Security wars move to new turf
Connecting state and local government leaders
Andy Purdy, acting director of the National Cyber Security Division and U.S. Computer Emergency Response Team since April 2003, is the Homeland Security Department's lightning rod for preventing, responding to and recovering from electronic attacks.
Andy Purdy, DHS cybercrime fighter
GCN: Last year's Topoff cyberattack exercise indicated some gaps in coordination between physical infrastructure protection agencies and cybersecurity agencies. What steps have been taken to fill these gaps, and how will the upcoming Topoff exercise reflect these changes?
GCN: What indications have you received, if any, that criminal, terrorist and drug-smuggling groups are coordinating their cyberattack efforts? What countries are the biggest source of sophisticated cyberattacks on federal, state and local agencies?
GCN: Do you believe that the dominance of certain operating systems and applications has created a monoculture of systems technology in some arenas that makes cyberattacks easier and more profitable?
GCN: Studies of the insider threat to cybersecurity indicate that most cyberattacks mounted internally come from nontechnical employees'usually from authorized users. How can federal systems managers stem this threat?
GCN: Are you satisfied with the level of education about systems security in DHS or in federal agencies generally? Does DHS plan a renewed push to raise cybersecurity awareness and strengthen systems security training in the government?
GCN: The Homeland Security Department has received criticism from Congress and its own inspector general on several points of systems security. What steps is the cybersecurity division taking to deal with these problems, if any?
GCN: Cyberattacks have advanced far beyond the level of the 'script kiddie' attacks. What do you believe are the most insidious and potentially damaging types of cyberattacks, and what emerging types of attacks keep you awake at night?
GCN: The lack of a cyber-Pearl Harbor may have lulled the private sector and parts of the government into complacency. Is there an actual need for alarm about this problem? Can we shelve our digital duct tape?
GCN: Where should federal IT managers direct their security resources most urgently?
GCN: Are you confident that overseas software development facilities that supply commercial applications for federal use have sufficient security, especially with regard to checking the backgrounds of programmers and systems analysts in places like Bangalore, India, and China, where commercial software is produced?
GCN: What initiatives do you plan for the cybersecurity division in coming months?
NEXT STORY: NIST offers HIPAA security guidance