Four Ways Leaders Can Defend Against Cyberthreats
 by Andrew Warren
Itâs been a season of harrowing news for U.S. cybersecurity. In December, we learned that a group of hackersâalmost certainly Russian agentsâinfiltrated SolarWinds, a Texas-based IT firm, granting it access to nine federal agencies and a growing list of private companies. Then, in March, another breach: this time it was Microsoft, which announced that Chinese hackers had exploited vulnerabilities in their Exchange email servers, compromising hundreds of thousands of organizationsâ data. Add to this the ransomware attack in May that caused the disruption of the largest energy-pipeline system serving the East Coast.
These cyberattacks have unnerved experts because of their size and scope, but also because the first two were launched from within the United States itselfâon servers run by Amazon and GoDaddy, among othersâallowing the hackers to bypass the governmentâs warning systems, which are legally prohibited from surveilling domestic networks. (It was FireEye, a private firm, and not the U.S. government cybersecurity organizations tasked with the defense of networks or identifying the activities of cyber actorsâlike the DHS, FBI, NSA, or U.S. Cyber Commandâthat discovered the breach at SolarWinds.)
The attacks have led some to reconsider the relationship between government and industry when it comes to protecting against future attacks.
âWhat this shows is that you canât build a strategy around âthe government will take care of itself, and the private sector will take care of itself, with some level of collaboration between the two,ââ says , a retired four-star admiral who led U.S. Cyber Command and the National Security Agency. âThat has largely been the strategy to date, but that approach isnât optimal, and our adversaries are taking advantage. Theyâre adapting, and weâre not keeping up.â
President Biden recently announced an mandating that any software vendor that serves government agencies must adopt a range of security measures, including data encryption and multifactor authentication. They must also immediately notify the federal government of any breaches.
For Rogers, a senior fellow at Kellogg, this is a good start, but thereâs still plenty that could be done to bolster cybersecurity across the public and private sectors. âItâs not about collaboration,â he says. âItâs about integration. The only way to defend ourselves in real time is to work together 24/7. That way, as either party comes up with potential cyber activity, we can respond in real time, not weeks or months later.â In the case of SolarWinds, the hackers were in the networks for nine months before they were detected.
So what should businesses leaders understand about their role in this new era of enhanced cyber-vulnerability?
Here are four lessons they can draw in light of the recent threats.
1. Create a culture of proactivity and accountability.
Having served as a commander in charge of the Department of Defenseâs cybersecurity operations, Rogers sees a number of lessons business leaders might draw from the militaryâs experience. But ultimately, they boil down to this: be proactive.
âDonât assume that a nation state has no interest in targeting youâtheyâll target anyone they believe has something of value to them, and you may also become an unintended victim,â Rogers says.
Given the amount of risk involved, itâs critical for organizations to deliberately and methodically think through how they can protect themselves and how theyâll respond if they believe they have been targeted. âIn the military, we would invest time, resources, and personnel to anticipate potential threats. Weâd perform regular exercises, simulating a state actor penetrating our networks, testing for vulnerabilities. Our motto was âplans are nothing, planning is everything,ââ he says.
Exactly what such exercises or simulations might look like will differ from one organization to the next. But a good step for all companies is to create a culture of accountability.
âItâs amazing how accountability can influence peopleâs behavior,â he says. âAnd since cybersecurity is everyoneâs issue, itâs important that leaders and organizations hold themselves accountable for protecting critical networks.â
In part, this means that all leadersâeven those who are not tech savvyâneed to take responsibility for guarding against significant hacks.
âI sometimes hear my peers say, âI just donât know much about cyber.â But youâd never hear a CEO or a Board member say that about financeâeven if that they had never been a CFO. Nobody would ever say, âHey, Iâm not a money guy.â Itâs the same way with cybersecurity,â he says. âIts fundamental to the way every company works.â
2. Know your digital supply chains.
A key part of being proactive is knowing your digital supply chains. Just as a toxic product can make its way through a physical supply chain, corrupted code can have an enormous ripple effect.
Itâs important to recognize that hackers are âusing the very structure of the internet against itself,â says Rogers.
Consider the regular software update, which is what hackers exploited in the SolarWinds breach. By corrupting the code of SolarWindsâ software update, the hackers were able to spy on client companies like FireEye as well as large swathes of the U.S. government, including the Department of Homeland Security.
