Putting aside political discord or controversies (and certainly this year has offered plenty of both), the 2016 election has made history—not to mention provided a major sense of validation—for those of us working in the information security realm.

Never before can I remember two presidential candidates standing on a debate stage, asked to explain how they plan to protect the United States from cyber-attacks. The mere inclusion of cybersecurity in such a critical discussion demonstrates a growing awareness and urgency—not only among politicians, but among their constituents. It’s no wonder—and some might say long-overdue. With multiple high-profile federal data breaches in recent years (including some allegedly targeting the election itself), cybersecurity has evolved from a relatively obscure issue to a major component of our national dialogue. This couldn’t happen at a better time. Not only has the cyber landscape grown more threatening, but federal budgets are growing accordingly, and we have better tools for protecting ourselves than ever before. But even the greatest technology accomplishes nothing unless the people using it are ready to put it to maximum use. And this is where we have work to do.

Why do hackers win?

The internet all but shut down on Oct. 21, when a large-scale denial-of-service attack targeted Dyn, one of the world’s largest internet infrastructure companies. The attack—which has yet to be fully resolved—temporarily brought some of the world’s biggest digital brands to their knees, including Twitter, Spotify, Netflix and PayPal.89hsxnW89hsxnWWhile the culprit remains unidentified, we do know this: It wasn’t just one lone hacker with too much time on his or her hands.89hsxnW89hsxnWThe most devastating, highest-profile data breaches are rarely—if ever—the work of one individual. Instead, these attacks result from massive collaboration between groups of adept, committed hackers who share a common (and malicious) goal. So how can a group of individuals spread across the globe, working behind their personal computers, with no real budget, successfully take down organizations and governments with millions—sometimes billions—of dollars to spend on cybersecurity? With all of our resources, these groups have weapons that federal agencies often struggle with: communication and collaboration.

United we conquer, divided we’re hacked.

Whether it’s a rival nation or an independent group of hackers spread from Seattle to Moscow, our enemies talk to each other. They recognize they can’t carry out their plans alone. Instead of worrying about bureaucracy or organizational swim lanes, they divide and conquer as a unit. And if we want to defend ourselves from them, we have to do the same. Data breaches, after all, affect more than just the targeted agency. In addition to millions of American citizens, these attacks often affect other agencies as well. Last year’s hack of the Office of Personnel Management (OPM), for instance, exposed the personal data of an estimated 21.5 million federal employees—including military and intelligence personnel. The hackers who perpetrated the attack understood this. While they directed their exploits toward the OPM, their greater target was the U.S. government as an entity. If federal agencies hope to prevent or fight such breaches in the future, each one must recognize and truly appreciate that the ramifications of these attacks extend far beyond their own walls. They have to shift away from a siloed, agency-by-agency approach to a collaborative, interagency partnership—one that tackles cyber defense comprehensively and with a deeper understanding of their peer-agencies’ strengths, their resources, their vulnerabilities and how their missions affect one another.

So, let’s talk.

A conversation can change everything. In the mid-1830s, two men—a British candlemaker and an Irish soapmaker—met when they emigrated to Cincinatti, Ohio, from the United Kingdom and married sisters. Over time, their father-in-law noticed that the two men were competing for the same raw materials and suggested that they instead become business partners. By the 1850s, while the rest of the nation was facing a recession, the two men had 80 employees and $1 million in sales (that’s approximately $30 million in 2016). What started from a conversation with their father-in-law grew into Proctor & Gamble, the Fortune 500 company that supplies millions of Americans with toothpaste, shampoo, dish detergent, diapers and countless other products. In 2017, the federal government is expected to spend an estimated $19 billion on cybersecurity. Meanwhile, with security intelligence solutions like Cisco Stealthwatch and IBM’s QRadar, we have never had better technology for defending ourselves against would-be attackers.  If two men can accomplish so much with only $8,000 and their knowledge of soap and candlewax, how much more could be accomplished with the resources we have today? A lot. But only if we do what William Proctor and James Gamble did—and what our enemies are doing as well. We have to talk—not only within organizational walls, but to other agencies, along with industry experts and manufacturers. These are the people who can look at another organization with fresh, objective eyes and provide insights into vulnerabilities and needs to which an insider has become blind. They’re also the ones who can offer resources and skills we might otherwise lack. It’s not enough for one agency to simply invest in stronger firewalls or security intelligence platforms. There have to be conversations at every level—from the end user to CIOs and so on. After all, if a successful cyberattack takes a coordinated and collaborative approach, so does a successful cyber defense.


