Security wars move to new turf

 

Connecting state and local government leaders

Andy Purdy, acting director of the National Cyber Security Division and U.S. Computer Emergency Response Team since April 2003, is the Homeland Security Department's lightning rod for preventing, responding to and recovering from electronic attacks.

Andy Purdy, acting director of the National Cyber Security Division and U.S. Computer Emergency Response Team since April 2003, is the Homeland Security Department's lightning rod for preventing, responding to and recovering from electronic attacks.He helped launch the center in his job as White House senior adviser for IT security and privacy, a position he held from April 2002 to April 2003 while on detail from the Sentencing Commission. At the commission, Purdy worked as chief deputy general counsel from 1987 to April 2002. He also was counsel to the Senate Impeachment Trial Committee from July 1989 to October 1989.Purdy previously served as counsel to different congressional committees and was an assistant U.S. attorney for the Eastern District of Pennsylvania in Philadelphia.Purdy holds an undergraduate degree in government and economics from the College of William and Mary and a law degree from the University of Virginia. GCN senior writer Wilson P. Dizard III interviewed him by telephone.Purdy: There will be a much bigger cybercomponent. At the most significant level, we have formed the National Cyber Response Coordination Group, which is part of the whole National Response Plan. So the National Response Plan has all the elements and processes that physical and cyber [infrastructure defenders] would have when it's an incident of national significance.The NCRCG [activates] during a physical crisis. The Interagency Incident Management Group is stood up, as is the National Cyber Response Coordination Group.Purdy: We have been actively involved in the national intelligence estimate for cybersecurity. Most of it is classified. It is an example of where intelligence agencies and law enforcement have worked together to connect the dots on major threats from states and nonstate actors to make sure [they] have a common picture. Our law enforcement and intelligence folks are tracking malicious cyberactivity.There is an active involvement of criminal [elements] in electronic crime. I shouldn't be more specific at this time.Purdy: I don't look at it in terms of a monoculture. I look at it in two tracks. One is the existence and discovery of numerous vulnerabilities and challenges that pose risks and costs to system operations, to protect systems without damaging [them].Also we are actively involved in software assurance efforts to solve the problem that code is written with so many vulnerabilities.Purdy: I think one of the great efforts is in the area of access controls, where the move is toward two-factor authentication. It's something you have and something you know, like when you go to the bank [cash machine] with a card and a PIN. I think there will be substantial progress for stronger access controls in the next year. I think most trusted users will have three-factor identification: something you have, something you know and something you are.Purdy: In terms of DHS, the effort to raise and maintain the level of appropriate awareness is run by the CIO and chief information security officer. They have had very aggressive campaigns for educating employees. There have been very aggressive efforts in other agencies. Our agency, with the Office of Management and Budget, does intend to raise awareness.Purdy: The responsibility for our systems security rests with the CIO and chief information security officer. We have been in discussions and have a close relationship with those offices. We think we are moving ahead aggressively.Purdy: Right now there is a black market in malicious cybertools of attack that are focused on financial gain. I am troubled by the availability of those malicious tools, particularly the ability to buy and grow botnets, which are networks of computers that are controlled by the perpetrator. [A botnet targets] computers of users who are unaware of that control. It means that, because of spyware and malicious code placed on computers, someone can use those computers to launch spam and steal personal identity information. They could also be used to launch denial-of-service and other serious attacks.The move from the script kiddies to significant organized criminal groups does give law enforcement targets to investigate. But we can't rely on law enforcement alone to deal with the risks posed by these malicious tools.Purdy: Our dependency on cyberspace and the risks [that entails] is one that requires vigilance and concerted action. The [National Cyber Security Division], in partnership with other agencies and the private sector, is proceeding with appropriate seriousness to reduce risks.Purdy: The road map is provided by the President's Management Agenda and the requirements of [the Federal Information Security Management Act] to bring their systems into a heightened state of cybersecurity readiness.Purdy: We are working in partnership with the Defense Department and others in our software assurance initiative trying to develop tools so that software can be reviewed and analyzed whether it is made domestically or overseas. Traditionally, regarding our national security information systems, there has been heightened scrutiny given to all products that are going to be acquired from foreign sources. The development of the tools is important.Purdy: We are pursuing our goals to strengthen our National Cyber Response system. We are improving the information flow about cybersecurity from federal agencies and building our relationships internationally as well.

What's more

Family: Wife, Robin Fader, and 10-year-old daughter, Alexandra


Last movie seen: 'Friday Night Lights'


Dream job: 'I am acting director of cybersecurity, and my dream job is director of cybersecurity.'


Reading Material: Founding Brothers by Joseph J. Ellis and Black Ice by Michael Connelly


Car: Volvo S80

Andy Purdy, DHS cybercrime fighter

Organized cybercrime calls for an organized response from DHS









GCN: Last year's Topoff cyberattack exercise indicated some gaps in coordination between physical infrastructure protection agencies and cybersecurity agencies. What steps have been taken to fill these gaps, and how will the upcoming Topoff exercise reflect these changes?





GCN: What indications have you received, if any, that criminal, terrorist and drug-smuggling groups are coordinating their cyberattack efforts? What countries are the biggest source of sophisticated cyberattacks on federal, state and local agencies?





GCN: Do you believe that the dominance of certain operating systems and applications has created a monoculture of systems technology in some arenas that makes cyberattacks easier and more profitable?





GCN: Studies of the insider threat to cybersecurity indicate that most cyberattacks mounted internally come from nontechnical employees'usually from authorized users. How can federal systems managers stem this threat?



GCN: Are you satisfied with the level of education about systems security in DHS or in federal agencies generally? Does DHS plan a renewed push to raise cybersecurity awareness and strengthen systems security training in the government?



GCN: The Homeland Security Department has received criticism from Congress and its own inspector general on several points of systems security. What steps is the cybersecurity division taking to deal with these problems, if any?



GCN: Cyberattacks have advanced far beyond the level of the 'script kiddie' attacks. What do you believe are the most insidious and potentially damaging types of cyberattacks, and what emerging types of attacks keep you awake at night?





GCN: The lack of a cyber-Pearl Harbor may have lulled the private sector and parts of the government into complacency. Is there an actual need for alarm about this problem? Can we shelve our digital duct tape?



GCN: Where should federal IT managers direct their security resources most urgently?



GCN: Are you confident that overseas software development facilities that supply commercial applications for federal use have sufficient security, especially with regard to checking the backgrounds of programmers and systems analysts in places like Bangalore, India, and China, where commercial software is produced?



GCN: What initiatives do you plan for the cybersecurity division in coming months?

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.