âWe created this whole system with the idea that downloading software was a good thingâit increases functionality, security. Our ability to download software whenever and wherever we want is central to our economy. The problem is that also means that everyoneâs potentially at increased riskâand business leaders should recognize that.â
This makes it increasingly important for companies to be cognizant of which vendors they are partnering with, and what products they are downloading.
âSupply chains take on a whole different meaning in this hyperconnected digital world,â Rogers says. âYou want to be sure controls are in place to avoid corruptions or viruses all along the chain. Where are you getting your software? Whoâs writing it? Whoâs verifying it? Where is it coming from? We donât tend to think about software when we think about supply chains, but itâs clear weâre going to have to.â
It would also behoove companies to spend more time assessing threats to their operational technology. With more firms automating parts of their manufacturing process and expanding their ability to remotely access parts of their infrastructure and production lines, thereâs a growing dependence on having to secure this from exploitation.
Last year, was blindsided by a major ransomware attack that disrupted internal computer networks and shut down global production lines. And thereâs growing concern that criminals or state actors will continue to threaten factories and power grids or energy distribution.
âThe more functionality you automate, the more risk you take on,â Rogers says.
3. Build cyber-resilience.
In the past, cybersecurity was designed as if to protect a castle. The goal was to keep the network safe behind high walls and deep moatsâin other words, to âsecureâ the perimeter.
Today this is nearly impossible, in part because of the sheer number of devices connected to each network, and in part because, after COVID, we have all grown more comfortable with accessing work data from home.
âWeâve blown up the perimeter,â Rogers says, âand our digital footprint is now a blur between business and personal life. This is further exacerbated by the âinternet of thingsâ and the drive towards more connectivity.â
Given thereâs now a better chance that an adversary will âget insideâ an organizationâs network, companies should focus more on building âcyber-resilienceâ: processes and mechanisms that allow them to keep functioning in the event of an intrusion.
For example, companies should make updates to their networks randomly and quietly, making it more difficult for adversaries to anticipate their cybersecurity activities. Other steps for increasing resiliency include having a current and accurate understanding of the network topology; aggressively monitoring activity on the network; building backups and redundancy for critical infrastructure; and minimizing the connections between the business segment and operational segments within the companyâs IT structure.
And, of course, companies will also need to have a detailed process in place that allows peopleâincluding the leadership teamâto respond quickly if confronted with a cyber event.
âThe Defense Department canât shut down for a week to secure its network, and most businesses canât either,â Rogers says. âSo a good strategy will involve not just walls and moats, but a nimble defense in the event someone gains unauthorized access.â
4. Prepare to cooperate (yes, even with your competition).
One of the major challenges with improving cybersecurity is that companies often donât want to admit theyâve been compromised. But cooperation across industries is essential for protecting against attacks.
âEven as they compete with each other, companies need to partner in areas that represent a major risk to their industry as a whole,â Rogers says, pointing to the example of banks in the wake of the financial crisis.
Here is where the government might be able to play an important role in managing cybersecurity risks, just as it has for many years in managing aviation safety. As a nation, weâve decided that the risk of injury or loss of life from aviation accidents justifies the existence of a government agency, the NTSB, whose job it is to investigate the cause of any aviation accident to determine what caused the accident and then identify the actions necessary to ensure it never happens again. After a crash, an airline or the aircraft manufacturer canât pretend it didnât happen or not acknowledge the event, citing proprietary information, or chalk it up to bad luck. In each case, all the parties involved must share company data, training and personnel records, and the maintenance history of the plane. Regulators must also be granted access to the crash site.
âThereâs a reason why aviation mishaps donât tend to recur,â Rogers says. âThey tend to be unique incidents, and thatâs because there are constant changes and updates to safety protocols, manufacturing standards, software configurations, training requirements, and maintenance protocols.â
In this sense, the NTSB is one potential model for future cybersecurity efforts. But businesses will need to accept the trade-off between protecting their networks and sharing information. The price of corporate reticence is that industries donât learn the details of how exactly a hack was conducted, which means the same nefarious actors can keep using the same techniques.
âHow many major cyber events will it take before we decide to make fundamental change?â Rogers says. âWe have to overcome this challenge, or weâll keep having these major events.â
in Kellogg Insight. Reprinted with permission of the Kellogg School of Management.
Andrew Warren is a writer based in Los Angeles. Michael S. Rogers is an adjunct professor with the Kellogg Public Private Initiative; Senior Fellow.
Editorâs note: This article was written before the cyberattack on meat processing plant JBS.
