RSA: Has concern over securing critical infrastructure moved beyond data center?

RSA: Has concern over securing critical infrastructure moved beyond data center?

SAN JOSE, Calif. -- The insecurity of the United States' critical IT infrastructure -- financials, energy, water, government -- has been elevated in the consciousness of the country's information technology professionals.

FOR MORE INFORMATION
searchSecurity coverage of RSA Conference 2002

The Best Web Links on infrastructure security

But has securing those crucial IT segments been made a priority beyond the data center?

"It needs to be a corporate priority, not just an IT priority," said Bruce Heiman, executive director of Americans for Computer Privacy, and a Washington D.C. veteran. "Much in the same way as the anthrax letters moved postal security out of the mailroom to the boardroom. I hope it does not take a cyber attack to move this to the attention of senior-level management."

Heiman spoke at this week's RSA Conference 2002 on the state of cybersecurity in D.C. One of the RSA show's principal themes is cybersecurity post-September 11. His group is a coalition of technical companies and individuals who were in the lead during the fight to liberalize export controls on encryption products. For two years, the group's attention has shifted to cybersecurity, in particular, securing the nation's critical infrastructure.

They do so, Heiman said, by monitoring legislative action to ensure consistency to the lawmakers' actions. "There should not be tech mandates coming from D.C in terms of security. Cybersecurity is best accomplished by the private sector. Government and industry should cooperate on a voluntary basis in order to assure that there is no violation of privacy in the quest for infrastructure protection."

September 11 kicked off a firestorm of concern for the nation's critical IT shops and Heiman's group is there to ensure that government does not overstep its bounds in the name of national security, he said.

Most recently, Heiman has been pouring over the Patriot Act and how it applies to government eavesdropping of e-mail and Web surfing. Heiman said that his group succeeded in convincing legislators to include a provision in the Patriot Act that that regulated government's influence over how industry develops or deploys new technology or surveillance capabilities.

Heiman said he spends a considerable amount of time talking to IT managers and is confident they understand the seriousness and reality of a potential cyberattack. Elevating the consciousness of the executive level is another challenge. A bigger challenge may be the sharing of information about system and software vulnerabilities and hacks.

"Now, they don't do much sharing of information because they are worried they will incur liabilities, or if the Freedom of Information Act (FOIA) kicks in, that the competition will benefit from their misfortune," Heiman said.

Several attempts are under way to pass legislation that will ease the FOIA and allow for better sharing of IT information.

In the end, Heiman said that education is one of the best weapons IT managers have to defend critical infrastructure.

"It is an education issue. A cyber terrorism attack is serious and can happen," Heiman said.

And education needs to be used in concert with technology, he added.

"You absolutely need the right technology tools," Heiman said. "You need to deploy the tools and you need to have people use the tools correctly. Passwords don't do you any good if the passwords are all English-language and never change, rather than using some random expression, for example.

"Protecting critical infrastructure requires IT managers to expand their horizons vis-?is potential threats all while protecting the bottom line."

Dig deeper on Security Resources

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close