Should US Hacked Federal Employees Lose Security Clearance?

At least one federal chief information security officer is concerned about how frequently even senior-level federal employees fall for the bogus emails and is considering get-tough solutions. Paul Beckman, the Department of Homeland security’s chief information security officer, said he sends his own emails designed to mimic phishing attempts to staff members to see who falls for the scam.  

“These are emails that look blatantly to be coming from outside of DHS — to any security practitioner, they’re blatant,” he said during a panel discussion on CISO priorities at the Billington Cybersecurity Summit in Washington recently. “But to these general users” — including senior managers and other VIPs, “you’d be surprised at how often I catch these guys.”
Employees who fail the test — by clicking on potentially unsafe links and inputting usernames and passwords — are forced to undergo mandatory online security training.

But Beckman said a small number of employees continue to fall for the fake scams — even in the second of third round of phishing tests.

“There are no repercussions to bad behavior,” he said. “There’s no punitive damage, so to speak. There’s really nothing to incentivize these people to be aware, to be diligent.”

Beckman said he wants to start discussions with DHS’ chief security officer — who’s responsible for overall personnel security — about incorporating employees’ susceptibility to phishing in broader evaluations of their fitness to handle sensitive information.

“Someone who fails every single phishing campaign in the world should not be holding a TS SCI with the federal government,” he said, using the government acronym to describe a top-secret security clearance. “You have clearly demonstrated that you are not responsible enough to responsibly handle that information.”

Beckman said such discussions are still in their infancy. And not all CISOs are on board with the tough approach he advocates.

Rod Turk, the Commerce Department’s CISO, said he also runs phishing tests on his employees, but he said he views it as solely a training exercise. More broadly, federal CISOs are concerned about the increasing sophistication of phishing campaigns against high-level federal personnel. They worry the recent massive breach of background-investigation files at the Office of Personnel Management — hackers stole data on 22 million federal employees and contractors — could be used to craft even more convincing phishing attempts.

“One of the things they’re going to do with [that information], you can bet your bottom dollar, is coming up with insidious anti-phishing campaigns that look very tailored and very personal to these people,” Beckman said.

“Every bit of my personal information is in an attacker’s hands right now. They could probably craft my email that even I would be susceptible to, because they know everything about me virtually.”

Turk agreed, calling the stolen data a “a goldmine for phishing expeditions.”

DefenseOne

 

 

« These Facts Explain the Threat of Cyber Warfare
Bitcoin Made Official by US Trade Commission »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

Hacken

Hacken

Hacken provide a range of cybersecurity services including security assessments, blockchain security audits, and secure software development.

WiSecure Technologies

WiSecure Technologies

WiSecure Technologies aims to develop cryptographic products meeting requirements in the new economic era.

SynerLeap

SynerLeap

SynerLeap is ABB's innovation growth hub. Our aim is to help startups accelerate and expand across industries, ranging from industrial automation and robotics to grid technologies and smart cities.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.