www.darkreading.com
Open in
urlscan Pro
2606:4700::6810:ddab
Public Scan
URL:
https://www.darkreading.com/vulnerabilities-threats/combating-rise-federally-aimed-malicious-intent
Submission: On November 18 via api from TR — Scanned from US
Submission: On November 18 via api from TR — Scanned from US
Form analysis
0 forms found in the DOMText Content
Dark Reading is part of the Informa Tech Division of Informa PLC Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726. Black Hat NewsOmdia CybersecurityAdvertise Newsletter Sign-Up Newsletter Sign-Up Cybersecurity Topics RELATED TOPICS * Application Security * Cybersecurity Careers * Cloud Security * Cyber Risk * Cyberattacks & Data Breaches * Cybersecurity Analytics * Cybersecurity Operations * Data Privacy * Endpoint Security * ICS/OT Security * Identity & Access Mgmt Security * Insider Threats * IoT * Mobile Security * Perimeter * Physical Security * Remote Workforce * Threat Intelligence * Vulnerabilities & Threats World RELATED TOPICS * DR Global * Middle East & Africa * Asia Pacific See All The Edge DR Technology Events RELATED TOPICS * Upcoming Events * Podcasts * Webinars SEE ALL Resources RELATED TOPICS * Library * Newsletters * Podcasts * Reports * Videos * Webinars * Whitepapers * * * * * Partner Perspectives SEE ALL * Vulnerabilities & Threats * Cybersecurity Careers * Cybersecurity Operations COMBATING THE RISE OF FEDERALLY AIMED MALICIOUS INTENTCOMBATING THE RISE OF FEDERALLY AIMED MALICIOUS INTENT In the future, the cybersecurity landscape likely will depend not only on the ability of federal workforces to protect their agencies but also on their capacity to continuously develop and sharpen those skills. Tony Holmes, Practice Lead, Practice Lead for Solutions Architects in the Public Sector, Pluralsight November 15, 2024 4 Min Read Source: Stuart Miles via Alamy Stock Photo COMMENTARY The public sector is facing a security crisis. The acceleration of deepfake videos, AI-generated threats, and nation-state cyberattacks has put the federal government under increasing pressure to protect its employees, agencies, and the general public. Last year, the FBI, the National Security Agency (NSA), and the Cybersecurity and Infrastructure Security Agency (CISA) released details on the "growing challenge" that deepfake threats present to a range of federal agencies. According to the three groups, "threats from synthetic media such as deepfakes have exponentially increased — presenting a growing challenge for users of modern technology and communications." In addition to national critical infrastructure owners and operators, these users include the National Security Systems, the Department of Defense, and the Defense Industrial Base. What's more, in 2023, the NSA reported that deepfake threats pose "a new set of challenges to national security." According to the NSA, "organizations and their employees need to learn to recognize deepfake tradecraft and techniques and have a plan in place to respond and minimize impact if they come under attack." Effectively managing the combination of cyber threats, misinformation, and disinformation requires coordination across federal agencies. The workforce within these agencies must possess the most up-to-date cybersecurity skills possible. Agencies can position themselves to future-proof cybersecurity strategies and maintain an advantage against threats by training teams on how to outmaneuver malicious actors. Regularly practicing simulated cyberattacks and leveraging predetermined incident response plans to mitigate breaches is crucial. THE PUBLIC SECTOR'S CYBER-AI SKILLS GAP Against the backdrop of this intricate threat landscape, federal agencies need tech-proficient employees with a unique set of skills to ensure protection. As 90% of surveyed IT leaders said they don't completely understand their teams' AI skills and proficiency, there is a clear need for agencies to take action. By promoting training to improve team members' confidence and enhance their skills, leaders can engage themselves in the process and better understand the workforce's strengths and weaknesses. As the country transitions into the post-election period, deepfake threats remain a pressing concern, capable of shaping public perceptions through deceptive content. Federal employees and the agencies they serve must continue to bolster defenses against this and other cyber threats by prioritizing strategic skills development and training. These programs should consider existing proficiencies their teams possess and also foresee what skills are necessary to mitigate threats that may be detrimental to their agencies and the voting public. Agencies can arm their technologists with the tools they need to stay one step ahead of threats by prioritizing skills and implementing active, enterprisewide cybersecurity measures. Efforts to combat cyberattacks at the federal level coincide with the federal government's campaign to promote high-tech career paths across all of its agencies to address tech talent shortages. Last year, the Biden administration launched its National AI Talent Surge to fill open agency positions by recruiting technology professionals who can "bring their experience, expertise, and vision into government." This program brings the deficit of skilled technologists in the public sector into sharp focus. AGENCY WORKFORCES NEED THE SKILLS TO BE VIGILANT AGAINST ATTACKS As cyber threats against government organizations continue, it's critical that agency workforces have the skills they need to recognize threats, and have the know-how to respond when an attack occurs. Earlier this year, Ashley