CISA official touts data sharing in critical infrastructure

By Iren Moroz shutterstock ID 566799760 

The increasing tempo of breaches and cyberattacks on critical infrastructure networks is driving privately owned infrastructure providers to share their data with the Department of Homeland Security's cybersecurity agency in increasing numbers, according to one of its top managers.

Privately owned critical infrastructure providers, like power, banking and telecommunications companies, had been slow to share their data on cyberattacks a few years ago, according to Brian Harrell assistant director for infrastructure security at DHS' Cybersecurity and Infrastructure Security Agency (CISA), because of competitive concerns. Things have changed, he told an audience in a speech at Auburn University's McCrary Institute for Cyber and Critical Infrastructure Security on Aug. 23.

Harrell, along with his boss, CISA Director Christopher Krebs both spoke at the university on consecutive days to engineering students on the importance of cybersecurity and infrastructure.

"The incentive is the amount of information and the mitigation strategy, industry best practices and the intelligence" that are the foundation of CISA's mitigation tools, he said in the presentation. The free tools help critical infrastructure providers shield their networks and meld threat data into shared products they can't get elsewhere, he said.

The threat landscape for sharing threat data has completely changed from three to five years ago, said Harrell. "Today, based off the number of events we're seeing, the lessons learned, the [corporate] filings and the board-level attention is driving companies to seek information early and often and share it."

Critical infrastructure can no longer go it alone in cybersecurity, he said.

"If you're doing this in a silo, or with your head in the sand, you are potentially making the situation worse. The response and recovery times are longer" for companies that are slow to collaborate and discover what happened in a cybersecurity incident, he said.

CISA is focused on identifying and assisting critical infrastructure providers with threats that straddle the physical and cyber worlds. For instance, he said, to CISA an "insider threat" to a critical infrastructure company can be someone exfiltrating data to a competitor, or to a nation state, or in some instances ahead of a violent assault on the facility.

To mitigate that activity, data on critical infrastructure networks could be classified to set off "alarm bells" on providers' networks not only if data leaves the network, but also if data is being used in non-routine ways. Repeated access attempts with security cards at facility doors could be testing for an attack or infiltration, according to Harrell.

Critical infrastructure managers are becoming more aware of those cross-cutting issues, but they have to be more focused on them, he said.

"It's no longer good enough to say, 'We meet with cyber every other Tuesday.' Everything is connected."

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at [email protected] or follow him on Twitter at @MRockwell4.


  • Workforce
    White House rainbow light shutterstock ID : 1130423963 By zhephotography

    White House rolls out DEIA strategy

    On Tuesday, the Biden administration issued agencies a roadmap to guide their efforts to develop strategic plans for diversity, equity, inclusion and accessibility (DEIA), as required under a as required under a June executive order.

  • Defense
    software (whiteMocca/

    Why DOD is so bad at buying software

    The Defense Department wants to acquire emerging technology faster and more efficiently. But will its latest attempts to streamline its processes be enough?

Stay Connected