Archives page

Posts Tagged ‘cybersecurity’

Oct. 16: Mentor Session with Harris IT Services

Join the Government Technology & Services Coalition for a Mentor Session with Mr. Keith Bryars, the Client Executive for National Security and Federal Law Enforcement at Harris Harris IT Services on Wednesday, October 16.

About Harris IT Services

A leading provider of end-to-end solutions in mission-critical IT transformation, managed solutions, and information assurance for defense, intelligence, homeland security, civil and commercial customers. With over 3,300 professionals worldwide, Harris IT Services offers demonstrated past performance, proven technical expertise and innovative solutions in supporting large-scale IT programs that encompass the full technology lifecycle.

About Keith Bryars, Client Executive

Keith Bryars is a client executive with Harris IT Services. Harris IT Services designs, deploys, and operates secure communications systems and information networks with optimal reliability and affordability for high-profile customers in government and commercial markets, delivering expertise in cloud services, cyber security/information assurance, enterprise managed services, mobility, and systems integration worldwide.

Mr. Bryars joined Harris Corporation in April 2012 following a 25-year career as a senior executive special agent with the Federal Bureau of Investigation (FBI). Throughout his FBI career, Mr. Bryars was involved in a number of significant highprofile investigations involving counterterrorism, cybersecurity, counterintelligence, public corruption, and violent crimes. He is considered a subject matter expert in Federal Law Enforcement and National Security matters.

At the FBI, Mr. Bryars led and managed field operations across the country and served in the FBI’s Kansas City, Miami, Nashville, Birmingham, and Washington field offices, and at FBI headquarters in Washington, DC. As an FBI senior executive, Mr. Bryars helped lead the FBI’s strategic transformation, post-9/11, to an intelligence-led, threat-driven organization.

He also served as a senior executive at the FBI’s Engineering Research Facility at the Operational Technology Division at Quantico, Virginia, where he oversaw all of the FBI’s technical programs supporting FBI field operations and intelligence collection, and directed a variety of technical capabilities and operational technology support to the FBI and other Federal Law Enforcement and National Security partners.

Before his FBI career, Mr. Bryars worked as a mechanical engineer in the nuclear power industry.

Mr. Bryars holds a bachelor’s degree in mechanical engineering from Auburn University.

Harris is an international communications and information technology company serving government and commercial markets in more than 125 countries. Harris is dedicated to developing best-in-class assured communications® products, systems, and services.

About GTSC’s Mentor Companies

The Government Technology & Services Coalition’s (GTSC) Mentor companies understand how critical a robust, successful homeland and national security market is to our nation’s security.  Together with our members, these firms are committed to bringing the innovation, ideas and agility of small business to the experience, infrastructure and resources of large companies.  GTSC mentors join us to provide advice and counsel to small and mid-sized companies, find new and innovative teaming partners, address challenges in the prime/subcontractor relationship in a neutral environment and improve mentor/protégé communication and success.  Both our large and small companies recognize that the best security for our citizens – both physically and economically — is derived from the ability of our markets to meet the challenges posed by terrorism, natural disasters, and criminal activity.

 

Register now

Removable Media: Do You Know Where That’s Been?

LeapFrog Tip #2 Removable MediaSteer clear of portable malware by using only secure removable media

Admit it. You can’t resist plugging those cute little USB thumb drives, miniature CD ROMS and other removable media devices into your computer. They’re easy to use, portable, convenient and they hold lots of data.

PDN_MalWareBut my hacker friends and I discovered that those nifty memory devices are a great way to get into your computer and your network — especially if you don’t know where they came from. We hand them out everywhere we go. Everybody wants one. We pre-infect them with malware or spyware. The second you plug them into your USB port, presto! I’m running around your computer, free and easy.

Sure, it’s handy to download files onto a thumb drive and take them home with you instead of lugging your laptop around. But humans have a propensity to lose things. People misplace their thumb drives or CD ROMS all the time. Because they are so small, it’s pretty easy to steal them, too.

But you can protect yourself, your computer and your network. Just follow these easy tips:

  • If you don’t know where it came from, don’t put it in your computer.
  • Safeguard your memory sticks. Keep them in a safe place.
  • Use encryption. Protect sensitive data on your thumb drives.
  • Print hard copies of documents and back up data on removable media.

Remember, losing a memory stick that contains important data could have severe consequences. Protect, don’t neglect! For more information, check out www.us-cert.gov.

Lisa Martin CEO LeapFrog Solutions, Inc.

Lisa Martin
CEO
LeapFrog Solutions, Inc.

LeapFrog Solutions (LFS) is a certified woman owned small business based in Fairfax, Virginia. Founded in 1996, we are a trusted source for commercial businesses and federal agencies seeking full spectrum creative solutions and exceptional program management. This blogpost is brought to you by GTSC in partnership with LeapFrog Solutions. For more information on cyber awareness campaigns contact Anjali Dighe at 703.539.6127 or [email protected].

Get Smart About Your Password

LeapFrog Banner #1You shared your password … now I know all your secrets. Don’t get exposed — be smart about your password!

PDN_MalWareThe attacker who writes my code is on the hunt for your password. Once he gets it, he inserts me, Mal Ware, into your network so he can see all the information that your employees need to keep private. I love taking secrets that aren’t mine and using them to do bad things. So don’t make it easy for me or your attacker.

Here are ways you can protect your information from my malicious intentions:

  • Keep your password to yourself. It’s supposed to be secret — so don’t share it!
  • Don’t be fooled by what others may say:
    • IT support does not need your password.
    • Your coworkers do not need your password to read your email. Share your inbox with another user or use a team email account.
    • Your assistant doesn’t need your password to do his/her job. You can give others access to your Outlook calendar and email.
    • Share file folder access with specific coworkers to avoid password sharing.
    • You don’t need to share your password with others to access the same sites or content management systems. Everyone with duties assigned on a system should have his/her own login and password.
    • Be creative to make your password uniquely yours:
      • Use a variety of symbols, letters, capital letters and numbers.
      • Avoid using words related to your company.
      • Avoid sequences or repetition of letters or numbers, words spelled backward, common misspellings or abbreviations.
      • Encourage others to be smart about their passwords. Make them aware of the threats that are out there if they share them, because once I have access to the network, I have access to everyone and everything.
      • A data breach could embarrass you and/or your company … or much worse.

It’s not difficult to avoid my threats. Just don’t share your password with anyone, and be smart when creating it. Protect, don’t neglect, your password! For more information, check out www.us-cert.gov.

Lisa Martin CEO LeapFrog Solutions, Inc.

Lisa Martin
CEO
LeapFrog Solutions, Inc.

LeapFrog Solutions (LFS) is a certified woman owned small business based in Fairfax, Virginia. Founded in 1996, we are a trusted source for commercial businesses and federal agencies seeking full spectrum creative solutions and exceptional program management. This blogpost is brought to you by GTSC in partnership with LeapFrog Solutions. For more information on cyber awareness campaigns contact Anjali Dighe at 703.539.6127 or [email protected].

Key Cybersecurity Issues for Government Contractors

Dickstein Shapiro LLP and the Government Technology & Services Coalition (GTSC) held a webcast, “Key Cybersecurity Issues for Government Contractors.” This interactive program, of particular interest to government contractor compliance officers, CIOs, CISOs, General Counsel, and any other C-suite members, discussed how the federal government is planning on fundamentally altering its acquisition policies to make the cybersecurity of its contractors a top priority.

The discussion included:
– Proposed Federal Acquisitions Regulation (FAR) changes relating to President Obama’s Cybersecurity Executive Order;
– Planned changes to procurement requirements based on independent agency actions;
– Congressionally mandated cybersecurity requirements; and
Ways contractors can prepare for these changes

Speakers included:

Brian Finch, Partner, Global Security, Dickstein Shapiro LLP

Justin Chiarodo, Partner, Government Contracts, Dickstein Shapiro LLP

Emile Monette, Senior Action Officer for Cyber Security Policy, Government Services Administration

Kristina Tanasichuk, CEO, Government Technology & Services Coalition

View the slides here or watch the webinar by clicking the link below.

Screen Shot 2013-10-09 at 2.21.39 PM

 

The GTSC Joins DHS Cyber Awareness Coalition

The Government Technology & Services Coalition has joined the U.S. Department of Homeland Security’s Cyber Awareness Coalition, part of the Department’s Stop.Think.Connect. Campaign to raise national awareness of cyber threats.  At our Annual meeting last year, members of the Coalition voted to develop a Designation of Excellence for it members who “walk the walk” and not just “talk the talk.”  Part of that designation process includes assuring that companies with the Designation assume leadership roles in educating their own companies and employees on cyber security threats and awareness.

The Department of Homeland Security’s Stop.Think.Connect. initiative is a national public awareness campaign that seeks to empoer the American public to be safer and more secure online. Given that much of cybersecurity lies with individual users — awareness is a critical component of this campaign.

As a National Network Member of the DHS’ Cyber Awareness Coalition, the GTSC has included a cybersecurity component in its designation of excellence and devotes the month of October — Cybersecurity Awareness Month — to cyber  programming to educate the public, policy makers and our community’s private sector members.  For more tips, news and trends, sign up for the Stop.Think.Connect. monthly newsletter.  For more information on engaging with the GTSC’s efforts, contact Whitney Kazragis.

NIST Issues Draft on Security Controls

National Institute of Standards and Technology (NIST) Issues Draft Security Controls for Federal Information Systems

By McKenna Long & Aldridge LLP

As cybersecurity has taken center stage in recent months, with several high profile attacks on commercial and public institutions (including a cybersecurity attack on the Federal Reserve this week), a potentially significant development is in the works regarding the security of Federal information systems, one that could have a substantial effect on government contractors. On February 6, 2013, the National Institute of Standards and Technology (NIST), the agency charged with developing information security standards and guidelines for Federal information systems, announced that it was seeking comments on the final public draft of Security and Privacy Controls for Federal Information Systems and Organizations, Special Publication (SP)800-53, Revision 4. Once finalized, this document, developed by a joint task force of security experts from NIST, the Department of Defense, the Intelligence Community and the Committee on National Security Systems, will provide primary guidance for security safeguards and countermeasures used to protect Federal information systems. NIST notes that the latest draft supports the Federal information strategy of “Build It Right, Then Continuously Monitor.”

A comprehensive analysis of the current draft, which is over 450 pages, is beyond the scope of this alert. However, there are a couple of key points that should be made about the guidelines in their current form. First, as with previous guidelines produced by NIST, these guidelines would apply to all federal information systems, except for those designated as national security systems under 44 U.S.C. § 3542. This means that any system used by an executive agency or the contractor of an executive agency will be subject to the finalized guidelines, unless the system is used for national security purposes, such as intelligence activities, military command and control, or weapons systems. Second, the revised guidelines would provide new security controls and control enhancements addressing a wide range of cybersecurity concerns, including advanced persistent threats, supply chains, insider threats, application security, distributed systems, and mobile and cloud computing. For many government contractors, compliance with these guidelines will require the adoption of extensive new security measures.

Contractors that could be affected by these new guidelines can offer comments on the current draft through March 1, 2013. McKenna will continue to monitor the NIST’s efforts to promulgate new guidelines and other cybersecurity related developments relevant to government contractors.

For additional information, please contact:

Elizabeth “Beth” Ferrell
202.496.7544

Patrick J. Stanton
202.496.7316

McKenna Long & Aldridge LLP (MLA) is an international law firm with more than 575 attorneys and public policy advisors in 13 offices and 11 markets. The firm is uniquely positioned at the intersection of law, business and government, representing clients in the areas of complex litigation, corporate law, energy, environment, finance, government contracts, health care, infrastructure, insurance, intellectual property, private client services, public policy, real estate, and technology. To further explore the firm and its services, go to mckennalong.com.

© 2013 MCKENNA LONG & ALDRIDGE LLP, 303 PEACHTREE STREET NE, ATLANTA, GA, 30308. All Rights Reserved.

*This Advisory is for informational purposes only and does not constitute specific legal advice or opinions. Such advice and opinions are provided by the firm only upon engagement with respect to specific factual situations. This communication is considered Attorney Advertising.

Executive Order on Cyber: What it Means to You

Improving Critical Infrastructure Cybersecurity Executive Order: Impact on Corporate America

By Brian Finch, Partner, Dickstein Shapiro LLP

Released during President Obama’s State of the Union Address, the long-awaited Executive Order (EO) addressing the federal government’s response to the ongoing menace of cyber attacks has made its formal appearance. The EO contains many ideas that had been previewed in previous drafts, as well as some interesting new twists that should have an immediate impact on corporate America and the nation as a whole. More than anything else, the EO represents another step in the U.S. government’s ongoing response to the ever more extensive and expensive threat posed by cyber attacks.Below are seven key takeaways for businesses, followed by an in-depth analysis of the EO which addresses these key points and identifies next steps to be taken by the parties involved.

Key Takeaways: What’s in the EO, What’s Missing, and What’s Next?

1)     The EO dramatically expands existing information sharing programs and provides mechanisms for sharing of unclassified threat data. But will the information be useful to many companies, will it be provided in a timely manner, and most importantly will companies have liability protection for sharing information or choosing not to act on information provided to it?

2)     How quickly will the National Institutes of Standards and Technology (NIST) develop the “Cybersecurity Framework”? And will it be able to adequately tailor a framework that accounts for the great variability amongst the yet-to-be-defined “critical infrastructure” facilities?

3)     What will be deemed “critical infrastructure” and what won’t be?  The nation has been through this exercise many times before, and it has yet to go smoothly. And will it be easy to seek a redetermination of whether a facility constitutes critical infrastructure?

4)     Will the “voluntary” cybersecurity program actually be voluntary? History has shown that such programs either (a) are dramatically underutilized or (b) are a precursor to mandatory regulations.

5)     What incentives will be recommended for participation in the voluntary cybersecurity program? Will the government promote only those incentives and discourage the use of incentives that are not tied to the voluntary program (for example Terrorism Reinsurance Act (TRIA) coverage or the SAFETY Act?)

6)     The portion of the EO that is the most immediate and has the greatest impact is also the simplest to implement – procurement reform. One can easily anticipate that government contractors will soon face much stricter cybersecurity requirements as a result of the EO. What will this look like?  Will it mirror the Defense Department’s new breach notification requirements? Will it cover only contractors working on classified or sensitive programs, or will it touch on almost every procurement?

7)     The EO sets in motion a formal review of existing cybersecurity authorities to see what additional legislation is needed. This is yet another signal that cybersecurity legislation will be a top priority for the President and the Congress over the next two years.

“Critical Infrastructure”

The eight-page EO contains some themes that are familiar to cyber watchers.  First, the EO is in large part limited to “critical infrastructure.” As defined in Section 2 of the EO, that means “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health and safety, or any combination of those matters.” Not surprisingly, many of those terms (“vital,” “debilitating,” “national economic security”) are undefined, meaning that much of the spade work on identifying “critical infrastructure”-or in some cases arguing that a system or asset is NOT critical infrastructure, is yet to be done. The debate over what is defined as “critical infrastructure” is certain to be  significant, and based on past experience with efforts to define “critical infrastructure,” it is likely to be a lengthy process rife with errors and confusion.

Cyber Information-Sharing Program Expanded

Section 4 sets forth an expanded cyber information-sharing program. The goal of Section 4 is to set up a framework that allows for the “timely production” of unclassified reports of cyber threats to an entity that has been specifically targeted. In addition, Section 4 also gives the Secretary of Homeland Security, the Attorney General, and the Director of National Intelligence the ability to share classified information in certain circumstances. Perhaps most striking is that Section 4 of the EO directs the Secretary of Defense to establish a process by which its Enhanced Cybersecurity Services program (an existing cyber threat information sharing program) can be dramatically enhanced to allow any entity in “critical infrastructure sectors” to join that program. This represents a dramatic expansion of a program that heretofore was limited to specific companies in the so-called “Defense Industrial Base.”

The question remains, however, whether the information shared as part of this program will actually be useful and timely. Such information often is transmitted weeks after malware is discovered and the harm has been done, creating a situation akin to reading in the newspaper that your house is on fire. The EO also leaves unanswered whether liability protection will be available to participants in the information-sharing program. Liability protections are critical because, without them, many companies will not participate in information-sharing programs for fear of exposing themselves to liability.

Impact on Corporate America

Sections 7 and 8 of the EO may give many in the private sector pause, as they direct portions of the U.S. government to establish baselines to reduce cyber risks and create voluntary critical infrastructure protection programs. These sections could be worrisome, as some will argue that they will lead to regulation at a later date.

I.                New Cybersecurity Framework

Section 7 gives the Secretary of Commerce, through the Director of the National Institutes of Standards and Technology, approximately one year to develop a framework to reduce cyber risks (the so-called “Cybersecurity Framework.”) That Framework is to include a set of standards, methodologies, procedures, and processes designed to address cyber risks. The Cybersecurity Framework is supposed to incorporate voluntary consensus standards and industry best practices “to the fullest extent possible.” The goal is to create a framework that is “prioritized, flexible, repeatable, performance-based, and cost-effective” that will help owners and operators of critical infrastructure identify, assess, and manage cyber risk.  Areas of improvement are to be identified, the framework is supposed to be “technology neutral,” and it is supposed to include guidance for measuring performance in implementing the framework. All of this is also to be done using an open public review along with operational feedback from actual owners and operators of critical infrastructure. It remains to be seen if NIST can meet those timelines, and whether the framework established will be flexible enough to address the varied cyber security needs of the vastly different “critical infrastructure” sectors.

II.              Voluntary Support Program

In conjunction with the Cybersecurity Framework, the Secretary of Homeland Security is directed in Section 8 of the EO to establish a “voluntary program” to support the adoption of the framework by owners of critical infrastructure owners and operations and, interestingly, “any other interested entities.” The U.S. Department of Homeland Security (DHS) will work with other federal agencies to review the framework and, “if necessary,” develop implementation guidance and supplemental materials to address sector-specific risks and operating environments. The various federal agencies are also required to report to the President annually on the extent to which specific critical infrastructure owners and operators are participating in the “voluntary” program.  Just how “voluntary” this program is remains to be determined. These “voluntary” programs often become de facto mandatory programs as companies feel compelled to participate lest they open themselves to litigation for not taking identified security measures. This has led to many voluntary infrastructure programs either being severely delayed in their deployment or being dramatically underutilized by the private sector.

