www.helpnetsecurity.com Open in urlscan Pro
52.89.104.47  Public Scan

URL: https://www.helpnetsecurity.com/2024/10/24/john-cohen-center-for-internet-security-national-framework-for-action/
Submission: On October 25 via api from TR — Scanned from US

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - editor's choice selection of topics (twice per month)</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1729823169"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Please turn on your JavaScript for this page to function normally.
Mirko Zorz, Director of Content, Help Net Security
October 24, 2024
Share


ENHANCING NATIONAL SECURITY: THE FOUR PILLARS OF THE NATIONAL FRAMEWORK FOR
ACTION



In this Help Net Security interview, John Cohen, Executive Director, Program for
Countering Hybrid Threats at the Center for Internet Security, discusses the
four pillars of the National Framework for Action, emphasizing how these
measures can combat the exploitation of technology and social media by threat
actors.

Cohen argues that a coordinated, whole-of-society approach is essential to
empower communities and counter integrated threats to national security.



CAN YOU WALK US THROUGH THE FOUR PILLARS OF THE NATIONAL FRAMEWORK FOR ACTION,
SPECIFICALLY FOCUSING ON ENHANCING THREAT DETECTION AND INFORMATION SHARING AT
THE NATIONAL LEVEL?

Foreign and domestic threat actors relentlessly take advantage of the
interconnected world, exploiting new technologies and using social media
platforms to conduct operations and promote their narratives. Adversaries and
criminals rely on our inability to address the increasingly integrated
relationship between cyber and physical threats.

We identified four pillars, which provide a framework for law enforcement,
government, and nongovernmental organizations to address the combined use of
cyber attacks, information operations, and physical operations by criminals,
foreign adversaries and domestic threat actors.

To protect our communities and institutions, we must ramp up our ability, as a
nation, to detect emerging threats and rapidly share that information with law
enforcement, national security professionals and other organizations working to
protect their communities. Awareness of the threat is the first step in
preventing violence, stopping criminal activity, and thwarting foreign
interference in our society.

WHAT ARE THE KEY COMPONENTS OF THE WHOLE-OF-SOCIETY APPROACH PROPOSED BY THE
NATIONAL FRAMEWORK FOR ACTION, AND WHY IS NATIONWIDE COORDINATION ESSENTIAL IN
COMBATING THESE THREATS?

Digitally-enabled crime, violence, and national security threats harm far too
many communities. These threats originate from threat actors across the nation
and around the world, potentially impacting with a wide swath of the American
public. Given the enormous scope and scale of the threat, individual communities
and organizations are ill-equipped to solve the problem alone.

An effective response should involve government, academia, community groups,
faith-based organizations, businesses, and other entities, each of which has a
key role in preventing acts of violence and other illegal activity.
Additionally, a concerted effort addressing the increasing use of advanced
computing, such as generative artificial intelligence (GenAI), by foreign and
domestic threat actors, as they engage in cyber, physical, and information
operations will prepare society to counter these threats now and in the future.

HOW IMPORTANT ARE COMMUNITY EMPOWERMENT AND PUBLIC-PRIVATE PARTNERSHIPS IN
ADDRESSING THREATS, AND WHAT ROLE CAN LOCAL GOVERNMENTS AND ORGANIZATIONS PLAY?

The connected world is being leveraged by our adversaries and criminal
organizations to undermine confidence in key institutions in our society, and
it’s having an impact. We see it in our election process. We see it in the way
that our societies are polarized, divided and angry. We see it in ransomware
attacks on our critical infrastructure. It’s a new day, it’s a new game.

Empowering communities to be aware of and prepared for these types of threats
can be a game changer, particularly among populations that are targeted via
online information operations. We found that building resilience is most
successful when local communities lead the effort, including building digital
literacy, expanding critical thinking skills, understanding how social media
companies use algorithms to promote certain content, and expanding civic
engagement. These strategies have been shown to be most effective when trusted
voices, such as veterans, faith leaders, community leaders, and local government
officials, implement them.

Establishing a consortium of national security, public safety, democracy
building, philanthropic, and local government stakeholders will help bridge the
gap between public and private institutions, ensuring that communities have an
equal playing field when responding to nationwide threats. To build these
public-private partnerships we must identify and support organizations that can
credibly engage communities vulnerable to being targeted by threat actors. We
must also facilitate these organizations’ efforts to build resilience. For
example, implementing programs to facilitate and increase civic participation
and delivering tailored threat briefings to ensure specific communities know
that threat actors are trying to manipulate them and why.

WITH AI BECOMING MORE ACCESSIBLE, HOW CAN LAW ENFORCEMENT AND CYBERSECURITY
PROFESSIONALS KEEP UP WITH CRIMINAL GROUPS THAT LEVERAGE AI TOOLS TO ENHANCE
THEIR HACKING OPERATIONS?

AI is enabling criminal groups and our adversaries to develop malware rapidly,
automate attacks, and enhance effectiveness of social engineering attacks and
operations. It is making it easier for less-technically savvy actors to conduct
more sophisticated attacks.

The Center for Internet Security recently assessed that threat actors are almost
certain to increasingly integrate GenAI into influence operations, as well as
cyber and physical attacks. Notably, we have observed state-sponsored threat
actors using GenAI to undermine the U.S. democratic process during 2024 November
General Election season.

We recommend the establishment of a public-private task force to examine the use
of advanced computing capabilities by foreign and domestic threat actors. This
will allow federal, state and local governments, private businesses and
nongovernment organizations to share the most up-to-date threat information,
research and best practices.

HOW ARE BEHAVIORAL THREAT ASSESSMENTS AND MULTI-DISCIPLINARY THREAT MANAGEMENT
STRATEGIES INTEGRATED AT THE COMMUNITY LEVEL TO PREVENT VIOLENT ACTS OR ILLEGAL
ACTIVITIES INSPIRED BY ONLINE CONTENT?

To address the evolving threat environment we must establish a consistent level
of capability across the US for local communities to detect, evaluate, and
manage the risk of violence or other illegal activity by those individuals who
are influenced by malicious online content.

We can do this by supporting local efforts to conduct threat and behavioral risk
assessments and deploy multi-disciplinary threat management strategies. This
whole-of-society effort will require technical assistance, training, and
financial resources to support fostering trusted collaboration between law
enforcement, mental health professionals, community leaders, and others.

This collaboration will help mitigate violent and illegal activity inspired,
informed, and facilitated by online activity. For example, it should include a
national-level consortium comprised of state, local, tribal and territorial
mental health and law enforcement organizations along with civil society
entities—particularly community-level nonprofits—that meet frequently to discuss
best and emerging practices.

It should also include a consistent level of capability across local
jurisdictions to conduct behavioral risk and threat assessments and
multi-discipline threat management programs, as well as consistent grant
guidance from both DHS and U.S. Department of Justice regarding how grants can
be used to support threat assessment and mitigation efforts.





More about
 * Center for Internet Security
 * cybersecurity
 * DOJ
 * Generative AI
 * law enforcement
 * opinion
 * resilience
 * threat detection

Share


FEATURED NEWS

 * Fortinet FortiManager flaw exploited in zero-day attacks (CVE-2024-47575)
 * What’s more important when hiring for cybersecurity roles?
 * Enhancing national security: The four pillars of the National Framework for
   Action

Whitepaper: Securing GenAI



SPONSORED

 * eBook: Cloud security skills
 * Download: The Ultimate Guide to the CISSP
 * eBook: Do you have what it takes to lead in cybersecurity?




DON'T MISS

 * Fortinet FortiManager flaw exploited in zero-day attacks (CVE-2024-47575)
 * What’s more important when hiring for cybersecurity roles?
 * Enhancing national security: The four pillars of the National Framework for
   Action
 * Effective strategies for measuring and testing cyber resilience
 * Argus: Open-source information gathering toolkit




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - editor's choice selection of topics (twice per month)
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2024 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×