• Support
  • Login
  • Contact
  • Blog
  • Support
  • Login
  • Contact
  • Blog
SecurityScorecard SecurityScorecard
  • Products
    PRODUCTS
    • Security Ratings
      Identify security strengths across ten risk factors.
    • Security Data
      Get actionable, data-based insights.
    • Security Assessments
      Automate security questionnaire exchange.
    • Attack Surface Intelligence
      NEW
      On-demand contextualized global threat intelligence.
    • Automatic Vendor Detection
      Uncover your third and fourth party vendors.
    • Cyber Risk Quantification
      Translate cyber risk into financial impact.
    • Reporting Center
      Streamline cyber risk reporting.
    • SecurityScorecard Marketplace
      Discover and deploy pre-built integrations.
    SERVICES
    • Active Security Services
      Test your security controls.
    • Cyber Risk Intelligence
      Partner to obtain meaningful threat intelligence.
    • Digital Forensics & Incident Response
      Prepare to respond to any threat.
    • Third-Party Risk Management
      Reduce risk across your vendor ecosystem.
    BUY NOW
    • Compare All Plans
      Choose a plan that's right for your business.
    • Try Free Account
      Make informed decisions with confidence.
    • Buy Pro Now
      Add automated event responses.
    • Buy Business Now
      Expand on Pro with vendor management and integrations.
    • Request Enterprise Demo
      See the capabilities of an enterprise plan in action.
    icon__SSClogoMark icon__SSClogoMark

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Solutions
    BY USE CASE
    • Compliance
    • Cyber Insurance
    • Digital Forensics
    • Due Diligence
    • Enterprise Cyber Risk
    • Executive-Level Reporting
    • Incident Response
    • Regulatory Oversight
    • Third-Party Risk
    BY INDUSTRY
    • Critical Infrastructure
    • Enterprise
    • Financial Services
    • Government
    • Healthcare
    • Insurance
    • Retail & Consumer
    • Technology
    Help your organization calculate its risk
    View All Solutions
  • Customers
    OUR CUSTOMERS
    • Customer Overview
      Trusted by companies of all industries and sizes.
    • Peer Reviews
      Find out what our customers are saying.
    SUCCESS AND SUPPORT
    • Customer Success
      Receive award-winning customer service.
    • Support
      Get your questions answered by our experts.
    COMMUNITY
    • SecurityScorecard Connect
      Engage in fun, educational, and rewarding activities.
    • Connect Login
      Join our exclusive online customer community.
    icon__SSClogoMark icon__SSClogoMark
    Understand and reduce risk with SecurityScorecard.
    Free account sign up
  • Partners

    Partner Program Overview

    Partner with SecurityScorecard and leverage our global cybersecurity ratings leadership to expand your solution, deliver more value, and win new business.

    Learn more
    • Locate a Partner
      Access our industry-leading partner network.
    • Value-Added Resellers
      Enter new markets, deliver more value, and get rewarded.
    • Managed Service Providers
      Meet customer needs with cybersecurity ratings.
    • ISAC Partner Program
      Learn more about the industries we support and ISAC member benefits.
    • Technology Alliances
      Access innovative solutions from leading providers.
    • SCORE Portal Login
      Use the SCORE Partner Program to grow your business.
    • SecurityScorecard Marketplace
      Find a trusted solution that extends your SecurityScorecard experience.

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Resources
    RESOURCES
    • Resource Center
      Explore our cybersecurity ebooks, data sheets, webinars, and more.
    • SecurityScorecard Blog
      Read the latest blog posts published weekly.
    • Research & Insights Center
      Access our research on the latest industry trends and sector developments.
    • SecurityScorecard Academy
      NEW
      Complete certification courses and earn industry-recognized badges.
    TOOLS AND DOCUMENTATION
    • Free Security Rating
      Get your free ratings report with customized security score.
    • Product Release Notes
      Visit our support portal for the latest release notes.
    • Free Account Signup
      Start monitoring your cybersecurity posture today.
    • Chrome Extension
      NEW
      Show the security rating of websites you visit.
    • Assessments ROI Calculator
      Calculate the ROI of automating questionnaires.
    Trust begins with transparency. Take a look at the data that drives our ratings.
    Learn more
  • Company

    Working at SecurityScorecard

    Committed to promoting diversity, inclusion, and collaboration–and having fun while doing it.

