thehill.com Open in urlscan Pro
151.101.1.91  Public Scan

Submitted URL: https://hello.zscaler.com/api/mailings/click/PMRGSZBCHIYTENRRGQ4TSOBMEJ2XE3BCHIRGQ5DUOBZTULZPORUGK2DJNRWC4Y3PNUXW64DJNZUW6...
Effective URL: https://thehill.com/opinion/cybersecurity/4049481-the-guam-hack-should-be-a-cybersecurity-wakeup-call/
Submission: On June 28 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

https://thehill.com/

<form role="search" class="search-form site-header__search-form" action="https://thehill.com/" data-module-type="site-search" data-link-category="Site Search">
  <span class="screen-reader-text"></span>
  <div class="search-form__fields">
    <input type="search" name="s" placeholder="">
    <input type="submit" name="submit" value="Search">
  </div>
</form>

GET https://nxslink.thehill.com/join/signup

<form action="https://nxslink.thehill.com/join/signup" method="get">
  <div class="network-footer__newsletter__form">
    <input placeholder="Your Email" type="text" id="edit-email" name="email" value="" size="60" maxlength="128" class="network-footer__newsletter__email-address">
    <input type="submit" id="edit-submit--2" name="op" value="Send" class="network-footer__newsletter__submit">
  </div>
</form>

Text Content

Skip to content
Toggle Menu Open Navigation Close Navigation
 * 
   Close search form
 * News
    * Senate
    * House
    * Administration
    * Courts
    * Campaign
    * 2024 Elections
    * Health Care
    * Media
    * Education
    * Latino
    * LGBTQ
    * Race & Politics
    * State Watch
    * In The Know
    * Changing America
    * People in the News
    * Print Edition

 * Policy
    * Defense
    * Energy & Environment
    * Health Care
    * Technology
    * Transportation
    * International
    * Cybersecurity
    * National Security
    * Space
    * Sustainability

 * Business
    * All business news
    * Budget
    * Economy
    * Personal finance
    * Housing
    * Lobbying
    * Taxes
    * Trade

 * Opinion
    * Columnists
    * Congress Blog
    * All Contributors
       * Campaign
       * Civil Rights
       * Criminal Justice
       * Cybersecurity
       * Education
       * Energy and Environment
       * Finance
       * Healthcare
       * Immigration
       * International
       * Judiciary
       * National Security
       * Technology
       * White House
   
    * Submit Opinion Content

 * Events
    * Upcoming Events
    * About

 * Jobs
    * The Hill Jobs
    * National Jobs

 * Hill TV
 * Newsletters
    * Sign up
    * Morning Report
    * 12:30 Report
    * Business & Economy
    * Defense
    * Health Care
    * Campaign Report
    * Technology
    * Energy & Environment
    * Sustainability


 * SIGN UP TO OUR LATEST NEWSLETTER
   
   Sign Up
 * Search Search




TRENDING:

 * Kevin McCarthy
 * 2024 Elections
 * Special Report: Cancer


SPONSORED:

 * Content from IASIC on Cannabis
 * Content from AT&T


JUST IN...

 * Biden talks ‘Bidenomics’
   Evening Report - 2m 20s ago
 * Poland sees rising danger with Wagner’s presence in Belarus
   International - 5m 5s ago
 * DeSantis calls Trump criticism of dueling New Hampshire events ‘bizarre’
   Campaign - 9m 26s ago
 * DeSantis suggests he would eliminate several federal agencies, including IRS
   Campaign - 10m 14s ago
 * McCarthy races to repair relationship with Trump
   House - 19m 4s ago
 * Trump to be joined by Graham, McMaster for South Carolina event
   Campaign - 36m 6s ago
 * Madonna delays tour amid hospitalization from bacterial infection
   In The Know - 55m 2s ago
 * More Democrats would consider a third-party presidential candidate: poll
   Campaign - 1h 6m ago

