Should US Hacked Federal Employees Lose Security Clearance?

At least one federal chief information security officer is concerned about how frequently even senior-level federal employees fall for the bogus emails and is considering get-tough solutions. Paul Beckman, the Department of Homeland security’s chief information security officer, said he sends his own emails designed to mimic phishing attempts to staff members to see who falls for the scam.  

“These are emails that look blatantly to be coming from outside of DHS — to any security practitioner, they’re blatant,” he said during a panel discussion on CISO priorities at the Billington Cybersecurity Summit in Washington recently. “But to these general users” — including senior managers and other VIPs, “you’d be surprised at how often I catch these guys.”
Employees who fail the test — by clicking on potentially unsafe links and inputting usernames and passwords — are forced to undergo mandatory online security training.

But Beckman said a small number of employees continue to fall for the fake scams — even in the second of third round of phishing tests.

“There are no repercussions to bad behavior,” he said. “There’s no punitive damage, so to speak. There’s really nothing to incentivize these people to be aware, to be diligent.”

Beckman said he wants to start discussions with DHS’ chief security officer — who’s responsible for overall personnel security — about incorporating employees’ susceptibility to phishing in broader evaluations of their fitness to handle sensitive information.

“Someone who fails every single phishing campaign in the world should not be holding a TS SCI with the federal government,” he said, using the government acronym to describe a top-secret security clearance. “You have clearly demonstrated that you are not responsible enough to responsibly handle that information.”

Beckman said such discussions are still in their infancy. And not all CISOs are on board with the tough approach he advocates.

Rod Turk, the Commerce Department’s CISO, said he also runs phishing tests on his employees, but he said he views it as solely a training exercise. More broadly, federal CISOs are concerned about the increasing sophistication of phishing campaigns against high-level federal personnel. They worry the recent massive breach of background-investigation files at the Office of Personnel Management — hackers stole data on 22 million federal employees and contractors — could be used to craft even more convincing phishing attempts.

“One of the things they’re going to do with [that information], you can bet your bottom dollar, is coming up with insidious anti-phishing campaigns that look very tailored and very personal to these people,” Beckman said.

“Every bit of my personal information is in an attacker’s hands right now. They could probably craft my email that even I would be susceptible to, because they know everything about me virtually.”

Turk agreed, calling the stolen data a “a goldmine for phishing expeditions.”

DefenseOne

 

 

« These Facts Explain the Threat of Cyber Warfare
Bitcoin Made Official by US Trade Commission »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

StormWall

StormWall

StormWall is an Anti-DDoS protection service for websites and networks. We offer 100% protection from all types of DDoS attacks and 24/7 technical support.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Council to Secure the Digital Economy (CSDE)

Council to Secure the Digital Economy (CSDE)

CSDE brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

GCHQ Apprenticeships

GCHQ Apprenticeships

GCHQ, the UK intelligence and security organisation, offers a unique three-year Cyber Security Degree Apprenticeship with employment on successful completion.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

Technisanct

Technisanct

Technisanct works with Governments, especially Law Enforcement and Defence agencies, helping them in monitoring threats, managing their data and resolving their forensic needs.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.

HackersEra

HackersEra

HackersEra is a leading offensive cybersecurity service provider. We enable our clients to operate in a more secure environment efficiently and produce more value.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

White Knight Labs

White Knight Labs

White Knight Labs is a cyber security consultancy that specializes in cybersecurity training.