Section 8 also directs the Secretary of Homeland Security to coordinate the establishment of “incentives” designed to promote participation in the voluntary program. Such report is supposed to be made within 120 days of the issuance of the EO, and the Secretaries of Commerce and Treasury are required to submit their own reports on incentives. The report is to identify the relative benefits of identified incentives, and if additional legislation is needed to implement them. What these incentives will look like is unknown. Possible incentives could include greater use of the SAFETY Act (which offers liability protection), an expansion of the TRIA, or other novel ideas.

Another requirement of Section 8 of the EO is that within 120 days of its signature, the Secretary of Defense and the Administrator of the General Services Administration are to make recommendations on the “feasibility, security benefits, and relative merits of incorporating security standards into acquisition planning and contract administration.” In other words, a comprehensive review of existing procurement regulations will be conducted to see if cybersecurity requirements can be embedded therein.

This portion of the EO may indeed have the most immediate impact on cybersecurity. One can easily anticipate that government contractors will soon face much stricter cyber security requirements as a result of the EO. These requirements could take any number of forms, including minimum security standards and data breach notification requirements. It also remains to be seen whether these requirements will cover only contractors working on classified or sensitive programs, or if they will touch almost every government vendor. It is certain that government contractors should be prepared for increased cybersecurity requirements and should be proactive in discussing what requirements are realistic.

Critical Infrastructure Identification 

Interestingly, Section 9 takes the identification of “critical infrastructure” a step further by directing that within 150 days “critical infrastructure” must be identified by the Secretary of Homeland Security using a “risk-based” approach.  This list is supposed to be developed using a “consultative process” and is to use “consistent, objective” criteria. The list is to be reviewed and updated annually and (somewhat unusually) is to include a process by which identified “critical infrastructure” entities may request reconsideration of such a determination. The ease or difficulty of successfully appealing a “critical infrastructure” designation remains to be seen.

Cybersecurity Framework Final Approval

Section 10 is the catch-all of the EO, stating that once the Cybersecurity Framework has been preliminarily finalized, the Secretary of Homeland Security in consultation with the Office of Management and Budget and the National Security Staff shall review it to determine if current cybersecurity regulatory requirements are sufficient given current and projected risks. Those entities are then directed to submit a report to the President stating whether clear authority to establish requirements based on the Cybersecurity Framework exists and any additional authority required.

Summary and Conclusion

So what does all of this mean?  In its simplest form, the EO is a data collection exercise and a blueprint for legislative and regulatory cybersecurity mandates. As has been done in the past, the federal government will now go about identifying what it considers to be “critical infrastructure” and then will prepare for those entities (and others) “voluntary” measures it believes will help increase security. Moreover, the EO explicitly directs the U.S. government to begin planning for the determination that a voluntary program is insufficient, and thus that existing regulatory authority plus new statutory authority will be used to implement mandatory cybersecurity measures. Of course, that is all aspirational and assumes that Congress will grant the Executive Branch the authority to carry out such mandatory programs, which is far from certain.

It seems that the portion of the EO with the greatest impact is the one section that is easy to overlook-the section requiring incorporation of security standards into federal procurements. Considering the volume of business conducted by the federal government, it is easy to foresee that mandatory cybersecurity requirements for entities contracting with the federal government will have be quickly implemented, causing a radical shift in the cybersecurity posture of large portions of the U.S. economy.

It is quite clear from the EO that legislation is still a vital part of this process. Many of the aspirational elements of the EO cannot happen without congressional action, and specific issues such as liability protection were left relatively unaddressed by the EO. Therefore, Congress will continue to play a critical role in how exactly the nation addresses cybersecurity going forward.

Overall, the CyberSecurity EO is the starting signal for a long race involving multiple administrative processes, any of which could result in genuine improvement in the nation’s cybersecurity posture, or something akin to large game of cybersecurity theater, where seemingly powerful directives and plans result in little actual benefit.  It is another critical milestone in the ongoing and increasingly complex effort to combat cyber threats. We will continue to monitor the progress of this initiative and provide key updates and analysis of its impacts on the business sector as developments occur.

Brian Finch is a partner at Dickstein Shapiro LLP, where he heads the firm’s Global Security Practice. He can be reached at [email protected] or 202-420-4823.