Mike Greaney is CEO of Force 3.

Related Blog Posts

See All Blogs

Ignore the Workforce at Your IT Modernization Peril

Federal agencies are currently faced with the daunting task of modernizing billions of dollars’ worth of outdated technology. On the path to IT modernization success, the investment in technology represents only half the battle though — agencies also need to…

Force 3 Named Public Sector Partner of the Year and Federal Intelligence Partner of the Year at Cisco Partner Summit

This week, Force 3 was recognized for our leadership in the public sector by receiving two awards at the Cisco Partner Summit in Las Vegas, NV. Force 3 was named the Americas Geographical Region Public Sector Partner of the Year…

Creating a Disaster Recovery Plan that Keeps Pace with Technology

The fear of a disaster in your data center is what nightmares are made of for technology teams. Are the systems backed-up properly? Will we lose data? How much downtime will we incur? Does the team know what to do?…

Choosing an IT Solution Provider that Keeps Projects on Track

Most of us have experienced a project that hasn’t gone quite as planned. Information wasn’t received at the right time, different teams had completely different interpretations of the requirements, or somebody didn’t realize they were responsible for a task. Little…

TechTarget: Big Blue Drives Collaboration Among IBM Business Partners

IBM is investing in resources and business processes to make it easier for IBM business partners to create alliances with each other. Following last month's IBM Think conference in San Francisco, Senior Director of Software Practice Charles Fullwood discusses the…

Deployment and Resident Engineers Deliver On-Site Solutions

At Force 3, we provide solutions. From infrastructure management to cloud migration, we create custom answers to federal IT’s most pressing problems. But we believe strong, sustainable solutions involve more than just software and hardware. What agencies often need most…

WBJ: Here’s What it Takes for a Mid-Tier Maryland Contractor to Compete in Evolving Federal IT Marketplace

More than three-fourths of federal government agencies — about 77 percent, according to a Government Accountability Office report — will not meet their planned technology modernization goals by the end of the year. Our CEO, Mike Greaney, recently sat down…

The Rally Call for Digital Transformation Is Here: Are You Ready for the Journey?

Today, digital transformation has become the rallying cry for government organizations aiming to innovate and improve operations. The promise of digital transformation is profound: faster and more informed decision-making, improved customer insights, greater cost savings, more reliable products and services,…

3 Tactics to Avoid Insider Threats Posed by Third-Party Contractors

"The balance between too much security and too little is delicate. Overzealous access policies can bring efficiency and productivity to a screeching halt. But an overly lax approach can expose sensitive data to people who don’t need it and shouldn’t…

Improving Insider Threat Detection with Security Integration

With cyber-attacks like Nyetya and WannaCry dominating headlines over the last several months, you’d think malware would top the list of security pro’s biggest concerns. But you’d be wrong, according to the SANS Institute’s 2017 annual data security survey. While…

Unstructured Data: The Threat You Cannot See

In this article for Dark Reading, Force 3 software practice director Charles Fullwood examines why security teams needs to take a cognitive approach to the increasing volumes of data flowing from sources they don't control. Every day, IT security teams…

Expect security, cloud spending in 2018 Federal IT Budget

In recent interviews with TechTarget, industry leaders--including Force 3's Greg Kushto--cited an uptick in federal IT procurement activity during the government's fiscal fourth quarter and expected FY 2018 to feature security and cloud investments. IT solution providers planning to pursue…

NextGov: How to Unleash Federal IT Workers as Changemakers

Written by Force 3's vice president of client solutions Jason Parry, this article was originally published at www.NextGov.com. The public-sector workforce has always been plagued by stereotypes. To the layman, “government job” calls to mind images of a middle-aged bureaucrat,…

SearchITChannel: New tech, old virtues keep server virtualization going

"Server virtualization is well past the peak of the technology adoption curve, but SMB customers, open source technology and hybrid clouds keep demand going." —John Moore, SearchITChannel Server virtualization platforms have been around for ages and would seem to be old…

FedTech: How to Make the Most of the Federal Hiring Freeze

Although the freeze may constrain resources, it is also an opportunity to conduct an IT inventory, invest in training and prioritize projects. In this article for FedTech, writer Phil Goldstein addresses how federal agencies are handling the recently announced federal…

