menu

Contributor:

Steven Bucci

Great Leaders Are Only One Step in Achieving Cybersecurity

Cybersecurity remains a key issue in the nation’s security. Numerous stories in the news show that while big things are happening, we badly need them to move in a positive direction, and soon. We have passed this ball between the branches of our government for far too long. Decisions need to be made and action taken. As an optimist by nature, I believe that we are now more secure than we were a few years ago. Unfortunately, the threats are growing faster than we can react to them. All of the imagination and intellectual power of this great nation must be unleashed on this problem.

Cybersecurity: In Washington, it’s Strategic. In Your City, it’s Pragmatic

In only a few years, cybersecurity has developed from a concept that sounded like science fiction to one of the federal government’s major concerns. The threats are real, they are pervasive, they are persistent and they are sophisticated. The overarching nature of the issue – affecting nearly every aspect of our highly networked lives – makes it the ultimate strategic issue for Washington. While cyber is a strategic issue for Washington’s leaders, for the embattled leaders of our cities, cyber is local and very tactical. That said, how do the leaders of our municipalities look at this issue?

The Navy Moves Forward on Cyber

I was privileged to attend a super event at the Center for Strategic and International Studies on Monday. They hosted Vice Adm. Barry McCullough, Commander of U.S. Fleet Cyber Command and U.S. 10th Fleet (both Navy cyber organizations). It was in the main a normal “command brief,” but McCullough’s forthrightness made it much more. McCullough opened his remarks by telling the industry audience that after several months, he is beginning to understand the problem set. He emphasized that anyone who thinks there is a quick technological fix to our cyber challenges is dreaming.

Cyber Criminals: They are no Captain Jack Sparrow!

At a cyber conference last week, one of the panelists raised an intriguing idea – treat cyber criminals and hackers like pirates. When I write “pirates,” I do not mean like swashbuckling rouge heroes, which is a modern conception given to us by Hollywood and literature. I mean the low-life criminals of despicable character to whom the only thing we owe is a quick hanging. This could be administered by the government (law enforcement or military), or by honest merchants, if the malefactor were caught. OK, I don’t think we should break into houses and physically hang every hacker out there, but we could take a cue from our predecessors.

Cyber Credentials Are Important for Leaders

In the same way we looked for people in the past who were proficient in cross cultural communications, or in other managerial skills (think of the success of Lean Six Sigma), cyber is a growing leadership essential. Individuals who have shown they have a command of the key concepts, challenges and solutions for cyber are being sought for leadership jobs in the DC area. What is happening is a realization that cyber understanding and knowledge is now a critical leadership skill.

Hard Skills In Cyber Are Even More Rare Than We Thought

At the most recent in the excellent Federal Computer Week/Juniper Networks series of cyber discussion breakfasts, Alan Paller gave us a wake up call. He said the biggest problem was that we have tilted the entire tech world to the point where the “talkers” appeared to be of more value than the “doers.” The talkers get paid more than the technicians. Paller likened it to a system that would pay doctors less than you do the guy who is the hospital manager.

Military Savvy and Sensitivity to Cyber Issues

I was privileged to participate as a speaker at a gathering of senior military leaders. It was a non-attribution event, so I am prohibited from discussing the details or who was there, but several “messages” warrant going out. This group of 25 or so general and flag officers (with several senior executive service folks mixed in) spent a week off site, chewing on lots of issues that will bedevil them as they continue up the ladder of our nation’s military. They are as open to new ways of thinking as they are to new weapons systems. I, for one, was thrilled that our nation is the hands of leaders of this caliber.

Terrorists Use the Internet But Not How You Might Think

I have to admit that in the past I have been guilty of a sin of omission that has plagued many commentators in the cyber arena. I have spoken and written many times about the terrorist threats I see as strong and dangerous possibilities. I have always mentioned the present terrorist use of the internet as an aside, and so much a lesser issue as to be unworthy of too much worry. I will stand up and admit that I have been WRONG. Yes, the terrorists have not used the cyber world for an attack as we might envision, but the threat presented by what they do now is real and chilling.

Cyber Threat Vectors: Are we looking at them all?

We often talk about cyber threats in different ways. Some speak of them based on who the bad guys are: hackers, terrorists, cyber criminals or nation states. Others use the bad guys’ technical approach as a means to define them: SQL injection, Memory Scrappers, DDoS Attacks, etc. A third way, one based on distance from targets, was used by Steven Chabinsky of the FBI recently in several venues. I think it adds to the depth of our analysis, and bring to the fore some key areas that are often overlooked.