    Join our team
    • About Us
      SecurityScorecard is the global leader in cybersecurity ratings.
    • Leadership
      Meet the team that is making the world a safer place.
    • Press
      Explore our most recent press releases and coverage.
    • Events
      Join us at any of these upcoming industry events.
    • Policy Insights
      Raising the bar on cybersecurity with security ratings.
    • Careers
      APPLY TODAY
      Come join the SecurityScorecard team!
    • Contact Us
      Contact us with any questions, concerns, or thoughts.
    • Trust Portal
      Take an inside look at the data that drives our technology.
    • Help Center
      We are here to help with any questions or difficulties.
Request a demo
SecurityScorecard SecurityScorecard
  • Support
  • Login
  • Contact
  • Blog
  • Support
  • Login
  • Contact
  • Blog
SecurityScorecard SecurityScorecard
  • Products
    PRODUCTS
    • Security Ratings
      Identify security strengths across ten risk factors.
    • Security Data
      Get actionable, data-based insights.
    • Security Assessments
      Automate security questionnaire exchange.
    • Attack Surface Intelligence
      NEW
      On-demand contextualized global threat intelligence.
    • Automatic Vendor Detection
      Uncover your third and fourth party vendors.
    • Cyber Risk Quantification
      Translate cyber risk into financial impact.
    • Reporting Center
      Streamline cyber risk reporting.
    • SecurityScorecard Marketplace
      Discover and deploy pre-built integrations.
    SERVICES
    • Active Security Services
      Test your security controls.
    • Cyber Risk Intelligence
      Partner to obtain meaningful threat intelligence.
    • Digital Forensics & Incident Response
      Prepare to respond to any threat.
    • Third-Party Risk Management
      Reduce risk across your vendor ecosystem.
    BUY NOW
    • Compare All Plans
      Choose a plan that's right for your business.
    • Try Free Account
      Make informed decisions with confidence.
    • Buy Pro Now
      Add automated event responses.
    • Buy Business Now
      Expand on Pro with vendor management and integrations.
    • Request Enterprise Demo
      See the capabilities of an enterprise plan in action.
    icon__SSClogoMark icon__SSClogoMark

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Solutions
    BY USE CASE
    • Compliance
    • Cyber Insurance
    • Digital Forensics
    • Due Diligence
    • Enterprise Cyber Risk
    • Executive-Level Reporting
    • Incident Response
    • Regulatory Oversight
    • Third-Party Risk
    BY INDUSTRY
    • Critical Infrastructure
    • Enterprise
    • Financial Services
    • Government
    • Healthcare
    • Insurance
    • Retail & Consumer
    • Technology
    Help your organization calculate its risk
    View All Solutions
  • Customers
    OUR CUSTOMERS
    • Customer Overview
      Trusted by companies of all industries and sizes.
    • Peer Reviews
      Find out what our customers are saying.
    SUCCESS AND SUPPORT
    • Customer Success
      Receive award-winning customer service.
    • Support
      Get your questions answered by our experts.
    COMMUNITY
    • SecurityScorecard Connect
      Engage in fun, educational, and rewarding activities.
    • Connect Login
      Join our exclusive online customer community.
    icon__SSClogoMark icon__SSClogoMark
    Understand and reduce risk with SecurityScorecard.
    Free account sign up
  • Partners

    Partner Program Overview

    Partner with SecurityScorecard and leverage our global cybersecurity ratings leadership to expand your solution, deliver more value, and win new business.

    Learn more
    • Locate a Partner
      Access our industry-leading partner network.
    • Value-Added Resellers
      Enter new markets, deliver more value, and get rewarded.
    • Managed Service Providers
      Meet customer needs with cybersecurity ratings.
    • ISAC Partner Program
      Learn more about the industries we support and ISAC member benefits.
    • Technology Alliances
      Access innovative solutions from leading providers.
    • SCORE Portal Login
      Use the SCORE Partner Program to grow your business.
    • SecurityScorecard Marketplace
      Find a trusted solution that extends your SecurityScorecard experience.

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Resources
    RESOURCES
    • Resource Center
      Explore our cybersecurity ebooks, data sheets, webinars, and more.
    • SecurityScorecard Blog
      Read the latest blog posts published weekly.
    • Research & Insights Center
      Access our research on the latest industry trends and sector developments.
    • SecurityScorecard Academy
      NEW
      Complete certification courses and earn industry-recognized badges.
    TOOLS AND DOCUMENTATION
    • Free Security Rating
      Get your free ratings report with customized security score.
    • Product Release Notes
      Visit our support portal for the latest release notes.
    • Free Account Signup
      Start monitoring your cybersecurity posture today.
    • Chrome Extension
      NEW
      Show the security rating of websites you visit.
    • Assessments ROI Calculator
      Calculate the ROI of automating questionnaires.
    Trust begins with transparency. Take a look at the data that drives our ratings.
    Learn more
  • Company

    Working at SecurityScorecard

    Committed to promoting diversity, inclusion, and collaboration–and having fun while doing it.

    Join our team
    • About Us
      SecurityScorecard is the global leader in cybersecurity ratings.
    • Leadership
      Meet the team that is making the world a safer place.
    • Press
      Explore our most recent press releases and coverage.
    • Events
      Join us at any of these upcoming industry events.
    • Policy Insights
      Raising the bar on cybersecurity with security ratings.
    • Careers
      APPLY TODAY
      Come join the SecurityScorecard team!
    • Contact Us
      Contact us with any questions, concerns, or thoughts.
    • Trust Portal
      Take an inside look at the data that drives our technology.
    • Help Center
      We are here to help with any questions or difficulties.
Request a demo
SecurityScorecard SecurityScorecard
BLOG

We Need a New Risk Management Approach to Secure Critical Infrastructure Against Russian Cyber Threats

Devin Lynch, Senior Director, Policy & Government Affairs
04/14/2022

A democratized approach to cybersecurity risk management that leverages continuous monitoring and public-private partnerships is overdue, and critical, for today’s cyber threat environment.

Executive Summary

  • Although the Biden administration, U.S. Congress, Department of Homeland Security, and CISA, have accelerated cybersecurity efforts over the last year, the fact remains that the majority of critical infrastructure in America is owned by the private sector, giving Federal agencies limited visibility into the nation’s overall cybersecurity.

  • SecurityScorecard believes in utilizing new and evolving tools which democratize the approach to cybersecurity and strengthen public-private partnerships to keep America’s infrastructure safe.

  • Cybersecurity is everyone’s responsibility, and senior corporate leadership must understand what their cyber risk is and how it affects business risk.

  • We need to move cybersecurity efforts to get “left of boom”–using tools like cyber security ratings to surface cybersecurity vulnerabilities in real-time.

Russian cyber aggression and malicious cyber activity extended well before the invasion of Ukraine in February 2022. The invasion threatens U.S. homeland security and especially critical infrastructure owners and operators, who would likely bear the brunt of any retaliatory attacks by Russia for the U.S. support of Ukraine.

In response to intelligence indicating that the Russian government is exploring options for potential cyberattacks, the Biden Administration and Congress have accelerated cybersecurity policymaking and programs to combat this persistent and growing threat—including the president’s sweeping Executive Order to Improve the Nation’s Cybersecurity; the U.S. House of Representatives’ Committee on Homeland Security’s creation of, and critical investments in, a new State and Local Cybersecurity grant program; and the recent passage of cyber incident reporting legislation as part of the Fiscal Year 2022 Appropriations law. While these critical efforts have energized and improved federal responses to cyber attacks, more work is needed, especially to defend U.S. critical infrastructure.

The overwhelming majority of critical infrastructure is owned and operated by the private sector, and Federal agencies have limited visibility or authorities to ensure that this infrastructure is adequately secure. Our position at SecurityScorecard is that America needs a more democratized, integrated, collaborative approach that pushes out the borders of organizational cybersecurity, provides continuous visibility of the threat landscape, and brings the public and private sectors together to protect the nation’s most important assets.

SecurityScorecard believes cyber security ratings can serve as a nexus to fulfill these needs.

A Democratized Approach to Cybersecurity

SecurityScorecard’s mission is simple: to make the world a safer place by transforming the way companies understand, improve, and communicate cybersecurity risks to their Boards, employees, and vendors. Cybersecurity is everyone’s responsibility, and senior corporate leadership must understand what their cyber risk is and how it affects business risk.

Everyone, in every organization–from the Department of Defense to one-person small businesses–bears some responsibility to protect their organization’s networks through basic steps for good cyber hygiene like:

  • Immediately downloading software patches and updates,

  • Avoiding phishing emails,

  • Refreshing their understanding of cybersecurity best practices through training and education.

However, we also know that, even at the most highly secure organizations, mistakes happen.

What SecurityScorecard proposes is a more democratized approach to cybersecurity. Everyone needs to understand the cyber risk environment in which we operate, as well as their responsibilities in cyber defense. More shared data and a quantitative understanding of the risk can empower both the owners and the operators of critical infrastructure, as well as the federal sector risk management agencies that bear federal responsibility for the cybersecurity of those industries. This approach‌ also relies on key public-private partnerships, novel cyber defense collaborations, and strong information-sharing practices.

Leveraging Public-Private Partnerships

The Cybersecurity and Infrastructure Security Agency (CISA) is demonstrating the effectiveness and importance of public-private collaboration in a number of ways. Its “Shields Up” web page is a forward-leaning and supportive initiative by the federal government to mobilize public and private assets in defense of the homeland. Through this webpage, CISA shares critical information, presents clear technical guidance, and directs the nation to free cybersecurity services and tools–all in a centralized location.

Earlier this month, SecurityScorecard’s Global Investigations team identified three separate DDoS attacks which all targeted Ukrainian government and financial websites leading up to and during Russia’s invasion of Ukraine. Details of these DDoS attacks had not yet been publicly identified. Working with CISA, SecurityScorecard was able to share this information and disseminate it centrally through the Shields Up Technical Guidance webpage.

CISA Director Jen Easterly’s bold leadership and direction also includes the standup of the Joint Cyber Defense Collaborative (JCDC). As she and others have so eloquently stated, “cybersecurity is a team sport.” The JCDC team breathes life into this statement. This collaboration between critical infrastructure owners and operators and the Federal Government is already strengthening the nation’s cyber defenses through planning, preparation, and information sharing, and it will only increase in reach as the JCDC matures institutionally and expands its membership.

Information Sharing – ISACs and Nonprofit Organizations

U.S. Information Sharing and Analysis Centers (ISACs) also play a critical role in disseminating threat information and technical guidance (e.g., TTPs, IOCs, etc.) to their members. SecurityScorecard believes critical infrastructure owners and operators, across every sector (e.g., water, financial services, information technology, etc.), should lean on and utilize the tools, services, and community built by the ISACs, especially in a high cyber threat environment.

SecurityScorecard is proud to support 14 industry ISACs through our ISAC Partner Program, which provides ISACs with visibility into the threat landscape of every member and a better understanding of industry-wide risk. Our ratings enable ISAC members to understand and secure their own digital ecosystems, share threat information, and monitor the cyber risks presented by their supply chains and vendors that they rely on to run their businesses.

Nonprofit organizations focused on cybersecurity, like the Global Cyber Alliance and Cyber Threat Alliance, additionally extend the information-sharing ecosystem by “building programs, partnerships, and tools to make the connected world safer and more secure for all” and “working to improve the cybersecurity of our global digital ecosystem by enabling near real-time, high-quality cyber threat information sharing among companies and organizations in the cybersecurity field.” The power of these partnerships and others like them help all who contribute to them, and they are as critical today as ever.

State-based nonprofit organizations add state, local, tribal, and territorial (SLTT) government-specific expertise in an immeasurable way to the broader information sharing environment. Congress’ recent investments in the Center for Internet Security and Multi-State ISAC in the Fiscal Year 2022 Omnibus Appropriations Act will be essential to help SLTT entities secure their systems from attacks. Other frontline state-based nonprofits, like the National Association of Counties (NACo) will soon benefit from the State and Local Government Grant program this committee created. These grants will bring critical cybersecurity investments to critical front line SLTT officials and reinforce a democratized approach to cyber defense.

Partnerships like these create trust and strengthen the information-sharing ecosystem necessary to protect against malicious threat actors. A Russian cyber threat actor only needs one vulnerability to penetrate many systems through the use of a single cyber attack. As made clear by the U.S. House of Representatives’ Committee on Homeland Security last summer, in hearings related to the cyber attack on Colonial Pipeline, an attack on U.S. critical infrastructure can have cascading negative effects that extend far beyond a single network or end-user.

A New Risk Management Approach

Cybersecurity is About Risk Management – The Biden Administration’s recent warnings of increased Russian cyber activity—to include probing and scanning of U.S. critical infrastructure—underscore the need to manage cybersecurity risk now, before a cyber attack. We need to move our cybersecurity efforts, and think more deliberately, “left of boom” (i.e., before an attack).

This approach accepts the simple premise that cybersecurity is about risk management. It accepts that everyone is at risk, and that measures taken now will decrease the likelihood of a significant cyber attack later. It’s the cyber adaptation of the old adage, “an ounce of prevention is worth a pound of cure.”

Security ratings provide several integral “left of boom” tools to decrease the likelihood of a cyber attack and measurably and practically strengthen any entity’s cybersecurity. For example:

Increase Cyber Hygiene – SecurityScorecard subscribes to CISA’s guidance that all organizations should take certain foundational measures to implement a strong cybersecurity program. This includes:

  • Fixing known security flaws in software

  • Implementing multi-factor authentication

  • Signing up for CISA’s free Cyber Hygiene Services

SecurityScorecard plays a vital role here because security ratings can surface organizational flaws in cyber hygiene, allowing critical infrastructure owners and operators to raise their baseline cybersecurity posture and reduce their online attack surface.

Continuous Self-Monitoring – Continuous monitoring tools, like SecurityScorecard’s, allow companies to automatically see their online risk exposure. While many organizations employ continuous monitoring capabilities on their internal networks, these capabilities surface issues only after it is too late and an unwanted intrusion has already occurred. Security ratings push out the borders of organizational cyber defense by giving them an outside-in view of their threat landscape, letting them “see what the hacker sees.” Free services and tools like ours can also alert companies to new threats or vulnerabilities on a daily basis, and allow critical infrastructure owners and operators to proactively manage their cyber risks.

Third Party Risk Management and Zero Trust – Though monitoring one’s own network is necessary, it is no longer sufficient. Companies must also monitor the risk presented to them and their business network by third-party vendors. Over half of all cyber intrusions occur through third-party connections. The Russian Federation has already leveraged this attack vector to enter federal information systems in the past through SolarWinds. Annual security questionnaires and even less frequent penetration test results are no longer sufficient for organizations to understand their entire threat landscape A true Zero Trust Architecture model must include continuous monitoring of organizations’ vendor and supply chain ecosystem in addition to its own internal continuous diagnostic monitoring. While it is infeasible for every organization to access internal continuous monitoring and data logs of all of its vendors, security ratings platforms at least provide sufficient visibility and data to make informed decisions and work with vendors and suppliers on an ongoing basis.

Conclusion

Learning from recent data breaches, zero-day exploits, cyber espionage campaigns, and Ransomware attacks has moved the Federal government toward a new cyber defense posture, but the government alone cannot completely defend our nation’s cyber ecosystem. The help of the private sector is critical to our nation’s cybersecurity. SecurityScorecard encourages every critical infrastructure owner and operator to leverage free services and tools, like SecurityScorecard’s, to improve cybersecurity by taking the democratized, integrated, collaborative approach that is needed.

For more information go to https://securityscorecard.com/free-security-ratings.

Return to Blog
Join us in making the world a safer place.
FREE ACCOUNT SIGN UP
Products
Solutions
Customers
Marketplace
Partners
Resources
Company
Trust Portal
Security Ratings
Login
Blog
Contact
Careers

SecurityScorecard
Tower 49
12 E 49th St
Suite 15-100
New York, NY 10017

[email protected]

United States: (800) 682-1701
International: +1(646) 809-2166
Social-linkedin Social-facebook Twitter Instagram Youtube