Enduring Lessons From Securing the Election | Dennis Fisher/Decipher
In the months leading up to the 2020 presidential election, Chris Krebs had a problem. Actually, he had a few, but the biggest one was getting election officials on the state and local level to take the security threat to the integrity of the election seriously. As director of the Cybersecurity and Infrastructure Security Agency (CISA) at the time, Krebs was heading up the effort to assess the security and resilience of the nation’s election infrastructure and look for the kind of soft spots that malicious actors–foreign or domestic–might target. The concern wasn’t so much that actors would go after the electronic voting machines, but rather the computers used to tabulate the votes and the networks on which they sit. Attackers from China, Russia, and other countries whose interests don’t necessarily align with the United States have demonstrated the willingness and ability to penetrate government and private sector networks and remain inside for long periods of time. CISA officials and their colleagues at the FBI and other agencies warned state and local officials about the seriousness of the threat, but the message wasn’t getting through for some reason. Perhaps the spectre of state-sponsored hackers from halfway around the world was too abstract, or maybe there were too many other things to worry about, but the reality of the threats wasn’t landing. So Krebs changed tactics. “You can talk about Russia and China and Iran all day long and when security teams aren’t seeing these actors walking into their environments waving flags, because they’re patient it’s hard to make the sell,” Krebs said during a keynote at the SANS Institute Cyber Threat Intelligence Summit Thursday. “What we were seeing do the most damage was ransomware actors conducting functionally catastrophic attacks. We made a hard pivot from talking about China and Russia to talking about ransomware, and we saw a shift as the light went on that it wasn’t just about state actors, it was about disruptive non-state actors. And to me that was one of the biggest advances we made.”
Full Article: Enduring Lessons From Securing the Election | Decipher