View all Load more

Opinion>Cybersecurity
The views expressed by contributors are their own and not the view of The Hill


THE GUAM HACK SHOULD BE A CYBERSECURITY WAKEUP CALL

by Peter Altabef and Reece Kurtenbach, opinion contributors - 06/15/23 9:00 AM
ET

Facebook Share Twitter Tweet
 
... More
by Peter Altabef and Reece Kurtenbach, opinion contributors - 06/15/23 9:00 AM
ET

Facebook Share Twitter Tweet
 
... More
Share ✕
Twitter Twitter
Facebook Facebook
LinkedIn LinkedIn
Whatsapp Whatsapp
Email Email

Defense Information Systems Agency Director, U.S. Air Force Lt. Gen. Robert
Skinner, testifies before a Senate Armed Services Subcommittee on Cybersecurity
hearing to examine enterprise cybersecurity to protect the Department of Defense
information networks, Wednesday, March 29, 2023, on Capitol Hill in Washington.
(AP Photo/Manuel Balce Ceneta)

The U.S., along with its key “Five Eyes” intelligence partners, issued an
unusual joint statement last month that a Chinese government espionage group had
hacked into critical infrastructure systems in Guam. Although the systems remain
intact, the agencies are concerned that the hackers’ goal could be to disrupt or
prevent communications between the U.S. and Asia during a military confrontation
in the region.

Importantly, the hack was discovered by Microsoft, which then shared the
information with the government. This demonstrates the most important point for
deterring and responding to increased challenges to our critical
infrastructure’s cybersecurity: Public-private collaboration is an indispensable
condition for success.



The Guam event is not an isolated threat: Microsoft has also reported that the
share of cyberattacks by nation-states targeting critical
infrastructure rose from 20 percent to 40 percent in just one year, from 2021 to
2022.

U.S. critical infrastructure systems’ vulnerability reflects a sobering reality:
The vast majority of the nation’s infrastructure systems are privately owned and
operated. Nearly 170,000 separate entities make up the country’s water and
wastewater systems, for instance, and each must be secure and resilient to
protect the communities they serve. But many are owned by small- and
medium-sized organizations that often lack the kind of robust cyber defenses
necessary to keep pace with rapidly evolving threats.

Disruption of any of those systems would threaten national security, economic
stability and public health. Yet, they remain at risk as geopolitical threats
rise. According to the 2023 Annual Threat Assessment from the Office of the
Director of National Intelligence (DNI), nation-states — in particular, China,
Russia, North Korea and Iran — and criminal groups, which are converging more
and more with nation-state actors, pose the most significant cyber threats to
U.S. critical infrastructure. 

The recognition of that threat is rising. In January, The Conference Board
(where we are trustees of the Committee for Economic Development and co-chairs
of the technology and innovation committee) released a 2023 C-Suite Outlook
that showed that over 80 percent of global CEOs believe that cyberattacks will
intensify over the coming year outside the Ukraine war theater.

Sharing information on threat detection, mitigation and remediation is crucial
to fortifying the critical infrastructure ecosystem. Forums involving both the
private sector and government have shown early signs of success through the
“Shields Up” initiative, which provides recommendations and resources to help
keep stakeholders informed about threats and other CISA initiatives. These
efforts have largely been voluntary thus far, however. There are few
requirements today for reporting cyberattacks, even for breaches of critical
systems. The Cyber Incident Reporting for Critical Infrastructure Act, which
Congress passed in March 2022, will change that. But a final rule implementing
reporting procedures is not due to be released until September 2025. We must
expedite that timeline to the degree possible and ensure that the rule is
developed in collaboration with the private sector.

We must also develop minimum cybersecurity standards for critical infrastructure
firms. Zero Trust models, including simple steps such as multifactor
authentication, should be standard practice. According to IBM’s 2022 Cost of
Data Breach report, 79 percent of critical infrastructure organizations have not
adopted Zero Trust, highlighting a clear weakness in security practices.



