17 million cyberattacks a day: How Oklahoma stops 99% of them

DustyPixel/Getty Images

 

Connecting state and local government leaders

In a recent interview, the state’s CISO talks about zero trust, the upside to COVID and triaging the state’s aging tech infrastructure.

Oklahoma’s government networks come under attack from cybercriminals about 17 million times a day, creating a lot of potential headaches for the state’s IT security staff.

But Oklahoma is in a far better position to handle those threats than it was four years ago when the COVID-19 pandemic forced most Americans, including the state’s 30,000-plus workforce, to work from home 

Suddenly, the state’s networks were more vulnerable than ever as those 30,000 employees signed on to work remotely each day using a VPN, a connection between a computer and a remote server that can be exploited by hackers.

Remote work also taxed the state’s aging tech infrastructure, prompting leaders to start a path to modernization. They embraced a zero-trust security framework, which grants users and devices access only to parts of the network that are essential to their task. The approach is designed to protect users, applications, infrastructure and data, whether systems reside in an agency data center, in the cloud or in a hybrid environment.

Today, when an employee signs on, they encounter more robust multi-factor authentication, underpinned by new security software that has been rolled out to more than 100 of the state’s 180 agencies. Consolidating under one security approach has saved the state $875 million.

It is all part of an effort that has been underway for more than a decade to modernize the state’s legacy infrastructure. Chief Information Security Officer Michael Toland recently sat down with Route Fifty to discuss that modernization effort.

Michael Toland
Michael Toland, chief information security officer of Oklahoma.
Photo courtesy of the Oklahoma state government.

This interview has been edited for clarity and brevity.

Route Fifty: Take me back and give me a bit of a history lesson, if you would, about what the IT infrastructure in the state was like before you guys started this modernization journey.

Michael Toland: The state had the same problem everybody had when COVID hit, which is, “How do we send people home and keep them working?” A lot of the common threads were classic VPN solutions that simply couldn't carry the number of connections and had difficulties getting application experiences that were good enough [for employees] to actually be effective in the job…. Before, you might start up your computer, log into the VPN client, or in the case of certain VPN clients, maybe start it two or three times [before] you've got your access. Now you’re remotely into a system where you open an application and the experience is very hit or miss. You might authenticate three or four times before you do a task, so you've got high security friction. You might get kicked off in the middle of a transaction and have to start all over again. It wasn't working, and so we chose to use Zscaler. We put the process of authenticating to the trusted network right there at the initial Windows login.

Route Fifty: What does this new regime look like?

Toland: The experience now is you open up your state-owned computer that has all the agents on it, and when you log in, you're logged into the computer and the network, you can immediately access the apps with the same user experience anywhere in the world. The only variable I can't control is the bandwidth available to you wherever you're sitting. But we even have a solution for that: We have monitoring in place so that if a person calls me, [we] can take a look and say, 'Okay, your processor’s good, memory’s good, your bandwidth is low and that's where the latency is coming in.’ We have the ability to know what's going on there. 

We're not there yet—there are certain applications that are not yet protected. There are legacy applications that simply do not lend themselves to zero-trust architecture. As they are being phased out and their replacements are being written, we just get better and better.

 "I don't want to say COVID was good, but there was a silver lining to COVID," said Toland. "When you have no choice but to change, some of the arguments around optionality go away." 

Route Fifty: Was it hard to transition to this kind of new zero-trust architecture away from VPNs and the old way you did it? How did you go about transitioning your employees?

Toland: I don't want to say COVID was good, but there was a silver lining to COVID, as there was no choice. The old method simply didn't work. It's always hard to change things. But I feel like it actually made it a little bit easier. When you have no choice but to change, some of the arguments around optionality go away. Three years before or three years after, it might have been a little harder, it might have been more difficult to sell people on the idea, but I feel like it worked out well, just based on the timing and the need to move. What people saw was a win right upfront, and that good experience was enough that the little bit of friction that goes into the zero-trust model wasn't felt as strongly as it might have otherwise been.

Route Fifty: Those 17 million attacks each day on your networks sound scary too.

Toland: It is a terrifying number. However, with the security platforms in place, [more than] 99% of them never make it to the eyes of an engineer. We stop them at the edge, or we know about an IP address because of threat intelligence feeds from this data, so we just block them at the firewall. We still track that because it's worth knowing. 

The state is a big target. There's a lot of data here. We have data that falls under just about every regulatory framework that you care to mention. From a cybercriminal’s point of view, this is a pretty tempting target. If you want something to steal, odds are we have it.

Route Fifty: You mentioned that some applications maybe haven't lent themselves to this transition to zero trust. What kind of things? Are you transitioning legacy stuff and that sort of thing? What's the status of all that?

Toland: What is modern today will be legacy tomorrow, so it's a never-ending churn. It's the same things that everybody has: old mainframe applications that are 40 years old but still work. Is it really worth $3 million or whatever it's going to cost to write a new one, implement it, train everybody up and go through the lows of the new system blues as you find and fix workflow or application problems? Quite frankly, in a lot of cases, the answer to that is no. It's old, but it works. 

Other things where we feel a little bit more pain are applications written on technologies that are no longer supported. There are some database-driven apps where the databases won't support a more modern version of Oracle or SQL or whatever. Those are hurting us a little bit more because the vulnerabilities are stacking up and they're not being patched, so we're attacking those first. 

We try to triage in order of severity. It's the same problem everybody in our business has. There's tech debt, there always will be, it needs to be modernized, but there's only so many dollars to go around. We just attack them as best we can. What we've chosen to do is when we identify an application that is particularly vulnerable, but it's not yet in process for modernization, we just find technologies to put around it. We do our virtual moats, put up our virtual walls and do our best to protect those systems so they don't end up being our next security event.

"What is modern today will be legacy tomorrow," Toland said, "so it's a never-ending churn."

Route Fifty: Is it hard to build a moat or wall around a 40-year-old application?

Toland: Everything is hard to one extent or another. But there's a lot of technology out there, there's a lot of good people out there that know how to do some pretty creative and cool things. I'm very privileged to work with a lot of them. We use additional firewalls, load balancers, we put the system behind another layer of protection to make it just that much harder to get to it, and we monitor them more closely. It's not perfect. Nothing ever is. At the end of the day, it all comes down to a risk versus reward discussion. There's always a certain amount of risk that you inherently have to accept.

Route Fifty: What effects are you seeing from the zero-trust architecture that you have in place, say in terms of employee experience?

Toland: I think it's improved the employee experience. It does add a bit of security friction, where you can't just stay logged into an application forever, you have to reauthorize periodically. That can be frustrating for people, and I empathize because I growl at my keyboard when I have to do it. That's a fact of life, it affects everybody and I'm looking forward to the days when the technology matures even beyond that, which I obviously feel it will. 

Going passwordless will help as more technologies are able to support better authentication methods, so you don't necessarily have to remember 17 passwords or whatever the number is these days. By and large, I think it's actually improved the experience, because people are able to just work and maybe not worry so much about getting kicked off a VPN. The platform we're using that is facilitating zero trust has eliminated that. While we have added a little bit of security friction, I feel like we've taken more away, and so it's been a net benefit to our users.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.