RSA 2013: Weatherford outlines 'cyber 9-1-1' plan

Deputy undersecretary for cybersecurity at DHS wants the agency to become the cyber-9-1-1 for critical infrastructure

Mark Weatherford, deputy undersecretary for cybersecurity at DHS, wants to set up a cyber 9-1-1 system for critical infrastructure. He outlined his vision today at the Cloud Security Alliance Summit, held as part of the RSA Conference.

Weatherford pointed to a massive malware attack against Saudi Armaco that infected 30,000 workstations at the Saudi national energy company. That incident sent "a lot of ripples" through the critical infrastructure industry in the U.S. So did the DoS attacks that flooded the systems of financial service providers this past fall. "All of these types of things are a sliver of what occupies my thoughts on a day-to-day basis," Weatherford said.

[CSO Security Standard: DHS wants you (for a little while, at least)]

Weatherford's cybersecurity unit at DHS provides help to secure the various federal department agencies and works closely with critical infrastructure industries to help them secure their systems. The agency also works closely with the FBI and various other government law-enforcement agencies to fight cyber threats.

"Currently, there is a lot of confusion when it comes to who organizations should call should they suffer a breach, or find themselves under significant attack pressure," he said. "We want to make DHS the cyber-91-1. Currently, people don't know why they should call, and we want to change that," Weatherford said.

Toward that aim, Weatherford's goals include expanding government and private industry attack-data sharing. "The president has given us a mandate to up the ante on data sharing. When I was in the private sector, that was a big challenge. If the government had threat information, I wanted to know about it," he said.

He also called on private industry, both practitioners and the security industry itself, to push for more security innovation. "Why are we still sharing information that we shouldn't? Why aren't some of the solutions we have today being used, put into place? Why are we still relying on passwords?" Weatherford asked. He said just as security evolved from the mainframe to client/server architectures, so it must evolve for an increase in cloud computing.

The final and arguably most challenging hurdle for the government and private industry when it comes to security is finding the talent they need. Weatherford asked audience members if they had the security talent they needed. Nobody in the audience raised their hands, indicating a clear shortage in IT security professionals. "This is one of the more common themes that I see as I travel around the country. We need people that can think about where the trends are going in IT security," he said.

Some of the solutions Weatherford proposed included hiring professionals with non-traditional backgrounds but who do possess the right security skills, and encouraging more kids and college students to pursue a career in security. However, when it comes to fixing his immediate need for the right skill sets at his agency, Weatherford's peers at other federal agencies might want to look out. "I'm not bashful about stealing people away," he said.

Join the CSO newsletter!

Error: Please check your email address.

Tags securityU.S. Department of Homeland Securitygovernment

More about CSOFBIRSA

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by George V. Hulme

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place