3 Opportunities for IT Teams Dealing With Federal Hiring Freeze

With a federal hiring freeze ordered across the board for federal agencies, government organizations find themselves rethinking operations—including IT. It’s a tough reality for federal IT teams, with civilian agencies seeing the deepest impact. The order heavily affects IT professionals,…

DevOps: An Evolving Approach for Evolving IT Teams

By promoting collaboration and better communication, DevOps practices can help IT teams raise their profile and generate better outcomes for their organization. And here's how: Imagine you’re an architect tasked with designing a massive mixed-used building in Washington D.C. It’s…

Federal Times: Contractors Can Help With Feds’ Security Fears

In a single, average day, the Department of Defense alone experiences an estimated 100,000 cyberattacks. Meanwhile, with accusations of Russian election hacking dominating our national dialogue and new breaches constantly being reported, federal agencies have developed a real and justifiable fear:…

Promoting a Workplace Cybersecurity Culture

Cybersecurity awareness ranks high on the federal government’s agenda and rightly so. Data breaches at federal agencies affect not only the entity in question, but potentially countless U.S. citizens whose private information it might possess. Earlier this year, a hack…

Federal Times: 4 Ways Contractors Can Help Alleviate Feds’ Security Fears

In a single, average day, the Department of Defense alone experiences an estimated 100,000 cyberattacks. Meanwhile, with accusations of Russian election hacking dominating our national dialogue and new breaches constantly being reported, federal agencies have developed a real and justifiable fear:…

Channel technology trends 2017: Cloud, cybersecurity & automation

Channel partners can expect to see plenty of activity next year in cloud computing, multi-cloud in particular, as well as cybersecurity and IT automation. When it comes to channel technology trends, 2017 seems likely to showcase some familiar developments —…

An Ounce Of Prevention Is Worth A Pound Of Reaction

Imagine you’re at a seafood restaurant. One look at the menu, and you know exactly what you want: lobster. Your food arrives, you clean your plate, and then proceed to pull out your EpiPen because you also happen to have…

How to improve government services delivery

It’s a truth as inherently American as NASCAR and as inscrutable as pop music: When it comes to providing citizen services, the government can be technologically challenged.In a recent interview with Wired magazine, even President Barack Obama acknowledged the government’s…

Full speed: Cisco Partner Summit sets the tone for the future

Full speed: The theme from last month’s Cisco Partner Summit speaks volumes about the company’s vision—not to mention it’s understanding and embrace of how quickly our industry is evolving. Most of all, it gives Cisco’s partners in the security and…

Transitioning from the server room to the board room

How can IT professionals balance business goals and information security?For years, businesses and their IT operations experienced a strained symbiosis — each needing the other to thrive, but frequently at odds in matters of prioritization, budgeting, and resources.Fast-forward to the…

If Target or Sony can be a target for cyber criminals, so can you

When hackers breached Sony or Target or the IRS or the U.S. Office of Personnel Management, you probably heard about it. Without fail, data breaches at major organizations always rank high in the news, particularly because so many citizens are…

Protecting critical IT infrastructure in the federal realm

For nearly every federal agency, critical IT infrastructure plays a pivotal role. From tax and social security information to connecting military personnel around the world, federal agencies’ networks contain some of the most sensitive, confidential data and are constant targets…

IoT: Mitigating the risks of the revolution

In 2015, the U.S. government increased its spending on the Internet of Things (IoT) by 20 percent—nearly $9 billion—according to a report released last year. It’s a great step forward as the federal space increasingly looks to IoT to increase…

Ransomware infections: Channel toils to defend besieged customers

As ransomware attacks continue to proliferate and escalate, organizations increasingly turn to channel partners to help defend against potential infections. In some cases, companies find themselves reconsidering their IT security posture, Force 3 senior technical consultant Chris Crider tells TechTarget's…

Preparing for and combatting 21st century cyber threats

A report released earlier this year suggests that cybercrime costs consumers and companies between $375 and $575 billion annually. Despite billions of dollars spent fighting it every year, cybercrime continues to rise with another report estimating 200-percent growth in just…

How can we help your agency achieve its mission?

Maximize your IT investments. Learn more about solutions and services from Force 3.