The views expressed by contributors are their own and not the view of The Hill

DHS ‘dos and don’ts’ on cybersecurity

Is a cyber-attack on America’s electric grid imminent?   Or will hackers sabotage a major chemical plant this year?  Answers to these questions may surprise you because they’re slightly counterintuitive. 

Many of the nation’s most-at-risk “critical infrastructure” sites – like power plants and chemical facilities – have analog redundancies in place that ensure catastrophic cyber-attacks won’t halt operations.  For now.

{mosads}But as connectivity increases and as electric grids become “smarter” through efficiency and automation measures, they will only become more and more linked to the internet – and more at risk of infiltration. 

The good news is that we seem to have stumbled upon a short window of time where the government can work with U.S. critical infrastructure sites to beef up both cyber and physical security.  The Department of Homeland Security (DHS) is taking the lead in assessing these vulnerabilities – with the private sector – as fast as they can. 

Just last month, DHS released information about a U.S. public utility that was infiltrated.  The Department worked quickly with the company to enhance security “before there was any impact to operations.”  For once, we’ve got a plan in place to address what most experts suggest will be an ongoing problem.

The not-so-good news is that some industry partners aren’t comfortable or willing to partner with the government, even though attacks on U.S. utility companies are increasing steadily. California’s Energy Commission chairman was quoted recently as saying, “If you’re a utility today, depending on your scale, you’re under attack at this moment.”  Voluntary public-private partnerships remain the principal mechanism for managing critical infrastructure risk.

While there are still arguments over which government agency should “own” the cyber mission, the one responsible for protecting America’s energy sector, wastewater facilities and even public transportation systems is Homeland Security. 

For most people, cybersecurity is a complicated subject – especially when the government is involved.  But it doesn’t have to be.  What exactly is your government doing to keep you safe?  Here’s what DHS is and isn’t doing to protect against a cyber “Pearl Harbor.”  

1.      What does DHS do in the cybersecurity world?

2.      What doesn’t DHS do?

3.      What will DHS do in the future?

4.      Why does DHS have a cyber role at all?  Just because the Department is responsible for protecting critical infrastructure doesn’t mean it’s capable of adding in preventing cyber-attacks, right?

For example, Immigration and Customs Enforcement has a Cyber Crimes Unit that focuses on transnational criminal organizations that use the internet for narcotics trafficking and illegal imports.   And the Secret Service is tasked by Congress to investigate certain financial computer crimes (its original mandate was to investigate financial fraud).  So the capacity has been evolving for a long time.

The bottom line: over the past few years, DHS has built successful partnerships and experience to protect critical infrastructure.  Now, the mission is shifting from a sole focus on protection (i.e. building stronger firewalls) to building resilience into the networks, systems, and assets that America relies on for the delivery of essential functions and services.  DHS is even encouraging innovators to adopt a resilient and secure by design principle.

No government effort will ever be perfect, and the Department has certainly made a few mistakes that have made some wary of trusting it.  But the DHS deserves credit for thinking about the long-game and making progress in the absence of cyber legislation. 

King is the national security adviser to the president and CEO of the Woodrow Wilson International Center for Scholars.