Jen Easterly ali his work is finished for him. As the second deputy commander of the US government’s Cybersecurity and Infrastructure Security Agency (CISA), he has to fight against historic terrorists. ransomware attack and disinformation campaign. Easter and another form of bureaucrat, however. He showed a lot on the occasion Black Hat a cybersecurity conference in August, where he launched a new dance strategy with the help of AC / DC wearing a “Free Britney” shirt and dragon-drawn jeans.
Its windy appearance, however, is not the reason for the lack of awareness. A retired soldier has previously served in National Security Agency and he helped Department of Defense setting up its online services. He also acted as a special aide to President Obama in the fight against terrorism before moving to a bank, where he led cybersecurity to Morgan Stanley.
In an interview with WIRED assistant editor Garrett Graff at RE: WIRID Wednesday event, Easter related to major changes in cybersecurity to Dirk Gently paradigm by Douglas Adams, where “everything is connected, everything is interdependent.” This connection is made by our digital world. “As a result the attack area has grown, and the volume and diversity and data flow have increased significantly.” Consequences: There is a cyberattack every 40 seconds and one in 10 of the 1.8 billion web pages leads you to a malware program. “The main reason that has changed is that cybersecurity has become a problem for the kitchen table.”
At CISA, part of the Department of Homeland Security, Easter should change from the actions it took in the Armed Forces, the NSA, and the intelligence team to the security forces. He says his past experiences help him understand how his enemies work and that he feels sorry for them. “You have to sympathize with the enemy,” he said, “in order to understand how the enemy works, through the methods, methods, and methods he uses, in order to be the best defender you can be.”
To put in place better security, Easterly should boost the size of the new US government department. That’s why he went to Black Hat and Defcon — to reach a secret party. “That’s my community, dad,” he said. “We want to rekindle the strength of the swindlers and researchers and students because, at the end of the day, the world is full of weaknesses, and I feel that the error dominates security. and bring it.
Of all the technologies involved, Easterly states that the most difficult part is “about human beings and human systems and causing people to change the way they work, and to establish the basics of online hygiene, through validation, communication, and programming.” More than 90 percent of the threats associated with ransomware attacks, he said, have patches linked to them. That is why most of us fail at the basics of cybersecurity.
However, they are optimistic about the future of our government. “I have hope but I have more hope than I ever had and how we can work together, in government, as a sports club and with non-governmental organizations as trusted friends.” Through this alliance, he hopes to “create a uniform image of the workplace,” in order to “prepare and exercise in peacetime so that we may be ready to work together in times of war.”