Four Ways Leaders Can Defend Against Cyberthreats
Ā by Andrew Warren
Itās been a season of harrowing news for U.S. cybersecurity. In December, we learned that a group of hackersāalmost certainly Russian agentsāinfiltrated SolarWinds, a Texas-based IT firm, granting it access to nine federal agencies and a growing list of private companies. Then, in March, another breach: this time it was Microsoft, which announced that Chinese hackers had exploited vulnerabilities in their Exchange email servers, compromising hundreds of thousands of organizationsā data. Add to this the ransomware attack in May that caused the disruption of the largest energy-pipeline system serving the East Coast.
These cyberattacks have unnerved experts because of their size and scope, but also because the first two were launched from within the United States itselfāon servers run by Amazon and GoDaddy, among othersāallowing the hackers to bypass the governmentās warning systems, which are legally prohibited from surveilling domestic networks. (It was FireEye, a private firm, and not the U.S. government cybersecurity organizations tasked with the defense of networks or identifying the activities of cyber actorsālike the DHS, FBI, NSA, or U.S. Cyber Commandāthat discovered the breach at SolarWinds.)
The attacks have led some to reconsider the relationship between government and industry when it comes to protecting against future attacks.
āWhat this shows is that you canāt build a strategy around āthe government will take care of itself, and the private sector will take care of itself, with some level of collaboration between the two,āā says , a retired four-star admiral who led U.S. Cyber Command and the National Security Agency. āThat has largely been the strategy to date, but that approach isnāt optimal, and our adversaries are taking advantage. Theyāre adapting, and weāre not keeping up.ā
President Biden recently announced an mandating that any software vendor that serves government agencies must adopt a range of security measures, including data encryption and multifactor authentication. They must also immediately notify the federal government of any breaches.
For Rogers, a senior fellow at Kellogg, this is a good start, but thereās still plenty that could be done to bolster cybersecurity across the public and private sectors. āItās not about collaboration,ā he says. āItās about integration. The only way to defend ourselves in real time is to work together 24/7. That way, as either party comes up with potential cyber activity, we can respond in real time, not weeks or months later.ā In the case of SolarWinds, the hackers were in the networks for nine months before they were detected.
So what should businesses leaders understand about their role in this new era of enhanced cyber-vulnerability?
Here are four lessons they can draw in light of the recent threats.
1. Create a culture of proactivity and accountability.
Having served as a commander in charge of the Department of Defenseās cybersecurity operations, Rogers sees a number of lessons business leaders might draw from the militaryās experience. But ultimately, they boil down to this: be proactive.
āDonāt assume that a nation state has no interest in targeting youātheyāll target anyone they believe has something of value to them, and you may also become an unintended victim,ā Rogers says.
Given the amount of risk involved, itās critical for organizations to deliberately and methodically think through how they can protect themselves and how theyāll respond if they believe they have been targeted. āIn the military, we would invest time, resources, and personnel to anticipate potential threats. Weād perform regular exercises, simulating a state actor penetrating our networks, testing for vulnerabilities. Our motto was āplans are nothing, planning is everything,āā he says.
Exactly what such exercises or simulations might look like will differ from one organization to the next. But a good step for all companies is to create a culture of accountability.
āItās amazing how accountability can influence peopleās behavior,ā he says. āAnd since cybersecurity is everyoneās issue, itās important that leaders and organizations hold themselves accountable for protecting critical networks.ā
In part, this means that all leadersāeven those who are not tech savvyāneed to take responsibility for guarding against significant hacks.
āI sometimes hear my peers say, āI just donāt know much about cyber.ā But youād never hear a CEO or a Board member say that about financeāeven if that they had never been a CFO. Nobody would ever say, āHey, Iām not a money guy.ā Itās the same way with cybersecurity,ā he says. āIts fundamental to the way every company works.ā
2. Know your digital supply chains.
A key part of being proactive is knowing your digital supply chains. Just as a toxic product can make its way through a physical supply chain, corrupted code can have an enormous ripple effect.
Itās important to recognize that hackers are āusing the very structure of the internet against itself,ā says Rogers.
Consider the regular software update, which is what hackers exploited in the SolarWinds breach. By corrupting the code of SolarWindsā software update, the hackers were able to spy on client companies like FireEye as well as large swathes of the U.S. government, including the Department of Homeland Security.
