Feds Need to Bolster Cyberprotection Speed and Range


Providing cybersecurity that is adequate to meet increasing threats has proven to be a perpetual catch-up process. Public sector agencies are particularly sensitive targets, with high visibility not only to the citizens they serve, but also to cyberattackers.

Despite the emphasis on cyberprotection spurred by a major breach at the federal Office of Personnel Management in 2015, government agencies have struggled to maintain adequate levels of protection. A recent survey uncovered two major vulnerabilities: lack of speed in detecting and responding to attacks; and weak defenses of the full range of possible attack channels.

The velocity of cyberintrusions has become a significant factor in detecting and countering attacks effectively, according to the MeriTalk survey, which polled 150 federal cybersecurity professionals.

Federal security operation teams "ingest" an average of 25 external threats daily, notes the report, which received support from Palo Alto Networks.

"To address today's threats and prevent successful cyberattacks, it's imperative to automate the creation and distribution of new protections in near-real time and predict the attacker's next step," said Pamela Warren, director of government and industry initiatives at Palo Alto Networks.

Timing has become a critical element in cyberprotection, given how fast threats can spread within a network. However, only 15 percent of survey respondents said their agencies could implement protection against a new threat within 15 minutes.

Seventy-two percent of respondents said it would take a few hours to a few days to assess if a unique threat were present and to determine if action would be required, and 80 percent said it would take just as long to create actionable changes in their organization's security posture.

"Despite these time-intensive processes, federal security operations teams continue to allocate precious manpower and financial resources to tasks that can be automated," the report observes.

The survey findings do not support the conclusion that federal agencies are woefully deficient in cybersecurity. The takeaway is that there are ways agencies can build on existing efforts to make their cyberprotection efforts more efficient and effective.

For example, federal policy recently has emphasized the use of continuous monitoring, or CM, as a key deterrent to cyberattacks.

"The focus of the survey was in line with CM techniques, such as through the government's continuous diagnostics and mitigation (CDM) goals," Warren told the E-Commerce Times.

The results of the survey did not suggest that CM or CDM have been ineffective, she noted. Instead, those ongoing programs should be enhanced.

The CDM process involves a program to identify, prioritize and mitigate cybersecurity risk -- much like the techniques currently in use at federal agencies, Warren explained.

"The first phase focuses on what and who are on my network. The next steps for CDM are putting in place boundary controls or network access controls," she said.

"The key to the success of a continuously monitored environment -- and what we point to as the challenges indicated by the survey results -- is how successfully you can automate operational decisions and shift away from manual processes. This speeds up your time to address a never-before-seen threat," Warren said.

While automation could add the element of speed to the cyberprotection process, 55 percent of survey respondents said their agency did not use automated techniques to correlate threat information ascertained from different locations.

Thirty percent of respondents reported that they used tedious and time consuming manual efforts, while another 25 percent said they didn't engage in such correlation activities at all.

Another element that needs attention is the range of potential channels for cyberintrusions. Federal agencies may be missing key indicators of an attack -- a pathway into their networks -- and be unable to link threat data points, according to the report.

While the majority of agencies monitor traditional entry points such as mail servers, the Web, and Internet gateways, fewer than half guard data centers, SaaS enforcement points, and mobile endpoints, based on the survey results.

"This may impede the organization's ability to spot discrete malicious behaviors," the report points out.

To improve cybersecurity performance, agencies need data, tools and a process, the report says. Agencies have plenty of data but fall short on using adequate tools and processes.

On a positive note, 71 percent of survey respondents said that when they did engage in analytical efforts, they used some form of automated procedures to reduce the volume of data and to focus efforts on hunting targeted attacks.

However, many federal security professionals have not utilized critical advanced threat capabilities, the report found. Fewer than half used advanced techniques. Just 48 percent used dynamic analysis, while only 32 percent used static analysis, and only 19 percent turned to machine learning.

"Despite the need for the automation of prevention, only 30 percent of federal security operations professionals are willing to invest in the automation of signature creation and distribution," the report says.

To assess threats as quickly and efficiently as possible, federal agencies should consider following these MeriTalk and Palo Alto Networks recommendations:

"Then, swiftly create new protections and reprogram enforcement points faster than the attack can spread in the network," the report suggests.

Federal cyberprofessionals estimated that more efficient techniques, such as using automation wherever possible, could create savings amounting to 27 percent of agencies' cybersecurity spending -- or about $5 billion per year, based on survey feedback.

With the emergence of new cyberchallenges, vendors have bolstered their offerings in the federal market. For example, Accenture Federal Services this fall entered into an agreement to acquire Defense Point Security, a privately held cybersecurity company that supports federal agencies with security operations expertise, security engineering and cyberanalytics.

Accenture noted the "velocity and ferocity" of cyberthreats as a factor in adding DPS capabilities to its offerings.

"We see the federal government making a deliberate and substantial investment to improve the cyber posture in federal agencies, and we expect that trend to continue," said Gus Hunt, head of the cyberpractice at Accenture Federal Services.

"We believe that Defense Department investments will grow at a rate faster than other agencies in the federal sector due to the importance of cybertechnology to our warfighters," he told the E-Commerce Times.

In another move to enhance market offerings, Accenture this summer teamed up with Palo Alto Networks, Splunk and Tanium to create an integrated advanced cyberdefense platform. The service is applicable to global networks and a wide range of endpoints for both the commercial and government markets.

The gaps uncovered in the survey of federal agencies are not necessarily unique to government.

"Some of these same challenges exist within the commercial sector as well," said Palo Alto Networks' Warren, "but depending on the size of the organization and the culture, they may be faster at adapting to new innovations in technology than their public-sector counterparts."

John K. Higgins is a career business writer, with broad experience for a major publisher in a wide range of topics including energy, finance, environment and government policy. In his current freelance role, he reports mainly on government information technology issues for ECT News Network.

0 Comment

Leave a Reply

Captcha image


  • 5300c769af79e

    Andrew Froehlich - Authors & Columnists

    5/31/2016As virtualization advancements such as container technologies emerge, PaaS is hitting its stride.While you may have heard of a couple of the PaaS providers on our list, we're betting there are a few more here that aren't on your radar yet.
  • 5300c769af79e

    You Can Finally Delete Built-In iOS Apps, but Should You?

    Apple recently announced that iPhone and iPad users can finally delete pre-installed Apple apps.You also might delete data stored in it, unless that data is saved to a related cloud account.
  • 5300c769af79e

    IoT Security Will Reach $840 Million By 2020, Garter Finds

    Organizations require new ways to "weaponize" the threat intelligence they have to prevent attacks The IoT security market will hit its stride in 2020, according to Gartner, driven by IoT growth in energy management, the automotive industry, consumer applications, and an increase in malware attacks.Over the next few years, IoT security spending will initially be "moderate," according to Gartner, and will rise to $547.
  • 5300c769af79e

    Download Apps For Free: Communication

    Over 30 billion messages are sent on Whatsapp on a daily basis and this number continues to be on the rise.Majority of users are also using it to download, transfer and share photographs, videos and even other files.