HomeCyber BalkansCooperation: Public-Private and Interagency Collaboration

Cooperation: Public-Private and Interagency Collaboration

Published on

spot_img

The US government’s National Cybersecurity Strategy, released in March, emphasizes the need for public-private cooperation in strengthening the country’s cyber defenses. Stephen Kovac, Zscaler’s vice president and chief compliance officer, emphasizes this collaborative approach and highlights the roles that the government and private industry must play in combatting cyber threats. Kovac states that cybersecurity is too complex and important to be left to any single entity, and that international cooperation is necessary to combat borderless cyber crimes like ransomware.

Kovac calls on the federal government to invest in the private sector in order to develop new technologies that can detect and address cybersecurity threats. He also urges the private sector to improve supply chain security, adhere to government guidelines, and hire and train employees with cybersecurity knowledge. Additionally, Kovac recommends implementing advanced security measures like zero trust and sharing best practices and new developments with the government for the benefit of all organizations. These efforts will require additional resources, and while government funding is underway, companies should prepare by identifying their security needs and utilizing free resources provided by the Cybersecurity and Infrastructure Security Agency.

Leslie A. Beavers, Principal Deputy Chief Information Officer at the Department of Defense (DoD), echoes the importance of collaboration in achieving America’s cybersecurity goals. She states that the current digital landscape presents a “whole of government, almost whole of society threat” that requires everyone to be part of the solution. Beavers highlights the DoD’s involvement in various cybersecurity initiatives, including the implementation of a zero-trust framework. She emphasizes the need to retain top-notch cybersecurity personnel and acknowledges the DoD’s reliance on civilian infrastructure, companies, and other government organizations.

Ted Miracco, CEO of Approov Mobile Security, welcomes the emphasis on cooperation and information sharing, particularly when countering state-sponsored cyberattacks from adversaries like China and Russia. Miracco believes that collaboration between the US government and private sector cybersecurity companies is crucial in addressing these complex challenges that can impact national security and the economy. Jason Keirstead, VP of Collective Threat Defense at Cyware, also praises the DoD’s focus on collaboration, stating that it is essential for producing tangible cybersecurity improvements. Keirstead emphasizes that collective defense enables trusted collaboration both within and outside organizations, reducing the attack surface for adversaries.

At the Billington Cybersecurity Summit, Karl Mathias, the chief information officer for the US Department of Health and Human Services (HHS), highlights the importance of cyber coordination in the health sector. He discusses the role of the HHS’s Health Sector Cybersecurity Coordination Center (HC3) in facilitating information sharing. HC3 was created in response to Congress’s concerns about the need for improved collaboration between HHS and healthcare and public health sector partners. Mathias emphasizes the need to share data and apply cybersecurity principles to effectively address cybersecurity challenges.

In conclusion, public-private cooperation is a critical component of the US National Cybersecurity Strategy. Industry and government must work together to strengthen the country’s cyber defenses, invest in research and development, improve supply chain security, and share best practices and new developments. Collaboration is also key in achieving America’s cybersecurity goals within the Department of Defense and the health sector. By working together, the country can effectively address cyber threats and ensure the protection of critical infrastructure and sensitive data.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...