Wave of Industrial Cybersecurity Legislation: What CISOs need to know

86
Wave of Industrial Cybersecurity Legislation What CISOs need to

A surge in cyberattacks impacting critical infrastructure and the delivery of services vital to the public well-being has spurred much needed legislations to better protect against these threats. More proposals are likely to come. For CISOs of critical infrastructure organizations and those who work on their behalf, the writing is on the wall.

The past 18 were a series of dramatic developments emerged that highlighted the risks in industrial departments.

The digital transformation accelerated and hyper-connectivity created a much larger attacking surface. It also exposed vulnerabilities that are a boon for threat actors. After the pandemic period, the Ransomware also went corporate.  The threat actors shifted their focus to factory or pipeline locking-up. The lack of a visible response from the US government prompted the hackers to continue to move the line they intended to cross in a negative way.

In response to this combination of factors, the U.S. coalition government has released an unprecedented wave of legislation focusing on better protection of critical infrastructure.

Here are few questions to CISOs should ask themselves as they consider this legislation and look to improve the security posture of the OT environment.

Removing Barriers to Sharing Threat Information 

The CISOs need to ensure that they are using information provided from a specific Information Sharing and Analysis Center (ISAC) or from the cyber security provider to gain visibility into incidents that others see. They also need to ask if they are sharing high-value information back out. 

Critical infrastructure organizations have operated in isolation because of the sensitivity of their environments. For information sharing to become a two-way street, barriers need to be removed. By deploying proper anonymization mechanisms, companies can keep their information secure. The new legislation that includes assurances for companies that information shared will be kept confidential and that they will receive liability protection from being sued for revealing they were attacked, will help move information sharing in the right direction. 

Also Read: Organizations adopting ‘SASE’ to fight Security issues in Hybrid work mode

Enhancing Software Supply Chain Security  

The CISOs need to assess if they have considered leveraging some of these new standards and criteria as part of their software procurement practices? 

The National Institute for Standards and Technology (NIST) has been instructed to publish a definition of “critical software” with low levels of limited access, preparation, and implementation, and developer terms to ensure secure encoding processes. Although this definition originally focused on ensuring that the software acquired by the coalition government works securely, it would have the effect of protecting the software used by both the public and private sectors because the same software is widely used. A clear goal is to increase the level of security and integrity across the software industry.

Establishing a cyber-safety review board. 

The CISOs and the security team needs to ask themselves: Does their company have a culture of continuous improvement in risk and cyber security that drives learnings from their own failures and those of others? 

Just as the National Transportation Safety Board (NSTB) has become the gold standard for understanding ongoing transport incidents and learning to reduce accidents, the online safety review board has the same promise for cyber network services. Having a clean house like the Cybersecurity and Infrastructure Security Agency (CISA), as recommended in a recent bipartisan proposal, updating information after major internet incidents will help reduce the number of internet incidents across all major U.S. infrastructure.

For more such updates follow us on Google News ITsecuritywire News

Previous articleSingapore holds emergency meetings over Log4j
Next articleTop Five Security Predictions to Look Out for in 2022
Swapnil Mishra is a seasoned business news reporter with a passion for cybersecurity and IT security. After watching Edward Snowden's documentary "Citizen 4", Swapnil became fascinated with the importance of privacy not just for individuals but also for institutions, including countries as well as businesses. Since then, she has started writing about data privacy, threat hunting, risk assessment, and other important cybersecurity topics. In her articles, Swapnil focuses on the latest cybersecurity threats and trends, and she emphasizes the need for businesses and organizations to take a proactive approach to cybersecurity. She believes that cybersecurity is not just an IT issue, but a business issue that requires collaboration between different departments and stakeholders. Swapnil's reporting often highlights the potential consequences of cyber attacks, including financial losses, reputational damage, and legal repercussions. She stresses the importance of a comprehensive cybersecurity strategy that includes risk assessments, employee training, incident response plans, and continuous monitoring. She has a keen eye for detail and a knack for breaking down complex technical concepts into easy-to-understand language. When she's not writing about cybersecurity, Swapnil enjoys gardening, reading, traveling, and watching cat videos.