Manning, the US assistant secretary of defense for cyber policy, told a congressional subcommittee about measures the Department of Defense is taking to counter cyber threats. According to Manning, the US faces cyber challenges, including China's targeting of US networks in prolonged espionage campaigns, Russia's use of cyberspace to target critical infrastructure networks, and for-profit cybercriminals who target an array of vulnerable sectors with ransomware attacks that impact American citizens. To guard against cyberattacks, federal agencies must take a holistic approach to ensuring that their teams have the skills to keep their networks and data secure. This includes addressing skills gaps in the workforce, leveraging best practices in cybersecurity, and creating a culture of continuous learning and upskilling. By arming their teams with the best possible defense against threats, agency leaders can empower employees to counteract cyberattacks effectively. CREATE AN ENTERPRISEWIDE KNOWLEDGE BASE TO ENSURE CYBERSECURITY It's critical for agencies to better understand their teams' current cybersecurity knowledge by benchmarking the skill sets of their workforce. Training resources that align with their skills gaps and technologists' needs include providing content created by industry experts, tracking skill acquisition, creating forums or community support, and providing hands-on labs. By implementing individualized learning programs that ensure every employee receives the necessary training, agencies can build a workforce equipped with the skills needed to keep their networks and data as secure as possible. ABOUT THE AUTHOR Tony Holmes Practice Lead, Practice Lead for Solutions Architects in the Public Sector, Pluralsight Pathological problem solver, and serial question asker, a lifelong student of mental models, experienced in creating innovative solutions where analogical ideas meet rigorous socratic method. For more than two decades Tony Holmes has been solving complex problems for some of the largest, and most forward-thinking technology organizations in the world, including British Broadcasting Corporation, Digital Equipment Corporation, Microsoft Research, Opsware, Hewlett Packard, Oracle, and, currently, Pluralsight, the Technology Skills platform for the Government. See more from Tony Holmes Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe You May Also Like -------------------------------------------------------------------------------- Vulnerabilities & Threats C-Suite Involvement in Cybersecurity Is Little More Than Lip Service Vulnerabilities & Threats Microsoft Discloses 10 Zero-Day Bugs in Patch Tuesday Update Vulnerabilities & Threats A Lesson From the CrowdStrike Incident Vulnerabilities & Threats Unexpected Lessons Learned From the CrowdStrike Event More Insights Webinars * Applying the Principle of Least Privilege to the Cloud Nov 18, 2024 * The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response Nov 20, 2024 * Safeguarding GitHub Data to Fuel Web Innovation Nov 21, 2024 * The Unreasonable Effectiveness of Inside Out Attack Surface Management Dec 4, 2024 More Webinars Events * Cybersecurity Outlook 2025 Dec 5, 2024 More Events EDITOR'S CHOICE A laptop screen showing a blue screen of death Сloud Security 2 Zero-Day Bugs in Microsoft's Nov. Update Under Active Exploit2 Zero-Day Bugs in Microsoft's Nov. Update Under Active Exploit byJai Vijayan, Contributing Writer Nov 12, 2024 6 Min Read Red ZERO-DAY text amid yellow binary code Cyberattacks & Data Breaches Zero-Days Win the Prize for Most Exploited VulnsZero-Days Wins the Prize for Most Exploited Vulns byDark Reading Staff Nov 13, 2024 1 Min Read Citrix logo on company building Сloud Security Citrix Patches Zero-Day Recording Manager BugsCitrix Patches Zero-Day Recording Manager Bugs byJai Vijayan, Contributing Writer Nov 12, 2024 5 Min Read Reports * Managing Third-Party Risk Through Situational Awareness Jul 31, 2024 * 2024 InformationWeek US IT Salary Report May 29, 2024 More Reports Webinars * Applying the Principle of Least Privilege to the Cloud Nov 18, 2024 * The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response Nov 20, 2024 * Safeguarding GitHub Data to Fuel Web Innovation Nov 21, 2024 * The Unreasonable Effectiveness of Inside Out Attack Surface Management Dec 4, 2024 More Webinars White Papers * Insider Risk Programs: 3 Truths and a Lie * Solution Brief: Introducing the runZero Platform * The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures * Evolve Your Ransomware Defense * Generative AI Gifts More Whitepapers Events * Cybersecurity Outlook 2025 Dec 5, 2024 More Events DISCOVER MORE WITH INFORMA TECH Black HatOmdia WORKING WITH US About UsAdvertiseReprints JOIN US Newsletter Sign-Up FOLLOW US Copyright © 2024 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. Home|Cookie Policy|Privacy|Terms of Use Cookies Button ABOUT COOKIES ON THIS SITE We and our partners use cookies to enhance your website experience, learn how our site is used, offer personalised features, measure the effectiveness of our services, and tailor content and ads to your interests while you navigate on the web or interact with us across devices. By clicking "Continue" or continuing to browse our site you are agreeing to our and our partners use of cookies. For more information seePrivacy Policy CONTINUE COOKIE POLICY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Always Active These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Always Active These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Always Active These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices