In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Gregory J. Touhill, director of the SEI CERT Division, talks with principal researcher Suzanne Miller about the 2020 attack on Solar Winds software and how to prevent a recurrence of another major attack on key systems that are in widespread use. Solar Winds is the name of a company that provided software to the U.S. federal government. In late 2020, news surfaced about a cyberattack that had already been underway for several months and that had reportedly compromised 250 government agencies, including the Treasury Department, the State Department, and nuclear research labs. In addition to compromising data, the attack resulted in financial losses of more than $90 million and was probably one of the most dangerous modern attacks on software and software-based businesses and government agencies in the recent past. The SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains.
In this podcast, Touhill discusses topics including the need for systems to be secure by design and secure by default, the importance of transparency in the reporting of vulnerabilities and anomalous system behavior, the CERT Acquisition Security Framework, the need to secure data across a wide range of disparate devices and systems, and tactics and strategies for individuals and organizations to safeguard their data and the systems they rely on daily.
Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity
The Human Side of Security Trade-Offs
Dual Perspectives: A CIO's and CISO's Take on Security
Tackling Security at the National Level: A Resource for Leaders
Reducing Security Costs with Standard Configurations: U.S. Government Initiatives
Real-World Security for Business Leaders
Using Standards to Build an Information Security Program
Getting Real About Security Governance
Convergence: Integrating Physical and IT Security
IT Infrastructure: Tips for Navigating Tough Spots
The Value of De-Identified Personal Data
Adapting to Changing Risk Environments: Operational Resilience
Computer Forensics for Business Leaders: A Primer
The Real Secrets of Incident Management
The Legal Side of Global Security
A New Look at the Business of IT Education
Crisis Communications During a Security Incident
Assuring Mission Success in Complex Environments
Privacy: The Slow Tipping Point
Building Staff Competence in Security
Create your
podcast in
minutes
It is Free