Info Image

Cryptography at the Heart of Cybersecurity: State and Local Governments Lead the Charge

Cryptography at the Heart of Cybersecurity: State and Local Governments Lead the Charge Image Credit: Sikov/BigStockPhoto.com

At the beginning of August, the Cybersecurity & Infrastructure Security Agency (CISA) and the Federal Emergency Management Agency (FEMA) announced a partnership to allocate $374.9 million in grants to strengthen state and local cybersecurity initiatives. This represents a crucial pivot from the government to confront the rapidly escalating threats posed by cybercriminals and threat actors head-on. Of course, cybersecurity is a multidimensional aspect that requires a considered approach to ensure the safety and integrity of data and systems. However, one element remains essential throughout all this – the need for strong cryptography.

Across the country, investments in cybersecurity at the state level are surging. An example is the recent addition of $35 million to New York's 2023 cybersecurity budget. These financial commitments echo the immediate and pressing need to reevaluate and strengthen our digital security infrastructure. This significant push underscores the pivotal role Chief Information Officers (CIOs) play in sculpting technology policies and allocating budgets. Still, one must look beyond the immediacy of hardware and software solutions and delve deep into the bedrock of cybersecurity. This is where cryptographic systems emerge as both a shield and a sentinel.

At its core, cryptography is a dance of algorithms and keys. The silent guardian ensures the linchpin of our digital trust remains unbroken. When we hear of a ransomware attack targeting a municipal system or a local government database, it's not just about software vulnerabilities. More often than not, these breaches hinge on the frailties within cryptographic systems - whether they be outdated keys, weak algorithms, or haphazardly implemented protocols. Cryptography is susceptible to single points of failure that can wreak havoc on our systems yet is largely taken for granted. The very essence of cryptographic measures is to guarantee the confidentiality, authenticity, and integrity of our digital conversations and transactions.

The urgency of cryptography

The challenges facing our digital world are multifaceted. High-profile cyber incidents, such as the hack of the Metropolitan Transportation Authority or data breaches affecting public school students, bring to light the relentless evolution and escalation of cyber threats. In one of the most recent incidents, a cyberattack disrupted hospital computer systems across the country, forcing emergency rooms in several states to close and ambulances to be diverted. These are not random, sporadic disruptions. These are methodical, sophisticated operations, often pinpointing and exploiting gaps in cryptographic fortifications.

Coupled with this is the looming horizon of quantum computing. While this emerging technology offers a world of potential, it also casts a formidable shadow over traditional cryptographic systems. As the first light of the quantum dawn inches closer, state and local governments bear the responsibility of ensuring their cryptographic strategies are not just robust for today but resistant to the quantum challenges of tomorrow.

Beyond the immediate threats and future challenges lies the intangible yet invaluable currency of public trust. When a breach occurs, it doesn't just result in financial costs or data losses. It causes an erosion, a chipping away at the trust that citizens vest in their governmental institutions. Here, cryptographic practices transition from being technical protocols to the very pillars that uphold this trust, ensuring that personal data, sensitive communications, and vital services remain sacrosanct.

Integrating advanced cryptography

For CIOs looking to maximize the impact of funding from agencies like CISA and FEMA, it's crucial to emphasize the continuous and holistic management of cryptographic policies, embracing agility and redundancies. A well-defined cybersecurity strategy is foundational, extending beyond the mere integration of cryptography to ensure it seamlessly aligns with broader cybersecurity initiatives. Even legacy cryptographic systems, once considered the gold standard, may now face exposure to emerging threats. Therefore, a proactive approach that includes regular assessments, protocol reviews, and the adoption of contemporary cryptographic standards is vital to proactively identify and address vulnerabilities.

Additionally, the importance of training should not be underestimated. It is insufficient for only technical teams to grasp the intricacies of cryptography. To minimize the risk of human-induced errors or oversights, a comprehensive understanding of cryptographic policies by all employees, ranging from those in IT departments to administrative staff, is essential. This comprehensive approach, often referred to as the "human firewall," underscores the significance of ongoing cybersecurity awareness training for employees, making it an indispensable component of any modern defensive strategy.

Furthermore, the cybersecurity landscape is vast and interconnected. No entity, whether governmental or private, should operate in isolation. Collaboration with federal agencies, insights derived from the private sector, partnerships with international counterparts, and the collective wisdom of the cybersecurity community offer a broader perspective, innovative techniques, and collaborative solutions that are essential in navigating the ever-evolving threat landscape while continuously managing cryptographic policies with agility and redundancy.

Converging policy, funding, and cryptography

The concerted efforts of states, epitomized by initiatives such as New York's substantial financial commitment or New Jersey's targeted technology measures, pave the way for a holistic approach to cybersecurity across America. However, at this intersection of policy, technology, and threats, cryptography stands tall as the beacon guiding the path that must be taken.

In an era where digital threats mutate and evolve with alarming rapidity, a blend of policy vision, financial commitment, and advanced cryptographic measures provides our best defense. Having state and local governments lead by example, especially given the recent partnership between CISA and FEMA, will help drive awareness of the complexity of the issues at hand. However, by placing cryptography at the forefront of cybersecurity strategies, both government and private sector can ensure they start taking the necessary steps to cement their defenses while also continuing to maintain and build the trust and safety of citizens and customers in today’s advanced digital age.

NEW REPORT:
Next-Gen DPI for ZTNA: Advanced Traffic Detection for Real-Time Identity and Context Awareness
Author

Eddy Zervigon is a seasoned senior executive with extensive operational, restructuring, and turnaround experience. As a Managing Director in the Principal Investments Group at Morgan Stanley from 1997-2012, Zervigon was responsible for technology, media and entertainment, and energy investments throughout Latin America and the U.S. He has been a Special Advisor at Riverside Management Group, a boutique merchant bank, since 2012 and currently sits on the board of directors at Bloom Energy (NYSE: BE) and Maxar Technologies (NYSE: MAXR).

PREVIOUS POST

Push to Eliminate 'Digital Poverty' to Drive Demand for Satellite-Powered Broadband Connectivity Post Pandemic