Page 84 - FCW, November, December 2018
P. 84

 CYBERSECURITY & MODERNIZATION
Securing the
internet of things
Niels Jensen
Senior Vice President of Americas Sales, ForeScout Technologies
of the devices. The government’s two major cybersecurity programs — CDM and the Defense Department’s Comply to Connect — are premised on real-time diagnostics, remediation and risk reduction. The first and most foundational step of those two programs is complete asset visibility.
In addition to improving security, such visibility can create major efficiencies.
It allows managers to reassign anyone tasked with asset inventory (who today walks around with a pen and clipboard)
to higher-order tasks. Combined with automation and orchestration between security tools, it allows agencies to comply
In the era of mission-critical IoT, federal network security begins with visibility
FEDERAL AGENCIES INCREASINGLY depend on a wide array of connected devices
— including sensors, controllers, motors and even weapons systems — to support their missions. The Census Bureau relies on connected handhelds for the decennial population count, the Department of Veterans Affairs relies on networked hospital equipment, federal buildings rely on ID card readers, and so on.
Those devices have limitless potential to improve operational efficiencies and safety in the delivery of government services. But in this era of connected “things,” agencies must evolve their cybersecurity strategies to account for this fundamental change in their network infrastructures.
The scale of the problem
Securing what are typically referred
to as internet of things (IoT) devices
is challenging because most were not designed with security in mind. They often cannot support features such as password protection or encryption. Yet the biggest security challenge is detecting the devices in the first place.
IoT devices cannot be readily identified by traditional cybersecurity tools because they generally do not support an agent — a small piece of software on PCs and mobile devices that allows them to be scanned for malware and vulnerabilities.
How big is the problem? In its early phases, the Department of Homeland Security’s Continuous Diagnostics and Mitigation program detected 75 percent more devices on federal civilian networks than were previously known. Discovering
that networks are 75 percent larger than expected represents a massive visibility gap. Unknown, unmanaged infrastructure on this scale creates huge risks for agencies.
Closing the visibility gap
Administrators need tools that allow
them to automatically and agentlessly detect, profile and enforce policy-based controls on connecting devices. With a consolidated view across the network, agencies can automatically detect legacy systems as well as new IoT devices, classify everything according to function and criticality, and assess the security posture
davooda/Shutterstock/GCN Staff
S-84 | SPONSORED CONTENT










































































   82   83   84   85   86