Skip to content

Discerning Data

  • About Us
  • Additional Resources
  • Contact Us

DISCERNING DATA

A Faegre Drinker Blog Covering the Latest in Privacy, Cybersecurity and Data Strategy

  • Privacy
  • Cybersecurity
  • Data Strategy
  • Disruptionware

U.S. Cybersecurity Officials Issue New Warning Regarding Threats to Critical Infrastructure

Share

On January 11, 2022, the U.S. Department of Homeland Security’s Cyber Security and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) issued a joint advisory, warning of an increasing cybersecurity threat posed by Russian state-backed threat actors to U.S. critical infrastructure.

The joint advisory recommends that the cybersecurity community, especially critical infrastructure network defenders, adopt a heightened state of awareness and conduct proactive threat hunting. Additionally, the joint advisory urges network defenders to implement several mitigation recommendations to improve their functional resilience and reduce the risk of compromise.

Specific controls that the joint advisory recommends include confirming reporting processes and minimizing coverage gaps by ensuring that the organization has developed specific points of contact responsible for the security of different business components. Additionally, cybersecurity leaders should work to minimize gaps in security personnel availability by identifying surge support for responding to an incident. This is because cyber threat actors have been known to commonly target organizations on weekends and holidays when there are gaps in organizational cybersecurity.

The joint advisory also recommends that organizations create, maintain, and exercise a cyber-incident response and continuity of operations plan. Routine exercises ensure that responsible security personnel are familiar with the key steps they need to take during an incident and are positioned to act in a calm and unified manner.

This most recent joint advisory from three prominent federal agencies charged with combatting cybercrime should serve as yet another reminder of the persistent threat faced by all companies, and particularly those that are responsible for servicing, maintaining, or providing critical infrastructure services. As discussed in prior posts, cybersecurity threats to critical infrastructure companies are widespread and only increasing in complexity and dangerousness. But the threat is, of course, not limited to critical infrastructure, as exemplified by numerous recent, prominent, and public attacks against various types of businesses.

Companies interested in reviewing their cybersecurity procedures, policies, or general preparedness are encouraged to contact Faegre Drinker’s Privacy, Cybersecurity & Data Strategy team.

The material contained in this communication is informational, general in nature and does not constitute legal advice. The material contained in this communication should not be relied upon or used without consulting a lawyer to consider your specific circumstances. This communication was published on the date specified and may not include any changes in the topics, laws, rules or regulations covered. Receipt of this communication does not establish an attorney-client relationship. In some jurisdictions, this communication may be considered attorney advertising.

About the Author: Peter Baldwin

Peter Baldwin draws on his experience as a former federal prosecutor to counsel clients facing government investigations and cybersecurity issues. View Peter's full bio on the Faegre Drinker website.

About the Author: Jason G. Weiss

Jason G. Weiss leverages a past career as a cybersecurity and computer forensics Supervisory Special Agent with more than 22 years of decorated service at the FBI to guide clients through the complex and high-stakes issues associated with cybersecurity incident preparedness and response and compliance. View Jason's full bio on the Faegre Drinker website.

About the Author: Grayson Harbour

Grayson Harbour is an associate in the firm's Labor & Employment practice group. Read Grayson's full bio on the Faegre Drinker website.

Receive Email Alerts to New Articles

SUBSCRIBE

January 18, 2022
Written by: Peter Baldwin, Jason G. Weiss and Grayson Harbour
Category: Cybersecurity
Tags: CISA, cyber-incident response, cybersecurity, FBI, NSA

Post navigation

Previous Previous post: Log4j Vulnerability Prompts Insurance Commissioners to Issue Guidance
Next Next post: Department of Commerce Seeks Public Comment on a Range of Broadband Infrastructure Issues Arising from the 2021 Infrastructure Investment and Jobs Act

Search the Blog

Sign Up for Email Alerts

PODCASTS

Faegre Drinker on Law and Technology

©2023 Faegre Drinker Biddle & Reath LLP. All Rights Reserved. Lawyer Advertising.

  • About Us
  • Additional Resources
  • Contact Us
We use cookies to improve your experience with our website. By browsing our site, you are agreeing to the use of cookies. For more information about how we use cookies, please review our privacy policy and cookie policy. OK
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT