerships with industry and academic leaders, he said. 


“Whatever we do has to be done together, and in cybersecurity, that is the only way we’re going to get it done,” Krebs said. “It has to be a collective defense approach.”

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • Genetec Security Center

    Genetec Security Center

    This major new release allows more system components to run in the cloud, reducing the gap between cloud and on-premises security systems. It also makes it easier to connect external systems and tap external data for use in dashboards, maps and investigations without relying on complex, specialized integrations. 3

  • VideoEdge 2U High Capacity Network Video Recorder

    VideoEdge 2U High Capacity Network Video Recorder

    Johnson Controls announces a powerful recording solution to meet demanding requirements with its VideoEdge 2U High Capacity Network Video Recorder. This solution combines the powerful capabilities of victor with the intelligence of VideoEdge NVRs, fueled by Tyco Artificial Intelligence, for video management that provides actionable insights to save time, money and lives. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3