Outdoor Speaker Series: Cybersecurity in the Public Sector

On May 7, 2019, the City of Baltimore fell victim to an aggressive ransomware attack, the fallout from which will last for years to come. The attack on Baltimoreâs systems came less than a month after the city of Greenville, NC was hit with the same ransomware variant.
Cybersecurity in the public sector couldnât be more relevant than it is today, but for most, it’s prohibitively complex.
What is my level of risk? Where do I start? How will this affect my bottom line?
The June event in Mindgrubâs Outdoor Speaker Series brought together four cybersecurity experts to tackle those important questions and more.
Read on for their biggest tips.
Panelists:
Brian Dykstra, CEO, Atlantic Data Forensics
Peter Jungck, Vice President & General Manager of Intelligence Solutions, BAE Systems Inc. (Moderator)
Larry Letow, President & COO, LG-TEK
Beth Perlman, IT Consultant
On whatâs changed in cybersecurity:
âThe prevailing mindset among small to mid-size business owners used to be, âNobody cares about my business – no one wants our data – theyâll go after the government, or a large company, but not mine.â Nowadays, if you have a bank account, youâre a target. Thereâs going to be ransomware headed your direction.â – BD
âPeople are finally realizing that cyber attacks are also coming from the inside. These attacks are mostly coming from people, and all the technology in the world isnât going to protect you from man power.â – BP
âCybersecurity threats are changing everything that we do in business. For example, we used to attach important files to an email, but now we only share the file location. Itâs changed peopleâs everyday lives in ways that we donât always realize.â – LL
On how to prevent or prepare for a cyber attack:
âPreparation really comes down to following the best practices you already know about. Patch your systems and upgrade them in a timely manner. Make sure your data is backed up (not on a USB drive hanging off of a server somewhere), and have a secondary cloud set of back-ups. Keep log files to make sure you know whoâs logging in and when or why theyâre doing it. All of these simple, âmundaneâ things really make a difference. Itâs important to understand that you need to prepare for something that you absolutely know is coming. If you knew your house was going to flood a year from now, youâd move away before it happened. Take those same precautions that you take in the physical world in the digital one.â – BD
âA lot of people talk about disaster recovery – I say itâs about business continuity. What are the critical systems that you need to run your business? How would you keep your business running if you lost all of those systems? Thatâs how you should start your preparation for cyber attacks.â – BP
On defining the challenge of cybersecurity for the public sector:
âIn the government agency where I worked, security was a âhobby.â It wasnât anyoneâs job. That leaves municipalities like Baltimore at great risk. You can make a conscious choice to accept the risk, but you have to understand exactly what those risks are in order to make the right decisions.â – BP
âIf they had the money to make the updates on their systems, theyâd do it. So how do you carve out a part of your budget and make sure that the work actually gets done when the threat isnât already upon you?â – BP
âSecurity is not a product; itâs an ongoing commitment. You canât buy your way out of it. Itâs challenging to make the case for incorporating security into your operations, though, when it doesnât contribute to the bottom line.â – LL
On creating a culture of security in your organization:
âWhen educating your company, you must stress that they have a vested interest in protecting your data and your systems. Some of whatâs at risk is their data, too.â – BP
âTwo thirds of incidents come from inside your organization. Itâs just as important, if not more so, to create processes that protect against internal theft as it is to protect your systems from external theft.â – LL
âPeople donât just wake up one morning and decide to steal from their company for no reason. Thereâs usually a behavioral change or a bad review or something else in an employeeâs life that leads up to someone making that choice. Not knowing whatâs going on with your employees puts your business at risk, too.â – LL
âWe recommend annual background checks on your privileged employees. If you were hired 15+ years ago, itâs safe to assume that your life has changed a lot since you were first screened by your employer. Itâs unwise for that business to continue to trust people with access based on that first check.â – BD
For organizations that are slow to change, where do you start? Whatâs step one?
âPatching and upgrading your systems. Live by the rule, âIf you touch a system, youâre responsible for bringing it up to date.ââ – BP
âEducation for your employees.â – LL
âTake a look at your organization. Take the state of Maryland, for example: Instead of having one CIO who manages a centralized network of sub-CIOs, etc., they have a highly distributed network of people who are responsible for handling state data. That makes it challenging to find out where attacks may come from and to make a plan to prepare effectively.â – BD
On finding top cybersecurity talent:
âWe can’t get people who are cleared brought on board fast enough. You want the best people, but when youâre working with the government, sometimes âinnovationâ also means âat the lowest price,â so itâs challenging to strike that balance.â – LL
âYouâre going to have a labor shortage in this industry for awhile, so we need to find a solution thatâs not driven by the hour. How can we leverage tools like AI and machine learning to scale?â – PJ
What were your biggest takeaways from the June Outdoor Speaker Series event? What burning questions do you still have about cybersecurity in the private sector? Leave them in the comments below!