Implementing new frameworks for incident reporting and minimum requirements
requires close interaction between government regulators and the private sector.
We should make every effort to harmonize new standards to avoid conflicts with
various preexisting federal, industry and local requirements. Harmonization also
lowers the barrier to compliance and promotes quicker adoption.

It is also essential to identify and prioritize the vulnerable sites and
components in each sector where a breach could cause the most significant
economic damage and develop resiliency strategies to mitigate the impact of a
cyberattack. Prioritizing these entities should require each to perform
comprehensive reviews of their supply chains of components, assessing risks
based on factors related to the country of origin, the manufacturer’s record and
the component’s sensitivity if compromised. The federal government should make
more resources, including technical assistance and vulnerability assessments,
more widely available to address the challenges facing small- and medium-sized
businesses as well as state and local governments that lack adequate resources
and staff to implement robust cyber defenses.

Policymakers must also recognize that the cybersecurity challenge will not be
solved by a single framework or one-time investment, but instead, will be a
continuous challenge as threats evolve. Additional federal resources are needed
to propel research in advanced technologies, including quantum-resistant systems
and artificial intelligence applications for cyber defense, and the private
sector should increase investments as well. Most urgently, the nation must scale
up the U.S. cyber workforce, equipping workers with the necessary skills and
tracks for continuous learning to keep pace with the evolution of threats.



As the number and sophistication of cyberattacks grow, the country must focus on
bolstering the security and resilience of its critical infrastructure — before
that resilience is tested on a large scale. The key to success is closer
collaboration between the public and private sectors. We especially need more
robust information sharing in both directions on threats and attacks, minimum
cybersecurity standards, new frameworks for incident reporting and the
development of minimum standards and means to identify vulnerabilities in
advance, including comprehensive reviews of supply chains and building
resiliency to minimize the damage and time for getting back up and operating.

Something is rotten in the state of Russia Why Europe and America are going in
opposite directions on youth transgender medicine

Peter Altabef is chair and chief executive officer of Unisys.

Reece Kurtenbach is the president, chairman and chief executive officer of
Daktronics.



The authors are trustees of the Committee for Economic Development of The
Conference Board and co-chair its technology & innovation committee.

Tags Critical infrastructure protection cyberattacks Cybersecurity and
Infrastructure Security Agency Politics of the United States

--------------------------------------------------------------------------------

Copyright 2023 Nexstar Media Inc. All rights reserved. This material may not be
published, broadcast, rewritten, or redistributed.

Facebook Share Twitter Tweet
 
... More
Share ✕
Twitter Twitter
Facebook Facebook
LinkedIn LinkedIn
Whatsapp Whatsapp
Email Email




MORE CYBERSECURITY NEWS


SEE ALL

Cybersecurity


THERE’S NO WINNING THE CYBER WAR — BUT THAT’S OK

by Jeff Greene, opinion contributor 1 day ago
Cybersecurity  /  1 day ago
See All



VIDEO/HILL.TV


SEE ALL HILL.TV


SEE ALL VIDEO

Rising


RISING: JUNE 28, 2023

by TheHill.com 06/28/23 11:58 AM ET
Rising  /  5 hours ago
Rising


RISING: JUNE 27, 2023

by TheHill.com 06/27/23 11:20 AM ET
Rising  /  1 day ago
Rising


RISING: JUNE 26, 2023

by TheHill.com 06/26/23 11:25 AM ET
Rising  /  2 days ago
See all Hill.TV See all Video



TOP STORIES


SEE ALL

House


MCCARTHY RACES TO REPAIR RELATIONSHIP WITH TRUMP

by Mychael Schnell and Mike Lillis 19 mins ago
House  /  19 mins ago
Education


STUDENT DEBT RELIEF: WHICH WAY WILL THE SUPREME COURT GO?

