{"id":211265,"date":"2017-08-11T18:09:54","date_gmt":"2017-08-11T22:09:54","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/securing-our-nations-critical-infrastructure-takes-a-villageand-automation-cso-online\/"},"modified":"2017-08-11T18:09:54","modified_gmt":"2017-08-11T22:09:54","slug":"securing-our-nations-critical-infrastructure-takes-a-villageand-automation-cso-online","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/securing-our-nations-critical-infrastructure-takes-a-villageand-automation-cso-online\/","title":{"rendered":"Securing Our Nation&#8217;s Critical Infrastructure Takes A Villageand Automation &#8211; CSO Online"},"content":{"rendered":"<p><p>    Huge malware and ransomware attacks often grab the headlines,    with WannaCry and NotPetya as recent high profile examples.    News cycles endlessly discuss who was affected, how these    attacks occur, and what can be done about it. For many    organizations and individuals, the loss of a network or the    compromise of data is big news and really important.  <\/p>\n<p>    At the same time, however, we tend to take the services    provided by our critical infrastructure resources for granted.    We flip a switch and the lights and air conditioning turn on.    We turn the tap and fresh, clean water pours out. Goods are    delivered, airplanes land on time, and the stock market hums    along. But the risks and security of these critical    infrastructure resources often flies under the radar.  <\/p>\n<p>    We may sometimes hear about the targeting of an electrical grid    in far off places, but the potential for high-profile    cyberattacks on the 16 critical infrastructure sectors    identified here in the United States, and the resulting    ramifications, are not in the American publics psyche to the    degree they should be.  <\/p>\n<p>    Malicious cyber activity targeted at the nations critical infrastructure  including    water systems, transportation, energy, finance, and emergency    services  are particularly worrisome because the interruption    of those services can have devastating effects on our economy,    impact the well being of our citizens, and even cause the loss    of life.  <\/p>\n<p>    Hackers have a variety of motivations for cyberattacks     mischief, bullying, and financial gain among them. However, for    our critical infrastructure sectors, attacks can also come from    highly motivated cyberterrorists or hacker groups affiliated    with nation states or political factions looking to further    their cause or establish a military or strategic    advantage.  <\/p>\n<p>    In some cases, these attackers might want to dramatically    disrupt public services; in other cases, their goals are much    darker, such as wanting consumers to lose faith in the nations    financial sector.  <\/p>\n<p>    There have been documented attacks on critical infrastructure,    such as two successful efforts to disrupt the Ukraine power    grid in 2015 and 2016. But such events have always seemed    safely far enough away. However, this past July, the U.S.    government warned nuclear power plants about escalated attacks    on their facilities. Such warning ought to make people sit up    and take notice. With critical infrastructures increasingly    online, interconnected to other resources, and often in the    hands of private industry, its time that we elevate this    conversation.  <\/p>\n<p>    The challenge, however, is that in many cases attacks on the    critical infrastructure are less than obvious. Many of these    intrusions are low and slow. These subtle attacks  often    resulting in incremental changes to the compromised system     worry many security experts because theyre so hard to detect    incrementally. Its relatively easy to recognize when major    attacks happen, and the victims can then move to counter them.    But sophisticated intrusions often subtly work together to    eventually become a strategic liability to our country. Imagine    a series of malicious activities that, once in place, are able    to affect a regions ability to provide a reliable water    supply, safely transport oil and gas, or provide timely    emergency services.  <\/p>\n<p>    So what can be done?  <\/p>\n<p>    The United States critical infrastructure is owned and    operated by thousands of entities, and the security problem is    so interdependent and complex that were often paralyzed in    determining where to start. To move forward, then, lets recall    the Chinese proverb: The journey of 1,000 miles starts with one    small step.  <\/p>\n<p>    We need to start by getting security practitioners, critical    infrastructure operators, and other groups to agree that    securing these sectors is a 10-year problem, not a one-year    problem.  <\/p>\n<p>    Next, protecting our critical infrastructure requires a team    effort. The Government cant solve the problem (critical    infrastructures are primarily owned and operated by the private    sector), and private companies cant be expected to take on    other nations cyber militaries. By starting to work together    in small ways, broadening security expertise, and conducting    joint cyber projects, industry and government can begin to    develop the muscle memory necessary to tackle bigger    things.  <\/p>\n<p>    Several critical infrastructure sectors need to start by    developing better ways to automatically share threat and    vulnerability information within their industries  one mans    detection is another mans prevention. While some sectors have    made serious progress in this area, others have lagged behind.    And as critical infrastructure resources continue to become    interconnected, the weakest link problem becomes increasingly    relevant.  <\/p>\n<p>    Companies also need to focus more on exploring all dimensions of their risk; too    often we focus only on Vulnerabilities and Threats. They need    to also ask: What are the bad consequences Im trying to    avoid? Consequence-based engineering, the practice of    engineering out all the potential bad outcomes from the    beginning of the system design process, needs to become the    standard for the development of all critical infrastructure    architectures, whether physical or virtual.  <\/p>\n<p>    Finally, critical infrastructure operators need to increasingly    embrace security automation strategies to complement their    safety-oriented operational technology strategies. The best way    find the incremental intrusions and respond in a coordinated    and comprehensive fashion is through automation. Human eyes    often cant see the low-and-slow attacks, and we cant respond    fast enough once a breach has been detected.  <\/p>\n<p>    Its well-documented that the IT industry is in the midst of a    digital revolution that is impacting all segments of the    economy, from how people work and interact, to how governments    serve their citizens. But less appreciated is the fact that    were also on the verge of a security revolution:  <\/p>\n<p>    Security strategy is one of ubiquity, integrated to work as a    contiguous system and powered by automation.  <\/p>\n<p>    So, in a variation of the it takes a village to raise a    family saying, developing a strategic approach to critical    infrastructure security takes a critical mass of cooperating    people who leverage the best of breed technologies and    strategies to ensure our infrastructures not just survive, but    thrive. At the same time, we need to better manage the problem    of complexity so that it doesnt overwhelm network operators.    Automated security systems, managed by a strong guild of    security professionals who practice working together in times    of non-crisis will be able to meet the needs of the villagers    they serve - at digital speeds, and without compromising    security.  <\/p>\n<p>    Watch Phils recent video where he discusses the    strategic nature of attacks against critical infrastructure and    the actions necessary to bring focus on finding effective    security measures.   <\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.csoonline.com\/article\/3215233\/security\/securing-our-nation-s-critical-infrastructure-takes-a-village-and-automation.html\" title=\"Securing Our Nation's Critical Infrastructure Takes A Villageand Automation - CSO Online\">Securing Our Nation's Critical Infrastructure Takes A Villageand Automation - CSO Online<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Huge malware and ransomware attacks often grab the headlines, with WannaCry and NotPetya as recent high profile examples.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/securing-our-nations-critical-infrastructure-takes-a-villageand-automation-cso-online\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187732],"tags":[],"class_list":["post-211265","post","type-post","status-publish","format-standard","hentry","category-automation"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211265"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=211265"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211265\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=211265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=211265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=211265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}