āWe created this whole system with the idea that downloading software was a good thingāit increases functionality, security. Our ability to download software whenever and wherever we want is central to our economy. The problem is that also means that everyoneās potentially at increased riskāand business leaders should recognize that.ā
This makes it increasingly important for companies to be cognizant of which vendors they are partnering with, and what products they are downloading.
āSupply chains take on a whole different meaning in this hyperconnected digital world,ā Rogers says. āYou want to be sure controls are in place to avoid corruptions or viruses all along the chain. Where are you getting your software? Whoās writing it? Whoās verifying it? Where is it coming from? We donāt tend to think about software when we think about supply chains, but itās clear weāre going to have to.ā
It would also behoove companies to spend more time assessing threats to their operational technology. With more firms automating parts of their manufacturing process and expanding their ability to remotely access parts of their infrastructure and production lines, thereās a growing dependence on having to secure this from exploitation.
Last year, was blindsided by a major ransomware attack that disrupted internal computer networks and shut down global production lines. And thereās growing concern that criminals or state actors will continue to threaten factories and power grids or energy distribution.
āThe more functionality you automate, the more risk you take on,ā Rogers says.
3. Build cyber-resilience.
In the past, cybersecurity was designed as if to protect a castle. The goal was to keep the network safe behind high walls and deep moatsāin other words, to āsecureā the perimeter.
Today this is nearly impossible, in part because of the sheer number of devices connected to each network, and in part because, after COVID, we have all grown more comfortable with accessing work data from home.
āWeāve blown up the perimeter,ā Rogers says, āand our digital footprint is now a blur between business and personal life. This is further exacerbated by the āinternet of thingsā and the drive towards more connectivity.ā
Given thereās now a better chance that an adversary will āget insideā an organizationās network, companies should focus more on building ācyber-resilienceā: processes and mechanisms that allow them to keep functioning in the event of an intrusion.
For example, companies should make updates to their networks randomly and quietly, making it more difficult for adversaries to anticipate their cybersecurity activities. Other steps for increasing resiliency include having a current and accurate understanding of the network topology; aggressively monitoring activity on the network; building backups and redundancy for critical infrastructure; and minimizing the connections between the business segment and operational segments within the companyās IT structure.
And, of course, companies will also need to have a detailed process in place that allows peopleāincluding the leadership teamāto respond quickly if confronted with a cyber event.
āThe Defense Department canāt shut down for a week to secure its network, and most businesses canāt either,ā Rogers says. āSo a good strategy will involve not just walls and moats, but a nimble defense in the event someone gains unauthorized access.ā
4. Prepare to cooperate (yes, even with your competition).
One of the major challenges with improving cybersecurity is that companies often donāt want to admit theyāve been compromised. But cooperation across industries is essential for protecting against attacks.
āEven as they compete with each other, companies need to partner in areas that represent a major risk to their industry as a whole,ā Rogers says, pointing to the example of banks in the wake of the financial crisis.
Here is where the government might be able to play an important role in managing cybersecurity risks, just as it has for many years in managing aviation safety. As a nation, weāve decided that the risk of injury or loss of life from aviation accidents justifies the existence of a government agency, the NTSB, whose job it is to investigate the cause of any aviation accident to determine what caused the accident and then identify the actions necessary to ensure it never happens again. After a crash, an airline or the aircraft manufacturer canāt pretend it didnāt happen or not acknowledge the event, citing proprietary information, or chalk it up to bad luck. In each case, all the parties involved must share company data, training and personnel records, and the maintenance history of the plane. Regulators must also be granted access to the crash site.
āThereās a reason why aviation mishaps donāt tend to recur,ā Rogers says. āThey tend to be unique incidents, and thatās because there are constant changes and updates to safety protocols, manufacturing standards, software configurations, training requirements, and maintenance protocols.ā
In this sense, the NTSB is one potential model for future cybersecurity efforts. But businesses will need to accept the trade-off between protecting their networks and sharing information. The price of corporate reticence is that industries donāt learn the details of how exactly a hack was conducted, which means the same nefarious actors can keep using the same techniques.
āHow many major cyber events will it take before we decide to make fundamental change?ā Rogers says. āWe have to overcome this challenge, or weāll keep having these major events.ā
in Kellogg Insight. Reprinted with permission of the Kellogg School of Management.
Andrew Warren is a writer based in Los Angeles. Michael S. Rogers is an adjunct professor with the Kellogg Public Private Initiative; Senior Fellow.
Editorās note: This article was written before the cyberattack on meat processing plant JBS.