by Lexi Lonas and Zach Schonfeld 3 hours ago
Education  /  3 hours ago
Senate


RETIREMENT TALK SURROUNDING THOMAS, ALITO RAISES STAKES FOR 2024 ELECTION 

by Alexander Bolton 11 hours ago
Senate  /  11 hours ago
Senate


BIDEN MOCKS TUBERVILLE FOR TOUTING BROADBAND FUNDING HE VOTED AGAINST 

by Alexander Bolton 6 hours ago
Senate  /  6 hours ago
See All


MOST POPULAR

 1.  Student debt relief: Which way will the Supreme Court go?
 2.  Retirement talk surrounding Thomas, Alito raises stakes for 2024 election 
 3.  Biden mocks Tuberville for touting broadband funding he voted against 
 4.  Congress doubles down on explosive claims of illegal UFO retrieval programs
 5.  Hunter Biden IRS whistleblower defends claims that counter DOJ statements
 6.  White House picks fight with Greene over funding
 7.  Americans are hiding their credit card debt
 8.  Fox News host suggests Trump may have leaked audio in classified documents
     ...
 9.  Supreme Court set to end limbo over Biden’s student debt plan
 10. McCarthy races to repair relationship with Trump
 11. McCarthy feels the heat as frustrated conservatives grow more aggressive
 12. Why Europe and America are going in opposite directions on youth
     transgender ...
 13. Judge signals he’ll let Trump hush money case stay in state court
 14. Trump launches FairTax attacks while supporters in House push for bill
 15. Biden administration announces $7 billion residential solar grant program
 16. Eastman says Supreme Court decision makes argument ‘murkier’ in 2024
 17. Student loan debt: Borrowers brace for Supreme Court decision
 18. Christie labels Trump ‘the cheapest S.O.B I’ve ever met in my life’

Load more




VIDEO


 * WATCH LIVE: WHITE HOUSE PRESS BRIEFING
   
   Video


 * WATCH LIVE: FED CHAIR POWELL TESTIFIES ON MONETARY POLICY REPORT 
   
   Video


 * WATCH LIVE: WHITE HOUSE PRESS BRIEFING
   
   Video

See all Video





DON'T MISS A BRIEF. SIGN UP FOR OUR DAILY EMAIL.



NEWS

 * 2024 Elections
 * Senate
 * House
 * Campaign
 * Administration
 * Regulation
 * Media
 * Briefing Room
 * Latino
 * 12:30 Report
 * Coronavirus Report
 * Floor Action
 * In The Know
 * Sunday Talk Shows
 * More
 * more


POLICY

 * Defense
 * Energy & Environment
 * Health Care
 * Technology
 * International
 * Transportation
 * Cybersecurity
 * National Security
 * Sustainability
 * More


VIDEO

 * Latest
 * Defense
 * Energy & Environment
 * Healthcare
 * Technology
 * Transportation
 * International
 * Cybersecurity
 * National Security
 * Sunday Shows
 * Events
 * More


OPINION

 * Contributors to The Hill
 * Columnists
 * Congress Blog
 * More


RESOURCES

 * The Hill Apps
 * People
 * RSS


OTHER AREAS

 * Galleries
 * The Hill Jobs
 * National Jobs


CONTRIBUTORS

 * Submit Opinion Content

Follow Us On
Visit our Facebook page
Visit our Twitter profile
Visit our LinkedIn profile
Visit our Haystack News
Get the App
Get the Android app from Google Play
Get the iOS app from App Store
 * SUBSCRIPTIONS
 * PRIVACY POLICY
 * TERMS & CONDITIONS
 * CONTACT
 * ADVERTISE
 * 
 * NewsNation
 * BestReviews
 * Nexstar Digital
 * Journalistic Integrity
 * Do Not Sell or Share My Personal Information

THE HILL 1625 K STREET, NW SUITE 900 WASHINGTON DC 20006 | 202-628-8500 TEL |
202-628-8503 FAX

© 1998 - 2023 Nexstar Media Inc. | All Rights Reserved.

✕