DoD should use third-party cybersecurity assessments for its vendors

0
305

In the wake of so many high-profile hacks and compromises it seems that no one is safe from a determined malicious cyber threat actor. Should we simply accept that data compromises are the norm and focus on developing coping mechanisms? No!

When implemented properly, data protection strategies work. The question is how can the small- and medium-sized businesses that are part of the Defense Industrial Base (DIB) do that?

While systems and data will always face the risk of hacking, it is possible to reduce the risk of becoming the victim of a malicious cyber actor by following basic cybersecurity guidelines. To this end, for nearly 20 years, the US government and other oversight bodies have been issuing cybersecurity guidelines and regulations.

But guidelines and regulations have not been enough to protect the DIB. A recent Interagency Task Force report to the White House report identified three key reasons for continued cybersecurity risks:

  1. Lack of uniform security implementation
  2. Inconsistent implementation of adequate security among defense suppliers;
  3. Reliance on self-attestation of adherence to government cybersecurity standards.

These risks can be mitigated by requiring…

Read More…