Friday, April 19, 2024

House Of Reps Passes ICS Cybersecurity Training Act

In a predominantly bipartisan vote, the Industrial Control Systems Cybersecurity Training Act was passed by the House of Representatives on the evening of June 21, 2022. The bill, sponsored by Representative Eric Swalwell (D-CA) establishes within the Cybersecurity and Infrastructure Security Agency (CISA) an initiative to provide the cybersecurity workforce with no-cost training related to securing industrial control systems. These information systems are used to control industrial processes such as manufacturing, product handling, production and distribution.

Industrial Control Systems Cybersecurity Training Act

This bill will supplement an already impressive array of training programs from CISA to keep the infrastructure of the United States secure. Unlike a great many bills, the action elements are concise and precise..

CISA must ensure its efforts include:

  1. Virtual and in-person training and courses provided at no cost to participants;
  2. Training and courses available for different skill levels, including introductory-level courses;
  3. Training and courses that cover cybersecurity defense strategies for industrial control systems, including an understanding of the unique cybersecurity threats facing industrial control systems and the mitigation of security vulnerabilities in industrial control systems technology and
  4. Appropriate consideration regarding the availability of training and courses in different regions of the United States.

CISA must also ensure “collaboration with the Department of Energy’s National Laboratories; Consultation with Sector Risk Management Agencies; and as appropriate, consultation with private sector entities with relevant expertise, such as vendors of industrial control systems technologies,” according to the text of the bill.

CISA will report to both houses of Congress’ Homeland Security Committees on an annual basis providing Congress with a report on this training initiative. Specifically, CISA must include:

  1. A description of the courses provided under the initiative.
  2. A description of the outreach efforts to raise awareness of the availability of such courses.
  3. Information on the number and demographics of participants in such courses, including by gender, race and place of residence.
  4. Information on the participation in such courses of workers from each critical infrastructure sector.
  5. Plans for expanding access to industrial control systems education and training, including expanding access to women and underrepresented populations and expanding access to different regions of the United States.
  6. Recommendations on how to strengthen the state of industrial control systems cybersecurity education and training.
Recommended:  Doxing Attacks: From Hacker Tool to Societal Problem

The Act has now been referred to the Senate Homeland Security and Governmental Affairs Committee for their action.

CISA’s Current Training Initiatives and Advisory Board Recommendations

CISA’s current array of training and learning programs, all of which are available at no cost to the participant, are available via the CISA.gov website and are divided into two sub-groups: The Critical Infrastructure Learning Series and The Critical Infrastructure Training Program.

Additionally, on June 22, included in CISA’s third cybersecurity advisory committee meeting readout were the reports from the various subcommittees, all of which were focused on the protection of the nation’s infrastructure.

  1. The Transforming the Cyber Workforce Subcommittee made recommendations focused on enhancing the talent acquisition process so as to make CISA more competitive and to create a new position within CISA, that of chief people officer.
  2. The Turning the Corner on Cyber Hygiene Subcommittee made three recommendations:
    1. CISA should launch a 311 national campaign to provide an emergency call line and clinics for assistance following cybersecurity incidents for small and medium businesses.
    2. CISA should expand its multifactor authentication (MFA) campaign by identifying additional vehicles for publicizing its More Than a Password campaign
    3. CISA should take all available steps to ensure that companies are working with the federal government to fully adopt MFA by 2025.
  3. The Protecting Critical Infrastructure from Mis- Dis- and Malinformation (MDM) Subcommittee recommended that CISA focus on addressing MDM risks that undermine critical functions of American society. As part of this work, the subcommittee recommended that CISA invest in external research to assess the impact of MDM threats and the efficacy of its MDM mitigation efforts.
  4. The Building Resilience and Reducing Systemic Risk to Critical Infrastructure Subcommittee continued its efforts to identify systemic risks across the national critical infrastructure and recommended holding tabletop exercises.
  5. The Strategic Communications Subcommittee echoed the recommendations from the Cyber Hygiene subcommittee with respect to MFA and a national 311 national campaign.
  6. The Technical Advisory Council recommended CISA develop incentives and access to information to aid security researchers and to invest in infrastructure to enable the timely submission and notification when vulnerabilities are discovered. The end goal is to create a complete loop system from submission to action to providing feedback to the researcher.
Recommended:  Anonymous sent 7 million texts to Russians plus hacked 400 of their security cams

source

Suggest an edit to this article

Go to Cybersecurity Knowledge Base

Got to the Latest Cybersecurity News

Go to Cybersecurity Academy

Go to Homepage

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login
Share the word, let's increase Cybersecurity Awareness as we know it
- Sponsored -

Sponsored Offer

Unleash the Power of the Cloud: Grab $200 Credit for 60 Days on DigitalOcean!

Digital ocean free 200

Discover more infosec

User Avatar
Steven Black (n0tst3)
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK. I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated... I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK. I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!

more infosec reads

Subscribe for weekly updates

explore

more

security