{"id":119191,"date":"2020-09-25T15:00:07","date_gmt":"2020-09-25T22:00:07","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=119191"},"modified":"2020-09-28T14:06:21","modified_gmt":"2020-09-28T21:06:21","slug":"policy-cisa-3rd-annual-national-cybersecurity-summit","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/09\/policy-cisa-3rd-annual-national-cybersecurity-summit\/","title":{"rendered":"CISA Panel: Reflections on Digital Transformation and COVID-19"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">On Sept. 23, I was honored to \u201cvirtually\u201d join David Shive, CIO of the General Services Administration, and Jim Weaver, CIO of the State of Washington, at the U.S. Cybersecurity and Infrastructure Security Agency\u2019s (CISA) 3rd Annual <\/span><a href=\"https:\/\/www.cisa.gov\/cybersummit2020\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">National Cybersecurity Summit<\/span><\/a><span style=\"font-weight: 400;\">, to discuss the digital transformations brought on by the COVID-19 pandemic.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">David and Jim both provided tremendous insight from the front lines of federal and state technology and cybersecurity challenges. Our conversation focused on our respective organizations\u2019 efforts \u2013 in the context of COVID-19, the examination of social and racial injustice, and the wildfires across the Western United States \u2013 to meet the needs of our workforce and the customers we serve, while contributing to the broader ecosystem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our session offered an opportunity to reflect on the early days of the pandemic in the U.S. and review the actions we took to support, almost overnight, an unprecedented shift to remote work. We discussed how our conception of critical infrastructure and essential services evolved, our collaboration with governments worldwide, and whether and how these changes to our digital world will have a lasting impact. Here are some highlights from the session:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>A rapid transition to secure remote work.<\/b><span style=\"font-weight: 400;\"> In early March, Palo Alto Networks <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/03\/cloud-securing-remote-workforces\/\"><span style=\"font-weight: 400;\">responded quickly<\/span><\/a><span style=\"font-weight: 400;\">. For our own workforce, we made the transition to nearly 100% remote, focused on the well-being of our teammates. And as a global team whose mission is enabling our customers to work securely no matter where they are, we were well-equipped with the tools, technologies and security to <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/network-secure-access\/\"><span style=\"font-weight: 400;\">work safely from home<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Our team also rallied to help organizations <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/network-federal-agency-remote-workers\/\"><span style=\"font-weight: 400;\">secure remote workers<\/span><\/a><span style=\"font-weight: 400;\"> and provide expanded infrastructure security quickly. We assisted the largest federal agencies in the U.S. government in securing thousands of employees\u2019 remote workstations, in one instance reworking Multi-Factor Authentication systems in less than a week to onboard several hundred new employees and upgrading key cloud-hosting infrastructure over a weekend. We assisted one state in securing 8,000 workers in 48 hours. And we partnered with a technology consortium serving 100,000 universities and K-12s in the U.S. to help campuses securely deliver remote learning to students at home.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In many ways, COVID-19 simply <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/05\/network-data-center-transformation\/\"><span style=\"font-weight: 400;\">accelerated network transformation trends<\/span><\/a><span style=\"font-weight: 400;\"> that were already underway and will certainly continue in some form long after the pandemic recedes. It is now simply a strategic imperative to extend consistent security capabilities you deploy within your internal HQ network to all environments, regardless of where an employee connects.\u00a0\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Reimagining critical functions for a more resilient supply chain. <\/b><span style=\"font-weight: 400;\">The<\/span><span style=\"font-weight: 400;\"> pandemic has shown the importance of broadening our field of vision on what constitutes essential services in times of crisis, and CISA\u2019s <\/span><a href=\"https:\/\/www.cisa.gov\/national-critical-functions\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">National Critical Functions<\/span><\/a><span style=\"font-weight: 400;\"> concept provided a successful foundation to build upon. One quick lesson was that \u201cessential services\u201d encompasses a variety of functions and activities throughout the supply chain. For every IT company developing critical technologies to enable remote work, for instance, a manufacturing partner was equally essential to supporting those technologies. In another example, small businesses several levels downstream of the national food supply chain were deemed \u201cessential\u201d and quickly realized that any disruption to their operations, including cyber-enabled disruptions, could have a cascading impact on national public safety and security.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">As we have noted previously, Palo Alto Networks is both a critical infrastructure company ourselves and a supplier to other critical infrastructure entities worldwide. <\/span><span style=\"font-weight: 400;\">Our collaboration with our government partners \u2013 at the federal, state, local and international levels \u2013 to identify, in real time, these expanded essential services helped us prioritize our own <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/07\/unit-42-cybercrime-gold-rush\/\"><span style=\"font-weight: 400;\">outreach and threat research<\/span><\/a><span style=\"font-weight: 400;\">, and ensure a more <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/06\/policy-supply-chain-best-practices\/\"><span style=\"font-weight: 400;\">resilient supply chain<\/span><\/a><span style=\"font-weight: 400;\"> for the pandemic response.<\/span><\/p>\n<ul>\n<li><b>Our strong commitment to government collaboration. <span style=\"font-weight: 400;\">\u00a0In addition to our collaboration on critical functions to ensure a more resilient supply chain, Palo Alto Networks supported our government partners in two additional ways. First, we collaborated on critical guidance for secure technology capabilities. We provided input to government standards and best practice guidelines, based on lessons learned across our 70,000 enterprise customers, on topics ranging from <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/network-video-conferencing-security\/\"><span style=\"font-weight: 400;\">secure video conferencing<\/span><\/a><span style=\"font-weight: 400;\"> capabilities to other <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/network-working-from-home\/\"><span style=\"font-weight: 400;\">remote workforce activities<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Second, we shared <\/span><a href=\"https:\/\/unit42.paloaltonetworks.com\/covid19-cyber-threats\/\"><span style=\"font-weight: 400;\">COVID-related threat indicators<\/span><\/a><span style=\"font-weight: 400;\"> and collaborated on research priorities. As part of our global threat intelligence analysis efforts, the Unit 42 threat intelligence team is committed to partnering with governments, national cyber centers and CERTs\/CSIRTs on preventing threats to the health care sector and other critical sectors involved in the COVID-19 response. <\/span><span style=\"font-weight: 400;\">Unit 42<\/span><a href=\"https:\/\/unit42.paloaltonetworks.com\/tag\/covid-19\/\"> <span style=\"font-weight: 400;\">identified<\/span><\/a><span style=\"font-weight: 400;\"> more than 1.2 million new registered domain names containing keywords related to the coronavirus pandemic just in the first seven weeks of the crisis, of which at least 86,000 were malicious or risky \u2013 designed specifically to steal personal information or other data. Unit 42 also identified an increase in COVID-related phishing attempts, including ransomware against healthcare organizations and other critical infrastructure. We shared these findings quickly to ensure governments were prepared and informed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I would like to thank CISA for convening this important summit, and my co-panelists both for their insights on the session and for their public service during this extraordinary time. I look forward to further collaboration on these critical topics.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Watch the video of our session, \u201c<\/span><a href=\"https:\/\/www.cisa.gov\/publication\/cybersummit-session-day-2-cio-panel-challenges-overcome-and-predicted\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">CIO Panel \u2013 Challenges Overcome and Predicted<\/span><\/a><span style=\"font-weight: 400;\">.\u201d You can also learn more about <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/us-federal\"><span style=\"font-weight: 400;\">our commitment to the U.S. government\u2019s cybersecurity mission<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A CIO panel at the CISA 3rd Annual National Cybersecurity Summit provided an opportunity to discuss the digital transformations driven by COVID-19.<\/p>\n","protected":false},"author":129,"featured_media":108934,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[484,6769],"tags":[123,102,7217,1794],"coauthors":[1179],"class_list":["post-119191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","category-public-sector","tag-government2","tag-remote-access","tag-remote-work","tag-supply-chain"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/panw-federal-TEST1-1200x627-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/119191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/129"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=119191"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/119191\/revisions"}],"predecessor-version":[{"id":119229,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/119191\/revisions\/119229"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/108934"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=119191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=119191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=119191"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=119191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}