In the wake of the Russian military invasion of Ukraine, fear of cyberwarfare has risen among the American public, many of whom still have the Colonial Pipeline ransomware attack fresh on their minds. In response, the U.S. government is seeking not only to address these events, but also to raise awareness and security compliance for American entities in the face of potentially devastating cyberattacks closer to home.
In March, U.S. President Joe Biden signed an unprecedented yet much-needed cybersecurity bill into law, which will provide a framework for operational networks dealing with federal infrastructure and civilian agencies.
Passed in the Senate with unanimous support, the Strengthening American Cybersecurity Act of 2022 creates reporting requirements for critical infrastructure and covered entities. While individual local and state governments have their own compliance frameworks and laws governing breach response, the act enforces uniformity within networks which contain sensitive data that is critical to national security.
The byproduct of this new vigilance on cybersecurity underscores a systematic, risk-based approach to threat mitigation, and it is taking hold at the federal level.
The act requires the following while reporting incidents:
Giving notice to Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours.
A complete description of the incident and vulnerabilities exploited, as well as which defense systems were in place.
If known, contact information or additional details about the responsible parties.
The type of potentially compromised information.
Details and contact information for the impacted entity.
While the act will not immediately affect companies operating outside of critical infrastructure, all entities should bear in mind that implementing and upkeeping proactive cybersecurity practices are essential steps for risk assessment and mitigation.
It is not clear at this point when the standards outlined in this legislation will impact the private sector, but early assessments of the likelihood and impact of these risks, as well as allocating resources appropriately, will protect businesses of all sizes from future threats.
Organizations should take the time now to assess their cybersecurity policies and – if found to be lacking – formalize standards and practices to protect their enterprise.
Some first steps in this process include:
Implementing zero trust architecture – Gone are the days of unregulated network access regardless of role. Zero trust restricts access controls within the operational environment, networks, applications, and the technology environment by allowing the minimum necessary access to enhance network security.
Personal and company mobile security – Unfettered access to private, company networks on unaccounted and unprotected devices increase the risk for cybersecurity incidents. These devices can be properly maintained with a practical yet enforceable bring your own device (BYOD) policy.
Quantitative metrics – Quantified operational cyber risk makes stakeholders more likely to spend on solutions to reduce risk exposure and costs by aligning with best practices. Gathering and disseminating this information is vital when implementing a comprehensive cybersecurity program.
Legal frameworks like the Strengthening American Cybersecurity Act of 2022 are a major proactive step in addressing the potential impact a cyberattack could have on the American public and private infrastructure.
By outlining regulations at the federal level with existing local notification laws, impacted parties can work in a cyber environment meant to reduce the operational silos impacting knowledge of vulnerabilities, individual risk, and threat actor profiles.
If you have any questions about the information above, please contact your BinaryNetworks representative. For a cybersecurity assessment or more information, contact our sister company, BinaryLab, at 301-337-3131.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category .
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Analytics" category .
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
The cookie is set by the GDPR Cookie Consent plugin to record the user consent for the cookies in the category "Functional".
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Necessary" category .
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
Set by the GDPR Cookie Consent plugin, this cookie is used to store the user consent for cookies in the category "Others".
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
Set by the GDPR Cookie Consent plugin, this cookie is used to store the user consent for cookies in the category "Performance".
This cookie is set by Wufoo for load balancing, site traffic and preventing site abuse.
This cookie is native to PHP applications. The cookie is used to store and identify a users' unique session ID for the purpose of managing user session on the website. The cookie is a session cookies and is deleted when all the browser windows are closed.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.
Set by Google to distinguish users.
Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.
YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data.
Vimeo installs this cookie to collect tracking information by setting a unique ID to embed videos to the website.